]> git.ipfire.org Git - thirdparty/squid.git/blame - src/cache_cf.cc
Added radix stuff.
[thirdparty/squid.git] / src / cache_cf.cc
CommitLineData
be335c22 1
30a4f2a8 2/*
5c104928 3 * $Id: cache_cf.cc,v 1.238 1997/12/03 01:29:56 wessels Exp $
30a4f2a8 4 *
5 * DEBUG: section 3 Configuration File Parsing
6 * AUTHOR: Harvest Derived
7 *
42c04c16 8 * SQUID Internet Object Cache http://squid.nlanr.net/Squid/
30a4f2a8 9 * --------------------------------------------------------
10 *
11 * Squid is the result of efforts by numerous individuals from the
12 * Internet community. Development is led by Duane Wessels of the
13 * National Laboratory for Applied Network Research and funded by
14 * the National Science Foundation.
15 *
16 * This program is free software; you can redistribute it and/or modify
17 * it under the terms of the GNU General Public License as published by
18 * the Free Software Foundation; either version 2 of the License, or
19 * (at your option) any later version.
20 *
21 * This program is distributed in the hope that it will be useful,
22 * but WITHOUT ANY WARRANTY; without even the implied warranty of
23 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
24 * GNU General Public License for more details.
25 *
26 * You should have received a copy of the GNU General Public License
27 * along with this program; if not, write to the Free Software
28 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 *
30 */
cf5fd929 31
44a47c6e 32#include "squid.h"
1df370e3 33
34#if SQUID_SNMP
a97cfa48 35#include "snmp.h"
1df370e3 36#endif
090089c4 37
8813e606 38static const char *const T_SECOND_STR = "second";
39static const char *const T_MINUTE_STR = "minute";
40static const char *const T_HOUR_STR = "hour";
41static const char *const T_DAY_STR = "day";
42static const char *const T_WEEK_STR = "week";
43static const char *const T_FORTNIGHT_STR = "fortnight";
44static const char *const T_MONTH_STR = "month";
45static const char *const T_YEAR_STR = "year";
46static const char *const T_DECADE_STR = "decade";
aa0a0c7c 47
9906e724 48static const char *const B_BYTES_STR = "bytes";
49static const char *const B_KBYTES_STR = "KB";
50static const char *const B_MBYTES_STR = "MB";
51static const char *const B_GBYTES_STR = "GB";
52
4db43fab 53static const char *const list_sep = ", \t\n\r";
090089c4 54
24382924 55static char fatal_str[BUFSIZ];
f5b8bbc4 56static void self_destruct(void);
57static void wordlistAdd(wordlist **, const char *);
caebbe00 58
f5b8bbc4 59static void configDoConfigure(void);
1df370e3 60#if SQUID_SNMP
a97cfa48 61static void parse_snmp_conf(snmpconf **);
1df370e3 62#endif
f5b8bbc4 63static void parse_refreshpattern(refresh_t **);
64static int parseTimeUnits(const char *unit);
65static void parseTimeLine(time_t * tptr, const char *units);
66static void parse_string(char **);
67static void parse_wordlist(wordlist **);
68static void default_all(void);
69static void defaults_if_none(void);
70static int parse_line(char *);
71static void parseBytesLine(size_t * bptr, const char *units);
72static size_t parseBytesUnits(const char *unit);
f5b8bbc4 73static void free_all(void);
f0b19334 74static void requirePathnameExists(const char *name, const char *path);
270b86af 75
24382924 76static void
0673c0ba 77self_destruct(void)
090089c4 78{
56878878 79 snprintf(fatal_str, BUFSIZ, "Bungled %s line %d: %s",
b8de7ebe 80 cfg_filename, config_lineno, config_input_line);
090089c4 81 fatal(fatal_str);
82}
83
8203a132 84void
85wordlistDestroy(wordlist ** list)
0ffd22bc 86{
87 wordlist *w = NULL;
79d39a72 88 while ((w = *list) != NULL) {
b5639035 89 *list = w->next;
0ffd22bc 90 safe_free(w->key);
91 safe_free(w);
92 }
93 *list = NULL;
94}
95
24382924 96static void
fe4e214f 97wordlistAdd(wordlist ** list, const char *key)
090089c4 98{
0ffd22bc 99 wordlist *p = NULL;
100 wordlist *q = NULL;
090089c4 101
102 if (!(*list)) {
103 /* empty list */
30a4f2a8 104 *list = xcalloc(1, sizeof(wordlist));
090089c4 105 (*list)->key = xstrdup(key);
106 (*list)->next = NULL;
107 } else {
108 p = *list;
109 while (p->next)
110 p = p->next;
30a4f2a8 111 q = xcalloc(1, sizeof(wordlist));
090089c4 112 q->key = xstrdup(key);
113 q->next = NULL;
114 p->next = q;
115 }
116}
117
8203a132 118void
119intlistDestroy(intlist ** list)
92a6f4b1 120{
121 intlist *w = NULL;
122 intlist *n = NULL;
123
124 for (w = *list; w; w = n) {
125 n = w->next;
126 safe_free(w);
127 }
128 *list = NULL;
129}
130
403279e0 131
3c5557f9 132/*
133 * Use this #define in all the parse*() functions. Assumes char *token is
134 * defined
