]>
Commit | Line | Data |
---|---|---|
be335c22 | 1 | |
30a4f2a8 | 2 | /* |
0e7f8c14 | 3 | * $Id: cache_cf.cc,v 1.244 1998/02/05 20:32:35 wessels Exp $ |
30a4f2a8 | 4 | * |
5 | * DEBUG: section 3 Configuration File Parsing | |
6 | * AUTHOR: Harvest Derived | |
7 | * | |
42c04c16 | 8 | * SQUID Internet Object Cache http://squid.nlanr.net/Squid/ |
30a4f2a8 | 9 | * -------------------------------------------------------- |
10 | * | |
11 | * Squid is the result of efforts by numerous individuals from the | |
12 | * Internet community. Development is led by Duane Wessels of the | |
13 | * National Laboratory for Applied Network Research and funded by | |
14 | * the National Science Foundation. | |
15 | * | |
16 | * This program is free software; you can redistribute it and/or modify | |
17 | * it under the terms of the GNU General Public License as published by | |
18 | * the Free Software Foundation; either version 2 of the License, or | |
19 | * (at your option) any later version. | |
20 | * | |
21 | * This program is distributed in the hope that it will be useful, | |
22 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
23 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
24 | * GNU General Public License for more details. | |
25 | * | |
26 | * You should have received a copy of the GNU General Public License | |
27 | * along with this program; if not, write to the Free Software | |
28 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | |
29 | * | |
30 | */ | |
cf5fd929 | 31 | |
44a47c6e | 32 | #include "squid.h" |
1df370e3 | 33 | |
34 | #if SQUID_SNMP | |
a97cfa48 | 35 | #include "snmp.h" |
1df370e3 | 36 | #endif |
090089c4 | 37 | |
8813e606 | 38 | static const char *const T_SECOND_STR = "second"; |
39 | static const char *const T_MINUTE_STR = "minute"; | |
40 | static const char *const T_HOUR_STR = "hour"; | |
41 | static const char *const T_DAY_STR = "day"; | |
42 | static const char *const T_WEEK_STR = "week"; | |
43 | static const char *const T_FORTNIGHT_STR = "fortnight"; | |
44 | static const char *const T_MONTH_STR = "month"; | |
45 | static const char *const T_YEAR_STR = "year"; | |
46 | static const char *const T_DECADE_STR = "decade"; | |
aa0a0c7c | 47 | |
9906e724 | 48 | static const char *const B_BYTES_STR = "bytes"; |
49 | static const char *const B_KBYTES_STR = "KB"; | |
50 | static const char *const B_MBYTES_STR = "MB"; | |
51 | static const char *const B_GBYTES_STR = "GB"; | |
52 | ||
4db43fab | 53 | static const char *const list_sep = ", \t\n\r"; |
090089c4 | 54 | |
24382924 | 55 | static char fatal_str[BUFSIZ]; |
f5b8bbc4 | 56 | static void self_destruct(void); |
57 | static void wordlistAdd(wordlist **, const char *); | |
caebbe00 | 58 | |
f5b8bbc4 | 59 | static void configDoConfigure(void); |
1df370e3 | 60 | #if SQUID_SNMP |
a97cfa48 | 61 | static void parse_snmp_conf(snmpconf **); |
1df370e3 | 62 | #endif |
f5b8bbc4 | 63 | static void parse_refreshpattern(refresh_t **); |
64 | static int parseTimeUnits(const char *unit); | |
65 | static void parseTimeLine(time_t * tptr, const char *units); | |
66 | static void parse_string(char **); | |
67 | static void parse_wordlist(wordlist **); | |
68 | static void default_all(void); | |
69 | static void defaults_if_none(void); | |
70 | static int parse_line(char *); | |
71 | static void parseBytesLine(size_t * bptr, const char *units); | |
72 | static size_t parseBytesUnits(const char *unit); | |
f5b8bbc4 | 73 | static void free_all(void); |
f0b19334 | 74 | static void requirePathnameExists(const char *name, const char *path); |
270b86af | 75 | |
24382924 | 76 | static void |
0673c0ba | 77 | self_destruct(void) |
090089c4 | 78 | { |
56878878 | 79 | snprintf(fatal_str, BUFSIZ, "Bungled %s line %d: %s", |
b8de7ebe | 80 | cfg_filename, config_lineno, config_input_line); |
090089c4 | 81 | fatal(fatal_str); |
82 | } | |
83 | ||
8203a132 | 84 | void |
85 | wordlistDestroy(wordlist ** list) | |
0ffd22bc | 86 | { |
87 | wordlist *w = NULL; | |
79d39a72 | 88 | while ((w = *list) != NULL) { |
b5639035 | 89 | *list = w->next; |
0ffd22bc | 90 | safe_free(w->key); |
91 | safe_free(w); | |
92 | } | |
93 | *list = NULL; | |
94 | } | |
95 | ||
24382924 | 96 | static void |
fe4e214f | 97 | wordlistAdd(wordlist ** list, const char *key) |
090089c4 | 98 | { |
0ffd22bc | 99 | wordlist *p = NULL; |
100 | wordlist *q = NULL; | |
090089c4 | 101 | |
102 | if (!(*list)) { | |
103 | /* empty list */ | |
30a4f2a8 | 104 | *list = xcalloc(1, sizeof(wordlist)); |
090089c4 | 105 | (*list)->key = xstrdup(key); |
106 | (*list)->next = NULL; | |
107 | } else { | |
108 | p = *list; | |
109 | while (p->next) | |
110 | p = p->next; | |
30a4f2a8 | 111 | q = xcalloc(1, sizeof(wordlist)); |
090089c4 | 112 | q->key = xstrdup(key); |
113 | q->next = NULL; | |
114 | p->next = q; | |
115 | } | |
116 | } | |
117 | ||
8203a132 | 118 | void |
119 | intlistDestroy(intlist ** list) | |
92a6f4b1 | 120 | { |
121 | intlist *w = NULL; | |
122 | intlist *n = NULL; | |
123 | ||
124 | for (w = *list; w; w = n) { | |
125 | n = w->next; | |
126 | safe_free(w); | |
127 | } | |
128 | *list = NULL; | |
129 | } | |
130 | ||
403279e0 | 131 | |
3c5557f9 | 132 | /* |
133 | * Use this #define in all the parse*() functions. Assumes char *token is | |
134 | * defined | |
135 | */ | |
090089c4 | 136 | |
137 | #define GetInteger(var) \ | |
138 | token = strtok(NULL, w_space); \ | |
30a4f2a8 | 139 | if( token == NULL) \ |
3003c0f3 | 140 | self_destruct(); \ |
090089c4 | 141 | if (sscanf(token, "%d", &var) != 1) \ |
3003c0f3 | 142 | self_destruct(); |
090089c4 | 143 | |
270b86af | 144 | int |
145 | parseConfigFile(const char *file_name) | |
2546fcb3 | 146 | { |
270b86af | 147 | FILE *fp = NULL; |
148 | char *token = NULL; | |
72121e8b | 149 | char *tmp_line; |
0153d498 | 150 | free_all(); |
151 | default_all(); | |
270b86af | 152 | if ((fp = fopen(file_name, "r")) == NULL) { |
042461c3 | 153 | snprintf(fatal_str, BUFSIZ, "Unable to open configuration file: %s: %s", |
270b86af | 154 | file_name, xstrerror()); |
155 | fatal(fatal_str); | |
156 | } | |
157 | cfg_filename = file_name; | |
158 | if ((token = strrchr(cfg_filename, '/'))) | |
159 | cfg_filename = token + 1; | |
160 | memset(config_input_line, '\0', BUFSIZ); | |
161 | config_lineno = 0; | |
162 | while (fgets(config_input_line, BUFSIZ, fp)) { | |
163 | config_lineno++; | |
164 | if ((token = strchr(config_input_line, '\n'))) | |
165 | *token = '\0'; | |
166 | if (config_input_line[0] == '#') | |
167 | continue; | |
168 | if (config_input_line[0] == '\0') | |
169 | continue; | |
170 | debug(3, 5) ("Processing: '%s'\n", config_input_line); | |
72121e8b | 171 | tmp_line = xstrdup(config_input_line); |
270b86af | 172 | if (!parse_line(tmp_line)) { |
173 | debug(3, 0) ("parseConfigFile: line %d unrecognized: '%s'\n", | |
174 | config_lineno, | |
175 | config_input_line); | |
176 | } | |
72121e8b | 177 | safe_free(tmp_line); |
270b86af | 178 | } |
f0b19334 | 179 | fclose(fp); |
180 | defaults_if_none(); | |
181 | configDoConfigure(); | |
182 | return 0; | |
183 | } | |
270b86af | 184 | |
f0b19334 | 185 | static void |
186 | configDoConfigure(void) | |
187 | { | |
188 | LOCAL_ARRAY(char, buf, BUFSIZ); | |
189 | memset(&Config2, '\0', sizeof(SquidConfig2)); | |
270b86af | 190 | /* Sanity checks */ |
a95856a0 | 191 | if (Config.cacheSwap.swapDirs == NULL) |
192 | fatal("No cache_dir's specified in config file"); | |
f0b19334 | 193 | if (Config.Swap.maxSize < (Config.Mem.maxSize >> 10)) |
194 | fatal("cache_swap is lower than cache_mem"); | |
f1dc9b30 | 195 | if (Config.Announce.period < 1) { |
196 | Config.Announce.period = 86400 * 365; /* one year */ | |
17a0a4ee | 197 | Config.onoff.announce = 0; |
270b86af | 198 | } |
f0b19334 | 199 | if (Config.dnsChildren < 1) |
200 | fatal("No dnsservers allocated"); | |
201 | if (Config.dnsChildren > DefaultDnsChildrenMax) { | |
202 | debug(3, 0) ("WARNING: dns_children was set to a bad value: %d\n", | |
270b86af | 203 | Config.dnsChildren); |
f0b19334 | 204 | debug(3, 0) ("Setting it to the maximum (%d).\n", |
205 | DefaultDnsChildrenMax); | |
270b86af | 206 | Config.dnsChildren = DefaultDnsChildrenMax; |
207 | } | |
208 | if (Config.Program.redirect) { | |
209 | if (Config.redirectChildren < 1) { | |
210 | Config.redirectChildren = 0; | |
211 | safe_free(Config.Program.redirect); | |
212 | } else if (Config.redirectChildren > DefaultRedirectChildrenMax) { | |
f0b19334 | 213 | debug(3, 0) ("WARNING: redirect_children was set to a bad value: %d\n", |
270b86af | 214 | Config.redirectChildren); |
f0b19334 | 215 | debug(3, 0) ("Setting it to the maximum (%d).\n", DefaultRedirectChildrenMax); |
270b86af | 216 | Config.redirectChildren = DefaultRedirectChildrenMax; |
217 | } | |
fea2e6e0 | 218 | } |
f1dc9b30 | 219 | if (Config.Accel.host) { |
a47b9029 | 220 | snprintf(buf, BUFSIZ, "http://%s:%d", Config.Accel.host, Config.Accel.port); |
221 | Config2.Accel.prefix = xstrdup(buf); | |
222 | Config2.Accel.on = 1; | |
f1dc9b30 | 223 | } |
224 | if (Config.appendDomain) | |
225 | if (*Config.appendDomain != '.') | |
226 | fatal("append_domain must begin with a '.'"); | |
270b86af | 227 | if (Config.errHtmlText == NULL) |
228 | Config.errHtmlText = xstrdup(null_string); | |
229 | storeConfigure(); | |