135 */
090089c4 136
137#define GetInteger(var) \
138 token = strtok(NULL, w_space); \
30a4f2a8 139 if( token == NULL) \
3003c0f3 140 self_destruct(); \
090089c4 141 if (sscanf(token, "%d", &var) != 1) \
3003c0f3 142 self_destruct();
090089c4 143
270b86af 144int
145parseConfigFile(const char *file_name)
2546fcb3 146{
270b86af 147 FILE *fp = NULL;
148 char *token = NULL;
72121e8b 149 char *tmp_line;
0153d498 150 free_all();
151 default_all();
270b86af 152 if ((fp = fopen(file_name, "r")) == NULL) {
042461c3 153 snprintf(fatal_str, BUFSIZ, "Unable to open configuration file: %s: %s",
270b86af 154 file_name, xstrerror());
155 fatal(fatal_str);
156 }
157 cfg_filename = file_name;
158 if ((token = strrchr(cfg_filename, '/')))
159 cfg_filename = token + 1;
160 memset(config_input_line, '\0', BUFSIZ);
161 config_lineno = 0;
162 while (fgets(config_input_line, BUFSIZ, fp)) {
163 config_lineno++;
164 if ((token = strchr(config_input_line, '\n')))
165 *token = '\0';
166 if (config_input_line[0] == '#')
167 continue;
168 if (config_input_line[0] == '\0')
169 continue;
170 debug(3, 5) ("Processing: '%s'\n", config_input_line);
72121e8b 171 tmp_line = xstrdup(config_input_line);
270b86af 172 if (!parse_line(tmp_line)) {
173 debug(3, 0) ("parseConfigFile: line %d unrecognized: '%s'\n",
174 config_lineno,
175 config_input_line);
176 }
72121e8b 177 safe_free(tmp_line);
270b86af 178 }
f0b19334 179 fclose(fp);
180 defaults_if_none();
181 configDoConfigure();
182 return 0;
183}
270b86af 184
f0b19334 185static void
186configDoConfigure(void)
187{
188 LOCAL_ARRAY(char, buf, BUFSIZ);
189 memset(&Config2, '\0', sizeof(SquidConfig2));
270b86af 190 /* Sanity checks */
a95856a0 191 if (Config.cacheSwap.swapDirs == NULL)
192 fatal("No cache_dir's specified in config file");
f0b19334 193 if (Config.Swap.maxSize < (Config.Mem.maxSize >> 10))
194 fatal("cache_swap is lower than cache_mem");
f1dc9b30 195 if (Config.Announce.period < 1) {
196 Config.Announce.period = 86400 * 365; /* one year */
17a0a4ee 197 Config.onoff.announce = 0;
270b86af 198 }
f0b19334 199 if (Config.dnsChildren < 1)
200 fatal("No dnsservers allocated");
201 if (Config.dnsChildren > DefaultDnsChildrenMax) {
202 debug(3, 0) ("WARNING: dns_children was set to a bad value: %d\n",
270b86af 203 Config.dnsChildren);
f0b19334 204 debug(3, 0) ("Setting it to the maximum (%d).\n",
205 DefaultDnsChildrenMax);
270b86af 206 Config.dnsChildren = DefaultDnsChildrenMax;
207 }
208 if (Config.Program.redirect) {
209 if (Config.redirectChildren < 1) {
210 Config.redirectChildren = 0;
211 safe_free(Config.Program.redirect);
212 } else if (Config.redirectChildren > DefaultRedirectChildrenMax) {
f0b19334 213 debug(3, 0) ("WARNING: redirect_children was set to a bad value: %d\n",
270b86af 214 Config.redirectChildren);
f0b19334 215 debug(3, 0) ("Setting it to the maximum (%d).\n", DefaultRedirectChildrenMax);
270b86af 216 Config.redirectChildren = DefaultRedirectChildrenMax;
217 }
fea2e6e0 218 }
f1dc9b30 219 if (Config.Accel.host) {
a47b9029 220 snprintf(buf, BUFSIZ, "http://%s:%d", Config.Accel.host, Config.Accel.port);
221 Config2.Accel.prefix = xstrdup(buf);
222 Config2.Accel.on = 1;
f1dc9b30 223 }
224 if (Config.appendDomain)
225 if (*Config.appendDomain != '.')
226 fatal("append_domain must begin with a '.'");
270b86af 227 if (Config.errHtmlText == NULL)
228 Config.errHtmlText = xstrdup(null_string);
229 storeConfigure();
f1dc9b30 230 if (Config2.Accel.on && !strcmp(Config.Accel.host, "virtual"))
270b86af 231 vhost_mode = 1;
232 if (Config.Port.http == NULL)
233 fatal("No http_port specified!");
042461c3 234 snprintf(ThisCache, SQUIDHOSTNAMELEN << 1, "%s:%d (Squid/%s)",
270b86af 235 getMyHostname(),
236 (int) Config.Port.http->i,
237 SQUID_VERSION);
238 if (!Config.udpMaxHitObjsz || Config.udpMaxHitObjsz > SQUID_UDP_SO_SNDBUF)
239 Config.udpMaxHitObjsz = SQUID_UDP_SO_SNDBUF;
240 if (Config.appendDomain)
241 Config.appendDomainLen = strlen(Config.appendDomain);
242 else
243 Config.appendDomainLen = 0;
f1dc9b30 244 safe_free(debug_options)
245 debug_options = xstrdup(Config.debugOptions);
22c653cd 246 if (Config.retry.timeout < 5)
247 fatal("minimum_retry_timeout must be at least 5 seconds");
248 if (Config.retry.maxtries > 10)
249 fatal("maximum_single_addr_tries cannot be larger than 10");
250 if (Config.retry.maxtries < 1) {
22c653cd 251 debug(3, 0) ("WARNING: resetting 'maximum_single_addr_tries to 1\n");
5210854d 252 Config.retry.maxtries = 1;
253 }
254 if (Config.referenceAge < 300) {
255 debug(3, 0) ("WARNING: resetting 'reference_age' to 1 week\n");