f1dc9b30 | 230 | if (Config2.Accel.on && !strcmp(Config.Accel.host, "virtual")) |
270b86af | 231 | vhost_mode = 1; |
232 | if (Config.Port.http == NULL) | |
233 | fatal("No http_port specified!"); | |
042461c3 | 234 | snprintf(ThisCache, SQUIDHOSTNAMELEN << 1, "%s:%d (Squid/%s)", |
270b86af | 235 | getMyHostname(), |
236 | (int) Config.Port.http->i, | |
237 | SQUID_VERSION); | |
238 | if (!Config.udpMaxHitObjsz || Config.udpMaxHitObjsz > SQUID_UDP_SO_SNDBUF) | |
239 | Config.udpMaxHitObjsz = SQUID_UDP_SO_SNDBUF; | |
240 | if (Config.appendDomain) | |
241 | Config.appendDomainLen = strlen(Config.appendDomain); | |
242 | else | |
243 | Config.appendDomainLen = 0; | |
f1dc9b30 | 244 | safe_free(debug_options) |
245 | debug_options = xstrdup(Config.debugOptions); | |
22c653cd | 246 | if (Config.retry.timeout < 5) |
247 | fatal("minimum_retry_timeout must be at least 5 seconds"); | |
248 | if (Config.retry.maxtries > 10) | |
249 | fatal("maximum_single_addr_tries cannot be larger than 10"); | |
250 | if (Config.retry.maxtries < 1) { | |
22c653cd | 251 | debug(3, 0) ("WARNING: resetting 'maximum_single_addr_tries to 1\n"); |
5210854d | 252 | Config.retry.maxtries = 1; |
253 | } | |
254 | if (Config.referenceAge < 300) { | |
255 | debug(3, 0) ("WARNING: resetting 'reference_age' to 1 week\n"); | |
256 | Config.referenceAge = 86400 * 7; | |
22c653cd | 257 | } |
f0b19334 | 258 | requirePathnameExists("MIME Config Table", Config.mimeTablePathname); |
259 | requirePathnameExists("cache_dns_program", Config.Program.dnsserver); | |
260 | requirePathnameExists("unlinkd_program", Config.Program.unlinkd); | |
261 | if (Config.Program.redirect) | |
262 | requirePathnameExists("redirect_program", Config.Program.redirect); | |
263 | requirePathnameExists("announce_file", Config.Announce.file); | |
264 | requirePathnameExists("Icon Directory", Config.icons.directory); | |
265 | requirePathnameExists("Error Directory", Config.errorDirectory); | |
090089c4 | 266 | } |
267 | ||
270b86af | 268 | /* Parse a time specification from the config file. Store the |
f1dc9b30 | 269 | * result in 'tptr', after converting it to 'units' */ |
8203a132 | 270 | static void |
a47b9029 | 271 | parseTimeLine(time_t * tptr, const char *units) |
090089c4 | 272 | { |
273 | char *token; | |
270b86af | 274 | double d; |
f1dc9b30 | 275 | time_t m; |
276 | time_t u; | |
270b86af | 277 | if ((u = parseTimeUnits(units)) == 0) |
3003c0f3 | 278 | self_destruct(); |
270b86af | 279 | if ((token = strtok(NULL, w_space)) == NULL) |
3003c0f3 | 280 | self_destruct(); |
270b86af | 281 | d = atof(token); |
282 | m = u; /* default to 'units' if none specified */ | |
9e975e4e | 283 | if ((token = strtok(NULL, w_space)) == NULL) |
a47b9029 | 284 | debug(3, 0) ("WARNING: No units on '%s', assuming %f %s\n", |
285 | config_input_line, d, units); | |
9e975e4e | 286 | else if ((m = parseTimeUnits(token)) == 0) |
a47b9029 | 287 | self_destruct(); |
f1dc9b30 | 288 | *tptr = m * d / u; |
090089c4 | 289 | } |
290 | ||
270b86af | 291 | static int |
292 | parseTimeUnits(const char *unit) | |
293 | { | |
294 | if (!strncasecmp(unit, T_SECOND_STR, strlen(T_SECOND_STR))) | |
295 | return 1; | |
296 | if (!strncasecmp(unit, T_MINUTE_STR, strlen(T_MINUTE_STR))) | |
297 | return 60; | |
298 | if (!strncasecmp(unit, T_HOUR_STR, strlen(T_HOUR_STR))) | |
299 | return 3600; | |
300 | if (!strncasecmp(unit, T_DAY_STR, strlen(T_DAY_STR))) | |
301 | return 86400; | |
302 | if (!strncasecmp(unit, T_WEEK_STR, strlen(T_WEEK_STR))) | |
303 | return 86400 * 7; | |
304 | if (!strncasecmp(unit, T_FORTNIGHT_STR, strlen(T_FORTNIGHT_STR))) | |
305 | return 86400 * 14; | |
306 | if (!strncasecmp(unit, T_MONTH_STR, strlen(T_MONTH_STR))) | |
307 | return 86400 * 30; | |
308 | if (!strncasecmp(unit, T_YEAR_STR, strlen(T_YEAR_STR))) | |
309 | return 86400 * 365.2522; | |
310 | if (!strncasecmp(unit, T_DECADE_STR, strlen(T_DECADE_STR))) | |
311 | return 86400 * 365.2522 * 10; | |
312 | debug(3, 1) ("parseTimeUnits: unknown time unit '%s'\n", unit); | |
313 | return 0; | |
314 | } | |
315 | ||
9906e724 | 316 | static void |
9e975e4e | 317 | parseBytesLine(size_t * bptr, const char *units) |
9906e724 | 318 | { |
319 | char *token; | |
320 | double d; | |
321 | size_t m; | |
322 | size_t u; | |
323 | if ((u = parseBytesUnits(units)) == 0) | |
324 | self_destruct(); | |
325 | if ((token = strtok(NULL, w_space)) == NULL) | |
326 | self_destruct(); | |
327 | d = atof(token); | |
328 | m = u; /* default to 'units' if none specified */ | |
9e975e4e | 329 | if ((token = strtok(NULL, w_space)) == NULL) |
330 | debug(3, 0) ("WARNING: No units on '%s', assuming %f %s\n", | |
331 | config_input_line, d, units); | |
332 | else if ((m = parseBytesUnits(token)) == 0) | |
333 | self_destruct(); | |
9906e724 | 334 | *bptr = m * d / u; |
335 | } | |
336 | ||
337 | static size_t | |
338 | parseBytesUnits(const char *unit) | |
339 | { | |
340 | if (!strncasecmp(unit, B_BYTES_STR, strlen(B_BYTES_STR))) | |
341 | return 1; | |
342 | if (!strncasecmp(unit, B_KBYTES_STR, strlen(B_KBYTES_STR))) | |
a47b9029 | 343 | return 1 << 10; |
9906e724 | 344 | if (!strncasecmp(unit, B_MBYTES_STR, strlen(B_MBYTES_STR))) |
a47b9029 | 345 | return 1 << 20; |
9906e724 | 346 | if (!strncasecmp(unit, B_GBYTES_STR, strlen(B_GBYTES_STR))) |
a47b9029 | 347 | return 1 << 30; |
9906e724 | 348 | debug(3, 1) ("parseBytesUnits: unknown bytes unit '%s'\n", unit); |
349 | return 0; | |
350 | } | |
351 | ||
270b86af | 352 | /***************************************************************************** |
353 | * Max | |
354 | *****************************************************************************/ | |
355 | ||
8203a132 | 356 | static void |
a7d59104 | 357 | dump_acl(StoreEntry * entry, const char *name, acl * acl) |
090089c4 | 358 | { |
f53b06f9 | 359 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
090089c4 | 360 | } |
361 | ||
1df370e3 | 362 | #if SQUID_SNMP |
a97cfa48 | 363 | static void |
be335c22 | 364 | parse_snmp_conf(snmpconf ** s) |
a97cfa48 | 365 | { |
be335c22 | 366 | static char buff[256]; |
367 | static char *tokens[10], *p; | |
368 | if (Mib == NULL) { | |
369 | if (Config.Snmp.mibPath) | |
370 | init_mib(Config.Snmp.mibPath); | |
371 | else | |
372 | fatal("snmp_mib_path should be defined before any snmp_agent_conf\n"); | |
373 | } | |
374 | p = strtok(NULL, null_string); | |
0e7f8c14 | 375 | xstrncpy(buff, p, 256); |
be335c22 | 376 | tokenize(buff, tokens, 10); |
be335c22 | 377 | if (!strcmp("view", tokens[0])) { |
378 | if (create_view(tokens) < 0) | |
379 | debug(49, 5) ("snmp: parse_snmpconf(): error\n"); | |
380 | } else if (!strcmp("user", tokens[0])) { | |
381 | if (create_user(tokens) < 0) | |
382 | debug(49, 5) ("snmp: parse_snmpconf(): error\n"); | |
383 | } else if (!strcmp("community", tokens[0])) { | |
384 | if (create_community(tokens) < 0) | |
385 | debug(49, 5) ("snmp: parse_snmpconf(): error\n"); | |
386 | } else | |
387 | debug(49, 5) ("snmp: unknown directive %s\n", tokens[0]); | |
a97cfa48 | 388 | } |
389 | ||
1df370e3 | 390 | static void |
391 | dump_snmp_conf(StoreEntry * entry, const char *name, snmpconf * head) | |
392 | { | |
393 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); | |
394 | } | |
395 | ||
396 | static void | |
397 | free_snmp_conf(snmpconf ** head) | |
398 | { | |
399 | snmpconf *t; | |
400 | while ((t = *head) != NULL) { | |
401 | *head = t->next; | |
402 | safe_free(t->line); | |
403 | safe_free(t); | |
404 | } | |
405 | } | |
406 | #endif | |
407 | ||
8203a132 | 408 | static void |
a47b9029 | 409 | parse_acl(acl ** acl) |
090089c4 | 410 | { |
f1dc9b30 | 411 | aclParseAclLine(acl); |
412 | } | |
413 | ||
414 | static void | |
a47b9029 | 415 | free_acl(acl ** acl) |
f1dc9b30 | 416 | { |
417 | aclDestroyAcls(acl); | |
090089c4 | 418 | } |
419 | ||
8203a132 | 420 | static void |
a7d59104 | 421 | dump_acl_access(StoreEntry * entry, const char *name, struct _acl_access *head) |
30a4f2a8 | 422 | { |
f53b06f9 | 423 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
30a4f2a8 | 424 | } |
090089c4 | 425 | |
8203a132 | 426 | static void |
270b86af | 427 | parse_acl_access(struct _acl_access **head) |
090089c4 | 428 | { |
270b86af | 429 | aclParseAccessLine(head); |
090089c4 | 430 | } |
431 | ||
0153d498 | 432 | static void |
433 | free_acl_access(struct _acl_access **head) | |
434 | { | |
a47b9029 | 435 | aclDestroyAccessList(head); |
0153d498 | 436 | } |
437 | ||
8203a132 | 438 | static void |
a7d59104 | 439 | dump_address(StoreEntry * entry, const char *name, struct in_addr addr) |
270b86af | 440 | { |
f53b06f9 | 441 | storeAppendPrintf(entry, "%s %s\n", name, inet_ntoa(addr)); |
270b86af | 442 | } |
443 | ||
444 | static void | |
445 | parse_address(struct in_addr *addr) | |
090089c4 | 446 | { |
0ee4272b | 447 | const struct hostent *hp; |
270b86af | 448 | char *token = strtok(NULL, w_space); |
449 | ||
30a4f2a8 | 450 | if (token == NULL) |
451 | self_destruct(); | |
429fdbec | 452 | if (safe_inet_addr(token, addr) == 1) |
453 | (void) 0; | |
ceb8994e | 454 | else if ((hp = gethostbyname(token))) /* dont use ipcache */ |
1d73e33a | 455 | *addr = inaddrFromHostent(hp); |
30a4f2a8 | 456 | else |
3003c0f3 | 457 | self_destruct(); |
090089c4 | 458 | } |