256 Config.referenceAge = 86400 * 7;
22c653cd 257 }
f0b19334 258 requirePathnameExists("MIME Config Table", Config.mimeTablePathname);
259 requirePathnameExists("cache_dns_program", Config.Program.dnsserver);
260 requirePathnameExists("unlinkd_program", Config.Program.unlinkd);
261 if (Config.Program.redirect)
262 requirePathnameExists("redirect_program", Config.Program.redirect);
263 requirePathnameExists("announce_file", Config.Announce.file);
264 requirePathnameExists("Icon Directory", Config.icons.directory);
265 requirePathnameExists("Error Directory", Config.errorDirectory);
090089c4 266}
267
270b86af 268/* Parse a time specification from the config file. Store the
f1dc9b30 269 * result in 'tptr', after converting it to 'units' */
8203a132 270static void
a47b9029 271parseTimeLine(time_t * tptr, const char *units)
090089c4 272{
273 char *token;
270b86af 274 double d;
f1dc9b30 275 time_t m;
276 time_t u;
270b86af 277 if ((u = parseTimeUnits(units)) == 0)
3003c0f3 278 self_destruct();
270b86af 279 if ((token = strtok(NULL, w_space)) == NULL)
3003c0f3 280 self_destruct();
270b86af 281 d = atof(token);
282 m = u; /* default to 'units' if none specified */
9e975e4e 283 if ((token = strtok(NULL, w_space)) == NULL)
a47b9029 284 debug(3, 0) ("WARNING: No units on '%s', assuming %f %s\n",
285 config_input_line, d, units);
9e975e4e 286 else if ((m = parseTimeUnits(token)) == 0)
a47b9029 287 self_destruct();
f1dc9b30 288 *tptr = m * d / u;
090089c4 289}
290
270b86af 291static int
292parseTimeUnits(const char *unit)
293{
294 if (!strncasecmp(unit, T_SECOND_STR, strlen(T_SECOND_STR)))
295 return 1;
296 if (!strncasecmp(unit, T_MINUTE_STR, strlen(T_MINUTE_STR)))
297 return 60;
298 if (!strncasecmp(unit, T_HOUR_STR, strlen(T_HOUR_STR)))
299 return 3600;
300 if (!strncasecmp(unit, T_DAY_STR, strlen(T_DAY_STR)))
301 return 86400;
302 if (!strncasecmp(unit, T_WEEK_STR, strlen(T_WEEK_STR)))
303 return 86400 * 7;
304 if (!strncasecmp(unit, T_FORTNIGHT_STR, strlen(T_FORTNIGHT_STR)))
305 return 86400 * 14;
306 if (!strncasecmp(unit, T_MONTH_STR, strlen(T_MONTH_STR)))
307 return 86400 * 30;
308 if (!strncasecmp(unit, T_YEAR_STR, strlen(T_YEAR_STR)))
309 return 86400 * 365.2522;
310 if (!strncasecmp(unit, T_DECADE_STR, strlen(T_DECADE_STR)))
311 return 86400 * 365.2522 * 10;
312 debug(3, 1) ("parseTimeUnits: unknown time unit '%s'\n", unit);
313 return 0;
314}
315
9906e724 316static void
9e975e4e 317parseBytesLine(size_t * bptr, const char *units)
9906e724 318{
319 char *token;
320 double d;
321 size_t m;
322 size_t u;
323 if ((u = parseBytesUnits(units)) == 0)
324 self_destruct();
325 if ((token = strtok(NULL, w_space)) == NULL)
326 self_destruct();
327 d = atof(token);
328 m = u; /* default to 'units' if none specified */
9e975e4e 329 if ((token = strtok(NULL, w_space)) == NULL)
330 debug(3, 0) ("WARNING: No units on '%s', assuming %f %s\n",
331 config_input_line, d, units);
332 else if ((m = parseBytesUnits(token)) == 0)
333 self_destruct();
9906e724 334 *bptr = m * d / u;
335}
336
337static size_t
338parseBytesUnits(const char *unit)
339{
340 if (!strncasecmp(unit, B_BYTES_STR, strlen(B_BYTES_STR)))
341 return 1;
342 if (!strncasecmp(unit, B_KBYTES_STR, strlen(B_KBYTES_STR)))
a47b9029 343 return 1 << 10;
9906e724 344 if (!strncasecmp(unit, B_MBYTES_STR, strlen(B_MBYTES_STR)))
a47b9029 345 return 1 << 20;
9906e724 346 if (!strncasecmp(unit, B_GBYTES_STR, strlen(B_GBYTES_STR)))
a47b9029 347 return 1 << 30;
9906e724 348 debug(3, 1) ("parseBytesUnits: unknown bytes unit '%s'\n", unit);
349 return 0;
350}
351
270b86af 352/*****************************************************************************
353 * Max
354 *****************************************************************************/
355
8203a132 356static void
a7d59104 357dump_acl(StoreEntry * entry, const char *name, acl * acl)
090089c4 358{
f53b06f9 359 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
090089c4 360}
361
1df370e3 362#if SQUID_SNMP
a97cfa48 363static void
be335c22 364parse_snmp_conf(snmpconf ** s)
a97cfa48 365{
be335c22 366 static char buff[256];
367 static char *tokens[10], *p;
368 if (Mib == NULL) {
369 if (Config.Snmp.mibPath)
370 init_mib(Config.Snmp.mibPath);
371 else
372 fatal("snmp_mib_path should be defined before any snmp_agent_conf\n");
373 }
374 p = strtok(NULL, null_string);
375 strcpy(buff, p);
376 tokenize(buff, tokens, 10);
be335c22 377 if (!strcmp("view", tokens[0])) {
378 if (create_view(tokens) < 0)
379 debug(49, 5) ("snmp: parse_snmpconf(): error\n");