459 | ||
0153d498 | 460 | static void |
461 | free_address(struct in_addr *addr) | |
462 | { | |
a47b9029 | 463 | memset(addr, '\0', sizeof(struct in_addr)); |
0153d498 | 464 | } |
465 | ||
e90100aa | 466 | static void |
f53b06f9 | 467 | dump_cachedir(StoreEntry * entry, const char *name, struct _cacheSwap swap) |
e90100aa | 468 | { |
f53b06f9 | 469 | SwapDir *s; |
470 | int i; | |
a7d59104 | 471 | for (i = 0; i < swap.n_configured; i++) { |
472 | s = swap.swapDirs + i; | |
f53b06f9 | 473 | storeAppendPrintf(entry, "%s %s %d %d %d\n", |
474 | name, | |
475 | s->path, | |
a7d59104 | 476 | s->max_size >> 10, |
f53b06f9 | 477 | s->l1, |
478 | s->l2); | |
479 | } | |
480 | } | |
481 | ||
482 | static int | |
483 | check_null_cachedir(struct _cacheSwap swap) | |
484 | { | |
485 | return swap.swapDirs == NULL; | |
e90100aa | 486 | } |
487 | ||
53ad48e6 | 488 | static int |
489 | check_null_string(char *s) | |
490 | { | |
491 | return s == NULL; | |
492 | } | |
493 | ||
8203a132 | 494 | static void |
f1dc9b30 | 495 | parse_cachedir(struct _cacheSwap *swap) |
090089c4 | 496 | { |
497 | char *token; | |
7da279d6 | 498 | char *path; |
752c3b27 | 499 | int i; |
270b86af | 500 | int size; |
501 | int l1; | |
502 | int l2; | |
503 | int readonly = 0; | |
f1dc9b30 | 504 | SwapDir *tmp = NULL; |
505 | if ((path = strtok(NULL, w_space)) == NULL) | |
752c3b27 | 506 | self_destruct(); |
270b86af | 507 | GetInteger(i); |
508 | size = i << 10; /* Mbytes to kbytes */ | |
893dbb06 | 509 | if (size <= 0) |
510 | fatal("parse_cachedir: invalid size value"); | |
270b86af | 511 | GetInteger(i); |
512 | l1 = i; | |
893dbb06 | 513 | if (l1 <= 0) |
514 | fatal("parse_cachedir: invalid level 1 directories value"); | |
270b86af | 515 | GetInteger(i); |
516 | l2 = i; | |
893dbb06 | 517 | if (l2 <= 0) |
518 | fatal("parse_cachedir: invalid level 2 directories value"); | |
270b86af | 519 | if ((token = strtok(NULL, w_space))) |
520 | if (!strcasecmp(token, "read-only")) | |
521 | readonly = 1; | |
f1dc9b30 | 522 | for (i = 0; i < swap->n_configured; i++) { |
a47b9029 | 523 | tmp = swap->swapDirs + i; |
f1dc9b30 | 524 | if (!strcmp(path, tmp->path)) { |
525 | /* just reconfigure it */ | |
860ee7e3 | 526 | if (size == tmp->max_size) |
be335c22 | 527 | debug(3, 1) ("Cache dir '%s' size remains unchanged at %d MB\n", |
528 | path, size); | |
860ee7e3 | 529 | else |
be335c22 | 530 | debug(3, 1) ("Cache dir '%s' size changed to %d MB\n", |
531 | path, size); | |
a47b9029 | 532 | tmp->max_size = size; |
860ee7e3 | 533 | if (tmp->read_only != readonly) |
be335c22 | 534 | debug(3, 1) ("Cache dir '%s' now %s\n", |
535 | readonly ? "Read-Only" : "Read-Write"); | |
a47b9029 | 536 | tmp->read_only = readonly; |
f1dc9b30 | 537 | return; |
538 | } | |
539 | } | |
540 | if (swap->swapDirs == NULL) { | |
541 | swap->n_allocated = 4; | |
542 | swap->swapDirs = xcalloc(swap->n_allocated, sizeof(SwapDir)); | |
543 | } | |
544 | if (swap->n_allocated == swap->n_configured) { | |
545 | swap->n_allocated <<= 1; | |
546 | tmp = xcalloc(swap->n_allocated, sizeof(SwapDir)); | |
547 | xmemcpy(tmp, swap->swapDirs, swap->n_configured * sizeof(SwapDir)); | |
548 | xfree(swap->swapDirs); | |
549 | swap->swapDirs = tmp; | |
550 | } | |
f1dc9b30 | 551 | tmp = swap->swapDirs + swap->n_configured; |
552 | tmp->path = xstrdup(path); | |
553 | tmp->max_size = size; | |
554 | tmp->l1 = l1; | |
555 | tmp->l2 = l2; | |
556 | tmp->read_only = readonly; | |
557 | tmp->map = file_map_create(MAX_FILES_PER_DIR); | |
558 | tmp->swaplog_fd = -1; | |
62607543 | 559 | swap->n_configured++; |
9906e724 | 560 | Config.Swap.maxSize += size; |
752c3b27 | 561 | } |
562 | ||
8203a132 | 563 | static void |
f1dc9b30 | 564 | free_cachedir(struct _cacheSwap *swap) |
565 | { | |
a47b9029 | 566 | SwapDir *s; |
567 | int i; | |
860ee7e3 | 568 | /* DON'T FREE THESE FOR RECONFIGURE */ |
569 | if (reconfigure_pending) | |
570 | return; | |
a47b9029 | 571 | for (i = 0; i < swap->n_configured; i++) { |
572 | s = swap->swapDirs + i; | |
f150dd4b | 573 | if (s->swaplog_fd > -1) { |
574 | file_close(s->swaplog_fd); | |
575 | s->swaplog_fd = -1; | |
576 | } | |
a47b9029 | 577 | xfree(s->path); |
578 | filemapFreeMemory(s->map); | |
579 | } | |
580 | safe_free(swap->swapDirs); | |
581 | swap->swapDirs = NULL; | |
582 | swap->n_allocated = 0; | |
583 | swap->n_configured = 0; | |
f1dc9b30 | 584 | } |
585 | ||
586 | static void | |
a7d59104 | 587 | dump_peer(StoreEntry * entry, const char *name, peer * p) |
98ffb7e4 | 588 | { |
f53b06f9 | 589 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
98ffb7e4 | 590 | } |
591 | ||
8203a132 | 592 | static void |