380 } else if (!strcmp("user", tokens[0])) {
381 if (create_user(tokens) < 0)
382 debug(49, 5) ("snmp: parse_snmpconf(): error\n");
383 } else if (!strcmp("community", tokens[0])) {
384 if (create_community(tokens) < 0)
385 debug(49, 5) ("snmp: parse_snmpconf(): error\n");
386 } else
387 debug(49, 5) ("snmp: unknown directive %s\n", tokens[0]);
a97cfa48 388}
389
1df370e3 390static void
391dump_snmp_conf(StoreEntry * entry, const char *name, snmpconf * head)
392{
393 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
394}
395
396static void
397free_snmp_conf(snmpconf ** head)
398{
399 snmpconf *t;
400 while ((t = *head) != NULL) {
401 *head = t->next;
402 safe_free(t->line);
403 safe_free(t);
404 }
405}
406#endif
407
8203a132 408static void
a47b9029 409parse_acl(acl ** acl)
090089c4 410{
f1dc9b30 411 aclParseAclLine(acl);
412}
413
414static void
a47b9029 415free_acl(acl ** acl)
f1dc9b30 416{
417 aclDestroyAcls(acl);
090089c4 418}
419
8203a132 420static void
a7d59104 421dump_acl_access(StoreEntry * entry, const char *name, struct _acl_access *head)
30a4f2a8 422{
f53b06f9 423 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
30a4f2a8 424}
090089c4 425
8203a132 426static void
270b86af 427parse_acl_access(struct _acl_access **head)
090089c4 428{
270b86af 429 aclParseAccessLine(head);
090089c4 430}
431
0153d498 432static void
433free_acl_access(struct _acl_access **head)
434{
a47b9029 435 aclDestroyAccessList(head);
0153d498 436}
437
8203a132 438static void
a7d59104 439dump_address(StoreEntry * entry, const char *name, struct in_addr addr)
270b86af 440{
f53b06f9 441 storeAppendPrintf(entry, "%s %s\n", name, inet_ntoa(addr));
270b86af 442}
443
444static void
445parse_address(struct in_addr *addr)
090089c4 446{
0ee4272b 447 const struct hostent *hp;
270b86af 448 char *token = strtok(NULL, w_space);
449
30a4f2a8 450 if (token == NULL)
451 self_destruct();
429fdbec 452 if (safe_inet_addr(token, addr) == 1)
453 (void) 0;
ceb8994e 454 else if ((hp = gethostbyname(token))) /* dont use ipcache */
1d73e33a 455 *addr = inaddrFromHostent(hp);
30a4f2a8 456 else
3003c0f3 457 self_destruct();
090089c4 458}
459
0153d498 460static void
461free_address(struct in_addr *addr)
462{
a47b9029 463 memset(addr, '\0', sizeof(struct in_addr));
0153d498 464}
465
e90100aa 466static void
f53b06f9 467dump_cachedir(StoreEntry * entry, const char *name, struct _cacheSwap swap)
e90100aa 468{
f53b06f9 469 SwapDir *s;
470 int i;
a7d59104 471 for (i = 0; i < swap.n_configured; i++) {
472 s = swap.swapDirs + i;
f53b06f9 473 storeAppendPrintf(entry, "%s %s %d %d %d\n",
474 name,
475 s->path,
a7d59104 476 s->max_size >> 10,
f53b06f9 477 s->l1,
478 s->l2);
479 }
480}
481
482static int
483check_null_cachedir(struct _cacheSwap swap)
484{
485 return swap.swapDirs == NULL;
e90100aa 486}
487
8203a132 488static void
f1dc9b30 489parse_cachedir(struct _cacheSwap *swap)
090089c4 490{
491 char *token;
7da279d6 492 char *path;
752c3b27 493 int i;
270b86af 494 int size;
495 int l1;
496 int l2;
497 int readonly = 0;
f1dc9b30 498 SwapDir *tmp = NULL;
499 if ((path = strtok(NULL, w_space)) == NULL)
752c3b27 500 self_destruct();
270b86af 501 GetInteger(i);
502 size = i << 10; /* Mbytes to kbytes */
270b86af 503 GetInteger(i);
504 l1 = i;
505 GetInteger(i);
506 l2 = i;
507 if ((token = strtok(NULL, w_space)))
508 if (!strcasecmp(token, "read-only"))
509 readonly = 1;
f1dc9b30 510 for (i = 0; i < swap->n_configured; i++) {
a47b9029 511 tmp = swap->swapDirs + i;
f1dc9b30 512 if (!strcmp(path, tmp->path)) {
513 /* just reconfigure it */
860ee7e3 514 if (size == tmp->max_size)
be335c22 515 debug(3, 1) ("Cache dir '%s' size remains unchanged at %d MB\n",
516 path, size);
860ee7e3 517 else
be335c22 518 debug(3, 1) ("Cache dir '%s' size changed to %d MB\n",
519 path, size);
a47b9029 520 tmp->max_size = size;
860ee7e3 521 if (tmp->read_only != readonly)
be335c22 522 debug(3, 1) ("Cache dir '%s' now %s\n",
523 readonly ? "Read-Only" : "Read-Write");
a47b9029 524 tmp->read_only = readonly;
f1dc9b30 525 return;
526 }
527 }
528 if (swap->swapDirs == NULL) {
529 swap->n_allocated = 4;
530 swap->swapDirs = xcalloc(swap->n_allocated, sizeof(SwapDir));
531 }
532 if (swap->n_allocated == swap->n_configured) {
533 swap->n_allocated <<= 1;
534 tmp = xcalloc(swap->n_allocated, sizeof(SwapDir));
535 xmemcpy(tmp, swap->swapDirs, swap->n_configured * sizeof(SwapDir));
536 xfree(swap->swapDirs);
537 swap->swapDirs = tmp;
538 }
f1dc9b30 539 tmp = swap->swapDirs + swap->n_configured;
540 tmp->path = xstrdup(path);
541 tmp->max_size = size;
542 tmp->l1 = l1;
543 tmp->l2 = l2;
544 tmp->read_only = readonly;
545 tmp->map = file_map_create(MAX_FILES_PER_DIR);
546 tmp->swaplog_fd = -1;
62607543 547 swap->n_configured++;
9906e724 548 Config.Swap.maxSize += size;
752c3b27 549}
550
8203a132 551static void
f1dc9b30 552free_cachedir(struct _cacheSwap *swap)
553{
a47b9029 554 SwapDir *s;
555 int i;
860ee7e3 556 /* DON'T FREE THESE FOR RECONFIGURE */
557 if (reconfigure_pending)
558 return;
a47b9029 559 for (i = 0; i < swap->n_configured; i++) {
560 s = swap->swapDirs + i;
f150dd4b 561 if (s->swaplog_fd > -1) {
562 file_close(s->swaplog_fd);
563 s->swaplog_fd = -1;
564 }
a47b9029 565 xfree(s->path);
566 filemapFreeMemory(s->map);
567 }
568 safe_free(swap->swapDirs);
569 swap->swapDirs = NULL;
570 swap->n_allocated = 0;
571 swap->n_configured = 0;
f1dc9b30 572}
573
574static void
a7d59104 575dump_peer(StoreEntry * entry, const char *name, peer * p)
98ffb7e4 576{
f53b06f9 577 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
98ffb7e4 578}
579
8203a132 580static void
40a1495e 581parse_peer(peer ** head)
7813c6d5 582{
270b86af 583 char *token = NULL;
40a1495e 584 peer *p;
7813c6d5 585 int i;
40a1495e 586 ushortlist *u;
f9e5a344 587 const char *me = null_string; /* XXX */
40a1495e 588 p = xcalloc(1, sizeof(peer));
589 p->http_port = CACHE_HTTP_PORT;
590 p->icp_port = CACHE_ICP_PORT;
591 p->weight = 1;
e481c2dc 592 if ((token = strtok(NULL, w_space)) == NULL)
270b86af 593 self_destruct();
40a1495e 594 p->host = xstrdup(token);
e481c2dc 595 if ((token = strtok(NULL, w_space)) == NULL)
270b86af 596 self_destruct();
40a1495e 597 p->type = parseNeighborType(token);
270b86af 598 GetInteger(i);
40a1495e 599 p->http_port = (u_short) i;
7813c6d5 600 GetInteger(i);
40a1495e 601 p->icp_port = (u_short) i;
602 if (strcmp(p->host, me) == 0) {
603 for (u = Config.Port.http; u; u = u->next) {
604 if (p->http_port != u->i)
605 continue;
606 debug(15, 0) ("parse_peer: Peer looks like myself: %s %s/%d/%d\n",
607 p->type, p->host, p->http_port, p->icp_port);
608 self_destruct();
609 }
610 }
270b86af 611 while ((token = strtok(NULL, w_space))) {
612 if (!strcasecmp(token, "proxy-only")) {
40a1495e 613 p->options |= NEIGHBOR_PROXY_ONLY;
270b86af 614 } else if (!strcasecmp(token, "no-query")) {
40a1495e 615 p->options |= NEIGHBOR_NO_QUERY;
270b86af 616 } else if (!strcasecmp(token, "multicast-responder")) {
40a1495e 617 p->options |= NEIGHBOR_MCAST_RESPONDER;
270b86af 618 } else if (!strncasecmp(token, "weight=", 7)) {
40a1495e 619 p->weight = atoi(token + 7);
b3264694 620 } else if (!strncasecmp(token, "closest-only", 12)) {
621 p->options |= NEIGHBOR_CLOSEST_ONLY;
270b86af 622 } else if (!strncasecmp(token, "ttl=", 4)) {
40a1495e 623 p->mcast.ttl = atoi(token + 4);
624 if (p->mcast.ttl < 0)
625 p->mcast.ttl = 0;
626 if (p->mcast.ttl > 128)
627 p->mcast.ttl = 128;
270b86af 628 } else if (!strncasecmp(token, "default", 7)) {
40a1495e 629 p->options |= NEIGHBOR_DEFAULT_PARENT;
270b86af 630 } else if (!strncasecmp(token, "round-robin", 11)) {
40a1495e 631 p->options |= NEIGHBOR_ROUNDROBIN;
270b86af 632 } else {
40a1495e 633 debug(3, 0) ("parse_peer: token='%s'\n", token);
270b86af 634 self_destruct();
635 }
636 }
40a1495e 637 if (p->weight < 1)
638 p->weight = 1;
639 p->icp_version = ICP_VERSION_CURRENT;
640 p->tcp_up = 1;
641 cbdataAdd(p);
0153d498 642 while (*head != NULL)
643 head = &(*head)->next;
644 *head = p;
40a1495e 645 Config.npeers++;
0153d498 646}
647
648static void
40a1495e 649free_peer(peer ** P)
0153d498 650{
40a1495e 651 peer *p;
79d39a72 652 while ((p = *P) != NULL) {
a47b9029 653 *P = p->next;
40a1495e 654 peerDestroy(p);
a47b9029 655 }
270b86af 656}
657
658static void
a7d59104 659dump_cachemgrpasswd(StoreEntry * entry, const char *name, cachemgr_passwd * list)
270b86af 660{
f53b06f9 661 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 662}
663
664static void
a47b9029 665parse_cachemgrpasswd(cachemgr_passwd ** head)
270b86af 666{
667 char *passwd = NULL;
668 wordlist *actions = NULL;
669 parse_string(&passwd);
670 parse_wordlist(&actions);
f1dc9b30 671 objcachePasswdAdd(head, passwd, actions);
270b86af 672 wordlistDestroy(&actions);
673}
674
675static void
a47b9029 676free_cachemgrpasswd(cachemgr_passwd ** head)
270b86af 677{
a47b9029 678 cachemgr_passwd *p;
79d39a72 679 while ((p = *head) != NULL) {
a47b9029 680 *head = p->next;
681 xfree(p->passwd);
682 xfree(p);
683 }
270b86af 684}
685
270b86af 686
8203a132 687static void
a7d59104 688dump_denyinfo(StoreEntry * entry, const char *name, struct _acl_deny_info_list *var)