40a1495e | 593 | parse_peer(peer ** head) |
7813c6d5 | 594 | { |
270b86af | 595 | char *token = NULL; |
40a1495e | 596 | peer *p; |
7813c6d5 | 597 | int i; |
40a1495e | 598 | ushortlist *u; |
f9e5a344 | 599 | const char *me = null_string; /* XXX */ |
40a1495e | 600 | p = xcalloc(1, sizeof(peer)); |
601 | p->http_port = CACHE_HTTP_PORT; | |
602 | p->icp_port = CACHE_ICP_PORT; | |
603 | p->weight = 1; | |
dc835977 | 604 | p->stats.logged_state = PEER_ALIVE; |
e481c2dc | 605 | if ((token = strtok(NULL, w_space)) == NULL) |
270b86af | 606 | self_destruct(); |
40a1495e | 607 | p->host = xstrdup(token); |
e481c2dc | 608 | if ((token = strtok(NULL, w_space)) == NULL) |
270b86af | 609 | self_destruct(); |
40a1495e | 610 | p->type = parseNeighborType(token); |
270b86af | 611 | GetInteger(i); |
40a1495e | 612 | p->http_port = (u_short) i; |
7813c6d5 | 613 | GetInteger(i); |
40a1495e | 614 | p->icp_port = (u_short) i; |
615 | if (strcmp(p->host, me) == 0) { | |
616 | for (u = Config.Port.http; u; u = u->next) { | |
617 | if (p->http_port != u->i) | |
618 | continue; | |
619 | debug(15, 0) ("parse_peer: Peer looks like myself: %s %s/%d/%d\n", | |
620 | p->type, p->host, p->http_port, p->icp_port); | |
621 | self_destruct(); | |
622 | } | |
623 | } | |
270b86af | 624 | while ((token = strtok(NULL, w_space))) { |
625 | if (!strcasecmp(token, "proxy-only")) { | |
40a1495e | 626 | p->options |= NEIGHBOR_PROXY_ONLY; |
270b86af | 627 | } else if (!strcasecmp(token, "no-query")) { |
40a1495e | 628 | p->options |= NEIGHBOR_NO_QUERY; |
270b86af | 629 | } else if (!strcasecmp(token, "multicast-responder")) { |
40a1495e | 630 | p->options |= NEIGHBOR_MCAST_RESPONDER; |
270b86af | 631 | } else if (!strncasecmp(token, "weight=", 7)) { |
40a1495e | 632 | p->weight = atoi(token + 7); |
b3264694 | 633 | } else if (!strncasecmp(token, "closest-only", 12)) { |
634 | p->options |= NEIGHBOR_CLOSEST_ONLY; | |
270b86af | 635 | } else if (!strncasecmp(token, "ttl=", 4)) { |
40a1495e | 636 | p->mcast.ttl = atoi(token + 4); |
637 | if (p->mcast.ttl < 0) | |
638 | p->mcast.ttl = 0; | |
639 | if (p->mcast.ttl > 128) | |
640 | p->mcast.ttl = 128; | |
270b86af | 641 | } else if (!strncasecmp(token, "default", 7)) { |
40a1495e | 642 | p->options |= NEIGHBOR_DEFAULT_PARENT; |
270b86af | 643 | } else if (!strncasecmp(token, "round-robin", 11)) { |
40a1495e | 644 | p->options |= NEIGHBOR_ROUNDROBIN; |
270b86af | 645 | } else { |
40a1495e | 646 | debug(3, 0) ("parse_peer: token='%s'\n", token); |
270b86af | 647 | self_destruct(); |
648 | } | |
649 | } | |
40a1495e | 650 | if (p->weight < 1) |
651 | p->weight = 1; | |
652 | p->icp_version = ICP_VERSION_CURRENT; | |
653 | p->tcp_up = 1; | |
3f6c0fb2 | 654 | cbdataAdd(p, MEM_NONE); |
0153d498 | 655 | while (*head != NULL) |
656 | head = &(*head)->next; | |
657 | *head = p; | |
40a1495e | 658 | Config.npeers++; |
0153d498 | 659 | } |
660 | ||
661 | static void | |
40a1495e | 662 | free_peer(peer ** P) |
0153d498 | 663 | { |
40a1495e | 664 | peer *p; |
79d39a72 | 665 | while ((p = *P) != NULL) { |
a47b9029 | 666 | *P = p->next; |
40a1495e | 667 | peerDestroy(p); |
a47b9029 | 668 | } |
987c67d1 | 669 | Config.npeers = 0; |
270b86af | 670 | } |
671 | ||
672 | static void | |
a7d59104 | 673 | dump_cachemgrpasswd(StoreEntry * entry, const char *name, cachemgr_passwd * list) |
270b86af | 674 | { |
f53b06f9 | 675 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
270b86af | 676 | } |
677 | ||
678 | static void | |
a47b9029 | 679 | parse_cachemgrpasswd(cachemgr_passwd ** head) |
270b86af | 680 | { |
681 | char *passwd = NULL; | |
682 | wordlist *actions = NULL; | |
683 | parse_string(&passwd); | |
684 | parse_wordlist(&actions); | |
f1dc9b30 | 685 | objcachePasswdAdd(head, passwd, actions); |
270b86af | 686 | wordlistDestroy(&actions); |
687 | } | |
688 | ||
689 | static void | |
a47b9029 | 690 | free_cachemgrpasswd(cachemgr_passwd ** head) |
270b86af | 691 | { |
a47b9029 | 692 | cachemgr_passwd *p; |
79d39a72 | 693 | while ((p = *head) != NULL) { |
a47b9029 | 694 | *head = p->next; |
695 | xfree(p->passwd); | |
696 | xfree(p); | |
697 | } | |
270b86af | 698 | } |
699 | ||
270b86af | 700 | |
8203a132 | 701 | static void |
a7d59104 | 702 | dump_denyinfo(StoreEntry * entry, const char *name, struct _acl_deny_info_list *var) |
270b86af | 703 | { |
f53b06f9 | 704 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
270b86af | 705 | } |
706 | ||
707 | static void | |
f1dc9b30 | 708 | parse_denyinfo(struct _acl_deny_info_list **var) |
6e40f263 | 709 | { |
f1dc9b30 | 710 | aclParseDenyInfoLine(var); |
6e40f263 | 711 | } |
403279e0 | 712 | |