270b86af 689{
f53b06f9 690 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 691}
692
693static void
f1dc9b30 694parse_denyinfo(struct _acl_deny_info_list **var)
6e40f263 695{
f1dc9b30 696 aclParseDenyInfoLine(var);
6e40f263 697}
403279e0 698
1273d501 699void
a47b9029 700free_denyinfo(acl_deny_info_list ** list)
3c5557f9 701{
1273d501 702 struct _acl_deny_info_list *a = NULL;
703 struct _acl_deny_info_list *a_next = NULL;
704 struct _acl_name_list *l = NULL;
705 struct _acl_name_list *l_next = NULL;
706 for (a = *list; a; a = a_next) {
a47b9029 707 for (l = a->acl_list; l; l = l_next) {
708 l_next = l->next;
709 safe_free(l);
710 }
711 a_next = a->next;
712 safe_free(a);
1273d501 713 }
714 *list = NULL;
270b86af 715}
716
717static void
f1dc9b30 718parse_peeracl(void)
270b86af 719{
720 char *host = NULL;
721 char *aclname = NULL;
722 if (!(host = strtok(NULL, w_space)))
723 self_destruct();
f1dc9b30 724 while ((aclname = strtok(NULL, list_sep))) {
40a1495e 725 peer *p;
f1dc9b30 726 acl_list *L = NULL;
727 acl_list **Tail = NULL;
728 acl *a = NULL;
40a1495e 729 if ((p = peerFindByName(host)) == NULL) {
43c3424b 730 debug(15, 0) ("%s, line %d: No cache_peer '%s'\n",
f1dc9b30 731 cfg_filename, config_lineno, host);
732 return;
733 }
734 L = xcalloc(1, sizeof(struct _acl_list));
735 L->op = 1;
736 if (*aclname == '!') {
737 L->op = 0;
738 aclname++;
739 }
740 debug(15, 3) ("neighborAddAcl: looking for ACL name '%s'\n", aclname);
741 a = aclFindByName(aclname);
742 if (a == NULL) {
743 debug(15, 0) ("%s line %d: %s\n",
744 cfg_filename, config_lineno, config_input_line);
745 debug(15, 0) ("neighborAddAcl: ACL name '%s' not found.\n", aclname);
746 xfree(L);
747 return;
748 }
749 L->acl = a;
750 for (Tail = &p->acls; *Tail; Tail = &(*Tail)->next);
751 *Tail = L;
752 }
270b86af 753}
754
270b86af 755static void
756parse_hostdomain(void)
757{
758 char *host = NULL;
759 char *domain = NULL;
760 if (!(host = strtok(NULL, w_space)))
761 self_destruct();
f1dc9b30 762 while ((domain = strtok(NULL, list_sep))) {
763 domain_ping *l = NULL;
764 domain_ping **L = NULL;
40a1495e 765 peer *p;
766 if ((p = peerFindByName(host)) == NULL) {
43c3424b 767 debug(15, 0) ("%s, line %d: No cache_peer '%s'\n",
f1dc9b30 768 cfg_filename, config_lineno, host);
769 continue;
770 }
771 l = xcalloc(1, sizeof(struct _domain_ping));
772 l->do_ping = 1;
773 if (*domain == '!') { /* check for !.edu */
774 l->do_ping = 0;
775 domain++;
776 }
777 l->domain = xstrdup(domain);
778 for (L = &(p->pinglist); *L; L = &((*L)->next));
779 *L = l;
780 }
270b86af 781}
782
783static void
784parse_hostdomaintype(void)
785{
786 char *host = NULL;
787 char *type = NULL;
788 char *domain = NULL;
789 if (!(host = strtok(NULL, w_space)))
790 self_destruct();
791 if (!(type = strtok(NULL, w_space)))
792 self_destruct();
f1dc9b30 793 while ((domain = strtok(NULL, list_sep))) {
794 domain_type *l = NULL;
795 domain_type **L = NULL;
40a1495e 796 peer *p;
797 if ((p = peerFindByName(host)) == NULL) {
43c3424b 798 debug(15, 0) ("%s, line %d: No cache_peer '%s'\n",
f1dc9b30 799 cfg_filename, config_lineno, host);
800 return;
801 }
802 l = xcalloc(1, sizeof(struct _domain_type));
803 l->type = parseNeighborType(type);
804 l->domain = xstrdup(domain);
805 for (L = &(p->typelist); *L; L = &((*L)->next));
806 *L = l;
807 }
270b86af 808}
809
810static void
a7d59104 811dump_httpanonymizer(StoreEntry * entry, const char *name, int var)
270b86af 812{
813 switch (var) {
814 case ANONYMIZER_NONE:
f0b19334 815 storeAppendPrintf(entry, "%s off\n", name);
270b86af 816 break;
817 case ANONYMIZER_STANDARD:
f0b19334 818 storeAppendPrintf(entry, "%s paranoid\n", name);
270b86af 819 break;
820 case ANONYMIZER_PARANOID:
f0b19334 821 storeAppendPrintf(entry, "%s standard\n", name);
270b86af 822 break;
823 }
824}
825
826static void
827parse_httpanonymizer(int *var)
fa562c67 828{
829 char *token;
830 token = strtok(NULL, w_space);
831 if (token == NULL)
bba6fa8f 832 self_destruct();
fa562c67 833 if (!strcasecmp(token, "off"))
270b86af 834 *var = ANONYMIZER_NONE;
fa562c67 835 else if (!strcasecmp(token, "paranoid"))
270b86af 836 *var = ANONYMIZER_PARANOID;
fa562c67 837 else
270b86af 838 *var = ANONYMIZER_STANDARD;
839}
840
641941c0 841
270b86af 842static void
a7d59104 843dump_ushortlist(StoreEntry * entry, const char *name, ushortlist * u)
090089c4 844{
270b86af 845 while (u) {
f53b06f9 846 storeAppendPrintf(entry, "%s %d\n", name, (int) u->i);
270b86af 847 u = u->next;
848 }
849}
090089c4 850
f53b06f9 851static int
852check_null_ushortlist(ushortlist * u)
853{
854 return u == NULL;
855}
856
270b86af 857static void
858parse_ushortlist(ushortlist ** P)
859{
860 char *token;
861 int i;
862 ushortlist *u;
863 ushortlist **U;
864 while ((token = strtok(NULL, w_space))) {
865 if (sscanf(token, "%d", &i) != 1)
866 self_destruct();
867 if (i < 0)
868 i = 0;
869 u = xcalloc(1, sizeof(ushortlist));
870 u->i = (u_short) i;
871 for (U = P; *U; U = &(*U)->next);
872 *U = u;
090089c4 873 }
270b86af 874}
090089c4 875
0153d498 876static void
a47b9029 877free_ushortlist(ushortlist ** P)
0153d498 878{
a47b9029 879 ushortlist *u;
79d39a72 880 while ((u = *P) != NULL) {
a47b9029 881 *P = u->next;
882 xfree(u);
883 }
0153d498 884}
885
270b86af 886static void
a7d59104 887dump_int(StoreEntry * entry, const char *name, int var)
270b86af 888{
f53b06f9 889 storeAppendPrintf(entry, "%s %d\n", name, var);
270b86af 890}
c1c29eb6 891
270b86af 892static void
893parse_int(int *var)
894{
895 char *token;
896 int i;
270b86af 897 GetInteger(i);
898 *var = i;
899}
090089c4 900
0153d498 901static void
902free_int(int *var)
903{
a47b9029 904 *var = 0;
0153d498 905}
906
270b86af 907static void
a7d59104 908dump_onoff(StoreEntry * entry, const char *name, int var)
270b86af 909{
f53b06f9 910 storeAppendPrintf(entry, "%s %s\n", name, var ? "on" : "off");
270b86af 911}
090089c4 912
270b86af 913static void
914parse_onoff(int *var)
915{
916 char *token = strtok(NULL, w_space);
090089c4 917
270b86af 918 if (token == NULL)
919 self_destruct();
920 if (!strcasecmp(token, "on") || !strcasecmp(token, "enable"))
921 *var = 1;
922 else
923 *var = 0;
924}
e90100aa 925
0153d498 926#define free_onoff free_int
f1dc9b30 927#define free_httpanonymizer free_int
f1dc9b30 928#define dump_eol dump_string
929#define free_eol free_string
30a4f2a8 930
270b86af 931static void
a7d59104 932dump_refreshpattern(StoreEntry * entry, const char *name, refresh_t * head)
270b86af 933{
f53b06f9 934 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 935}
090089c4 936
270b86af 937static void
f1dc9b30 938parse_refreshpattern(refresh_t ** head)
270b86af 939{
f1dc9b30 940 char *token;
941 char *pattern;
942 time_t min = 0;
943 int pct = 0;
944 time_t max = 0;
945 int i;
946 refresh_t *t;
947 regex_t comp;
948 int errcode;
949 int flags = REG_EXTENDED | REG_NOSUB;
950 if ((token = strtok(NULL, w_space)) == NULL)
951 self_destruct();
952 if (strcmp(token, "-i") == 0) {
953 flags |= REG_ICASE;
954 token = strtok(NULL, w_space);
955 } else if (strcmp(token, "+i") == 0) {
956 flags &= ~REG_ICASE;
957 token = strtok(NULL, w_space);
958 }
959 if (token == NULL)
960 self_destruct();
961 pattern = xstrdup(token);
962 GetInteger(i); /* token: min */
963 min = (time_t) (i * 60); /* convert minutes to seconds */
964 GetInteger(i); /* token: pct */
965 pct = i;
966 GetInteger(i); /* token: max */
967 max = (time_t) (i * 60); /* convert minutes to seconds */
968 if ((errcode = regcomp(&comp, pattern, flags)) != 0) {
969 char errbuf[256];
970 regerror(errcode, &comp, errbuf, sizeof errbuf);
971 debug(22, 0) ("%s line %d: %s\n",
972 cfg_filename, config_lineno, config_input_line);
973 debug(22, 0) ("refreshAddToList: Invalid regular expression '%s': %s\n",
974 pattern, errbuf);
975 return;
976 }
977 pct = pct < 0 ? 0 : pct;
978 max = max < 0 ? 0 : max;
979 t = xcalloc(1, sizeof(refresh_t));
980 t->pattern = (char *) xstrdup(pattern);
981 t->compiled_pattern = comp;
982 t->min = min;
983 t->pct = pct;
984 t->max = max;
985 t->next = NULL;
986 while (*head)
987 head = &(*head)->next;
988 *head = t;
989 safe_free(pattern);
270b86af 990}
090089c4 991
270b86af 992static void
a47b9029 993free_refreshpattern(refresh_t ** head)
270b86af 994{
f1dc9b30 995 refresh_t *t;
79d39a72 996 while ((t = *head) != NULL) {
f1dc9b30 997 *head = t->next;
998 safe_free(t->pattern);
999 regfree(&t->compiled_pattern);
1000 safe_free(t);
1001 }
270b86af 1002}
12b9e9b1 1003
270b86af 1004static void
a7d59104 1005dump_regexlist(StoreEntry * entry, const char *name, relist * var)
270b86af 1006{
f53b06f9 1007 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 1008}
cf5fd929 1009
270b86af 1010static void
1011parse_regexlist(relist ** var)
1012{
0153d498 1013 aclParseRegexList(var);
270b86af 1014}
fb263c4c 1015
270b86af 1016static void
0153d498 1017free_regexlist(relist ** var)
270b86af 1018{
0153d498 1019 aclDestroyRegexList(*var);
1020 *var = NULL;
270b86af 1021}
7d49daab 1022
270b86af 1023static void
a7d59104 1024dump_string(StoreEntry * entry, const char *name, char *var)
270b86af 1025{
f53b06f9 1026 if (var != NULL)