1273d501 | 713 | void |
a47b9029 | 714 | free_denyinfo(acl_deny_info_list ** list) |
3c5557f9 | 715 | { |
1273d501 | 716 | struct _acl_deny_info_list *a = NULL; |
717 | struct _acl_deny_info_list *a_next = NULL; | |
718 | struct _acl_name_list *l = NULL; | |
719 | struct _acl_name_list *l_next = NULL; | |
720 | for (a = *list; a; a = a_next) { | |
a47b9029 | 721 | for (l = a->acl_list; l; l = l_next) { |
722 | l_next = l->next; | |
723 | safe_free(l); | |
724 | } | |
725 | a_next = a->next; | |
726 | safe_free(a); | |
1273d501 | 727 | } |
728 | *list = NULL; | |
270b86af | 729 | } |
730 | ||
731 | static void | |
f1dc9b30 | 732 | parse_peeracl(void) |
270b86af | 733 | { |
734 | char *host = NULL; | |
735 | char *aclname = NULL; | |
53ad48e6 | 736 | |
270b86af | 737 | if (!(host = strtok(NULL, w_space))) |
738 | self_destruct(); | |
f1dc9b30 | 739 | while ((aclname = strtok(NULL, list_sep))) { |
40a1495e | 740 | peer *p; |
f1dc9b30 | 741 | acl_list *L = NULL; |
742 | acl_list **Tail = NULL; | |
743 | acl *a = NULL; | |
40a1495e | 744 | if ((p = peerFindByName(host)) == NULL) { |
43c3424b | 745 | debug(15, 0) ("%s, line %d: No cache_peer '%s'\n", |
f1dc9b30 | 746 | cfg_filename, config_lineno, host); |
747 | return; | |
748 | } | |
749 | L = xcalloc(1, sizeof(struct _acl_list)); | |
750 | L->op = 1; | |
751 | if (*aclname == '!') { | |
752 | L->op = 0; | |
753 | aclname++; | |
754 | } | |
755 | debug(15, 3) ("neighborAddAcl: looking for ACL name '%s'\n", aclname); | |
756 | a = aclFindByName(aclname); | |
757 | if (a == NULL) { | |
758 | debug(15, 0) ("%s line %d: %s\n", | |
759 | cfg_filename, config_lineno, config_input_line); | |
760 | debug(15, 0) ("neighborAddAcl: ACL name '%s' not found.\n", aclname); | |
761 | xfree(L); | |
762 | return; | |
763 | } | |
764 | L->acl = a; | |
765 | for (Tail = &p->acls; *Tail; Tail = &(*Tail)->next); | |
766 | *Tail = L; | |
767 | } | |
270b86af | 768 | } |
769 | ||
270b86af | 770 | static void |
771 | parse_hostdomain(void) | |
772 | { | |
773 | char *host = NULL; | |
774 | char *domain = NULL; | |
775 | if (!(host = strtok(NULL, w_space))) | |
776 | self_destruct(); | |
f1dc9b30 | 777 | while ((domain = strtok(NULL, list_sep))) { |
778 | domain_ping *l = NULL; | |
779 | domain_ping **L = NULL; | |
40a1495e | 780 | peer *p; |
781 | if ((p = peerFindByName(host)) == NULL) { | |
43c3424b | 782 | debug(15, 0) ("%s, line %d: No cache_peer '%s'\n", |
f1dc9b30 | 783 | cfg_filename, config_lineno, host); |
784 | continue; | |
785 | } | |
786 | l = xcalloc(1, sizeof(struct _domain_ping)); | |
787 | l->do_ping = 1; | |
788 | if (*domain == '!') { /* check for !.edu */ | |
789 | l->do_ping = 0; | |
790 | domain++; | |
791 | } | |
792 | l->domain = xstrdup(domain); | |
793 | for (L = &(p->pinglist); *L; L = &((*L)->next)); | |
794 | *L = l; | |
795 | } | |
270b86af | 796 | } |
797 | ||
798 | static void | |
799 | parse_hostdomaintype(void) | |
800 | { | |
801 | char *host = NULL; | |
802 | char *type = NULL; | |
803 | char *domain = NULL; | |
804 | if (!(host = strtok(NULL, w_space))) | |
805 | self_destruct(); | |
806 | if (!(type = strtok(NULL, w_space))) | |
807 | self_destruct(); | |
f1dc9b30 | 808 | while ((domain = strtok(NULL, list_sep))) { |
809 | domain_type *l = NULL; | |
810 | domain_type **L = NULL; | |
40a1495e | 811 | peer *p; |
812 | if ((p = peerFindByName(host)) == NULL) { | |
43c3424b | 813 | debug(15, 0) ("%s, line %d: No cache_peer '%s'\n", |
f1dc9b30 | 814 | cfg_filename, config_lineno, host); |
815 | return; | |
816 | } | |
817 | l = xcalloc(1, sizeof(struct _domain_type)); | |
818 | l->type = parseNeighborType(type); | |
819 | l->domain = xstrdup(domain); | |
820 | for (L = &(p->typelist); *L; L = &((*L)->next)); | |
821 | *L = l; | |
822 | } | |
270b86af | 823 | } |
824 | ||
825 | static void | |
a7d59104 | 826 | dump_httpanonymizer(StoreEntry * entry, const char *name, int var) |
270b86af | 827 | { |
828 | switch (var) { | |
829 | case ANONYMIZER_NONE: | |
f0b19334 | 830 | storeAppendPrintf(entry, "%s off\n", name); |
270b86af | 831 | break; |
832 | case ANONYMIZER_STANDARD: | |
f0b19334 | 833 | storeAppendPrintf(entry, "%s paranoid\n", name); |
270b86af | 834 | break; |
835 | case ANONYMIZER_PARANOID: | |
f0b19334 | 836 | storeAppendPrintf(entry, "%s standard\n", name); |
270b86af | 837 | break; |
838 | } | |
839 | } | |
840 | ||
841 | static void | |
842 | parse_httpanonymizer(int *var) | |
fa562c67 | 843 | { |
844 | char *token; | |
845 | token = strtok(NULL, w_space); | |
846 | if (token == NULL) | |
bba6fa8f | 847 | self_destruct(); |
fa562c67 | 848 | if (!strcasecmp(token, "off")) |