a7d59104 1027 storeAppendPrintf(entry, "%s %s\n", name, var);
270b86af 1028}
98ffb7e4 1029
270b86af 1030static void
0153d498 1031parse_string(char **var)
270b86af 1032{
1033 char *token = strtok(NULL, w_space);
270b86af 1034 safe_free(*var);
1035 if (token == NULL)
1036 self_destruct();
1037 *var = xstrdup(token);
1038}
b15e6857 1039
0153d498 1040static void
1041free_string(char **var)
1042{
a47b9029 1043 xfree(*var);
1044 *var = NULL;
0153d498 1045}
caebbe00 1046
270b86af 1047static void
f1dc9b30 1048parse_eol(char *volatile *var)
270b86af 1049{
1050 char *token = strtok(NULL, null_string);
270b86af 1051 safe_free(*var);
f1dc9b30 1052 if (token == NULL)
1053 self_destruct();
270b86af 1054 *var = xstrdup(token);
1055}
090089c4 1056
270b86af 1057static void
a7d59104 1058dump_time_t(StoreEntry * entry, const char *name, time_t var)
090089c4 1059{
f53b06f9 1060 storeAppendPrintf(entry, "%s %d seconds\n", name, (int) var);
090089c4 1061}
1062
270b86af 1063static void
a47b9029 1064parse_time_t(time_t * var)
0ffd22bc 1065{
f1dc9b30 1066 parseTimeLine(var, T_SECOND_STR);
0ffd22bc 1067}
1068
270b86af 1069static void
a47b9029 1070free_time_t(time_t * var)
270b86af 1071{
a47b9029 1072 *var = 0;
270b86af 1073}
9906e724 1074
1075static void
a7d59104 1076dump_size_t(StoreEntry * entry, const char *name, size_t var)
1b635117 1077{
f53b06f9 1078 storeAppendPrintf(entry, "%s %d\n", name, (int) var);
1b635117 1079}
1080
1081static void
a7d59104 1082dump_b_size_t(StoreEntry * entry, const char *name, size_t var)
9906e724 1083{
f53b06f9 1084 storeAppendPrintf(entry, "%s %d %s\n", name, (int) var, B_BYTES_STR);
9906e724 1085}
1086
1087static void
a7d59104 1088dump_kb_size_t(StoreEntry * entry, const char *name, size_t var)
9906e724 1089{
f53b06f9 1090 storeAppendPrintf(entry, "%s %d %s\n", name, (int) var, B_KBYTES_STR);
9906e724 1091}
1092
1093static void
a47b9029 1094parse_size_t(size_t * var)
1b635117 1095{
1096 char *token;
1097 int i;
1098 GetInteger(i);
1099 *var = (size_t) i;
1100}
1101
1102static void
1103parse_b_size_t(size_t * var)
9906e724 1104{
1105 parseBytesLine(var, B_BYTES_STR);
1106}
1107
1108static void
a47b9029 1109parse_kb_size_t(size_t * var)
9906e724 1110{
1111 parseBytesLine(var, B_KBYTES_STR);
1112}
1113
1114static void
a47b9029 1115free_size_t(size_t * var)
9906e724 1116{
a47b9029 1117 *var = 0;
9906e724 1118}
1119
1b635117 1120#define free_b_size_t free_size_t
9906e724 1121#define free_kb_size_t free_size_t
1122#define free_mb_size_t free_size_t
1123#define free_gb_size_t free_size_t
090089c4 1124
8203a132 1125static void
a7d59104 1126dump_ushort(StoreEntry * entry, const char *name, u_short var)
090089c4 1127{
f53b06f9 1128 storeAppendPrintf(entry, "%s %d\n", name, var);
270b86af 1129}
090089c4 1130
0153d498 1131static void
a47b9029 1132free_ushort(u_short * u)
0153d498 1133{
1134 *u = 0;
1135}
1136
270b86af 1137static void
1138parse_ushort(u_short * var)
1139{
1140 char *token;
1141 int i;
090089c4 1142
270b86af 1143 GetInteger(i);
1144 if (i < 0)
1145 i = 0;
1146 *var = (u_short) i;
090089c4 1147}
1148
270b86af 1149static void
a7d59104 1150dump_wordlist(StoreEntry * entry, const char *name, wordlist * list)
270b86af 1151{
270b86af 1152 while (list != NULL) {
f53b06f9 1153 storeAppendPrintf(entry, "%s %s\n", name, list->key);
270b86af 1154 list = list->next;
429fdbec 1155 }
429fdbec 1156}
1157
270b86af 1158static void
1159parse_wordlist(wordlist ** list)
429fdbec 1160{
270b86af 1161 char *token;
1162
1163 while ((token = strtok(NULL, w_space)))
1164 wordlistAdd(list, token);
429fdbec 1165}
270b86af 1166
0153d498 1167#define free_wordlist wordlistDestroy
270b86af 1168
1169#include "cf_parser.c"
f1dc9b30 1170
1171peer_t
1172parseNeighborType(const char *s)
1173{
1174 if (!strcasecmp(s, "parent"))
1175 return PEER_PARENT;
1176 if (!strcasecmp(s, "neighbor"))
1177 return PEER_SIBLING;
1178 if (!strcasecmp(s, "neighbour"))
1179 return PEER_SIBLING;
1180 if (!strcasecmp(s, "sibling"))
1181 return PEER_SIBLING;
1182 if (!strcasecmp(s, "multicast"))
1183 return PEER_MULTICAST;
1184 debug(15, 0) ("WARNING: Unknown neighbor type: %s\n", s);
1185 return PEER_SIBLING;
1186}
f150dd4b 1187
1188void
1189configFreeMemory(void)
1190{
23ff6968 1191 free_all();
f150dd4b 1192}
f0b19334 1193
1194static void
1195requirePathnameExists(const char *name, const char *path)
1196{
1197 struct stat sb;
1198 char buf[MAXPATHLEN];
1199 assert(path != NULL);
1200 if (stat(path, &sb) < 0) {
1201 snprintf(buf, MAXPATHLEN, "%s: %s", path, xstrerror());
1202 fatal(buf);
1203 }
1204}