270b86af | 849 | *var = ANONYMIZER_NONE; |
fa562c67 | 850 | else if (!strcasecmp(token, "paranoid")) |
270b86af | 851 | *var = ANONYMIZER_PARANOID; |
fa562c67 | 852 | else |
270b86af | 853 | *var = ANONYMIZER_STANDARD; |
854 | } | |
855 | ||
641941c0 | 856 | |
270b86af | 857 | static void |
a7d59104 | 858 | dump_ushortlist(StoreEntry * entry, const char *name, ushortlist * u) |
090089c4 | 859 | { |
270b86af | 860 | while (u) { |
f53b06f9 | 861 | storeAppendPrintf(entry, "%s %d\n", name, (int) u->i); |
270b86af | 862 | u = u->next; |
863 | } | |
864 | } | |
090089c4 | 865 | |
f53b06f9 | 866 | static int |
867 | check_null_ushortlist(ushortlist * u) | |
868 | { | |
869 | return u == NULL; | |
870 | } | |
871 | ||
270b86af | 872 | static void |
873 | parse_ushortlist(ushortlist ** P) | |
874 | { | |
875 | char *token; | |
876 | int i; | |
877 | ushortlist *u; | |
878 | ushortlist **U; | |
879 | while ((token = strtok(NULL, w_space))) { | |
880 | if (sscanf(token, "%d", &i) != 1) | |
881 | self_destruct(); | |
882 | if (i < 0) | |
883 | i = 0; | |
884 | u = xcalloc(1, sizeof(ushortlist)); | |
885 | u->i = (u_short) i; | |
886 | for (U = P; *U; U = &(*U)->next); | |
887 | *U = u; | |
090089c4 | 888 | } |
270b86af | 889 | } |
090089c4 | 890 | |
0153d498 | 891 | static void |
a47b9029 | 892 | free_ushortlist(ushortlist ** P) |
0153d498 | 893 | { |
a47b9029 | 894 | ushortlist *u; |
79d39a72 | 895 | while ((u = *P) != NULL) { |
a47b9029 | 896 | *P = u->next; |
897 | xfree(u); | |
898 | } | |
0153d498 | 899 | } |
900 | ||
270b86af | 901 | static void |
a7d59104 | 902 | dump_int(StoreEntry * entry, const char *name, int var) |
270b86af | 903 | { |
f53b06f9 | 904 | storeAppendPrintf(entry, "%s %d\n", name, var); |
270b86af | 905 | } |
c1c29eb6 | 906 | |
270b86af | 907 | static void |
908 | parse_int(int *var) | |
909 | { | |
910 | char *token; | |
911 | int i; | |
270b86af | 912 | GetInteger(i); |
913 | *var = i; | |
914 | } | |
090089c4 | 915 | |
0153d498 | 916 | static void |
917 | free_int(int *var) | |
918 | { | |
a47b9029 | 919 | *var = 0; |
0153d498 | 920 | } |
921 | ||
270b86af | 922 | static void |
a7d59104 | 923 | dump_onoff(StoreEntry * entry, const char *name, int var) |
270b86af | 924 | { |
f53b06f9 | 925 | storeAppendPrintf(entry, "%s %s\n", name, var ? "on" : "off"); |
270b86af | 926 | } |
090089c4 | 927 | |
270b86af | 928 | static void |
929 | parse_onoff(int *var) | |
930 | { | |
931 | char *token = strtok(NULL, w_space); | |
090089c4 | 932 | |
270b86af | 933 | if (token == NULL) |
934 | self_destruct(); | |
935 | if (!strcasecmp(token, "on") || !strcasecmp(token, "enable")) | |
936 | *var = 1; | |
937 | else | |
938 | *var = 0; | |
939 | } | |
e90100aa | 940 | |
0153d498 | 941 | #define free_onoff free_int |
f1dc9b30 | 942 | #define free_httpanonymizer free_int |
f1dc9b30 | 943 | #define dump_eol dump_string |
944 | #define free_eol free_string | |
30a4f2a8 | 945 | |
270b86af | 946 | static void |
a7d59104 | 947 | dump_refreshpattern(StoreEntry * entry, const char *name, refresh_t * head) |
270b86af | 948 | { |
f53b06f9 | 949 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
270b86af | 950 | } |
090089c4 | 951 | |
270b86af | 952 | static void |
f1dc9b30 | 953 | parse_refreshpattern(refresh_t ** head) |
270b86af | 954 | { |
f1dc9b30 | 955 | char *token; |
956 | char *pattern; | |
957 | time_t min = 0; | |
958 | int pct = 0; | |
959 | time_t max = 0; | |
960 | int i; | |
961 | refresh_t *t; | |
962 | regex_t comp; | |
963 | int errcode; | |
964 | int flags = REG_EXTENDED | REG_NOSUB; | |
965 | if ((token = strtok(NULL, w_space)) == NULL) | |
966 | self_destruct(); | |
967 | if (strcmp(token, "-i") == 0) { | |
968 | flags |= REG_ICASE; | |
969 | token = strtok(NULL, w_space); | |
970 | } else if (strcmp(token, "+i") == 0) { | |
971 | flags &= ~REG_ICASE; | |
972 | token = strtok(NULL, w_space); | |
973 | } | |
974 | if (token == NULL) | |
975 | self_destruct(); | |
976 | pattern = xstrdup(token); | |
977 | GetInteger(i); /* token: min */ | |
978 | min = (time_t) (i * 60); /* convert minutes to seconds */ | |
979 | GetInteger(i); /* token: pct */ | |
980 | pct = i; | |
981 | GetInteger(i); /* token: max */ | |
982 | max = (time_t) (i * 60); /* convert minutes to seconds */ | |
983 | if ((errcode = regcomp(&comp, pattern, flags)) != 0) { | |
984 | char errbuf[256]; | |
985 | regerror(errcode, &comp, errbuf, sizeof errbuf); | |
986 | debug(22, 0) ("%s line %d: %s\n", | |
987 | cfg_filename, config_lineno, config_input_line); | |
988 | debug(22, 0) ("refreshAddToList: Invalid regular expression '%s': %s\n", | |
989 | pattern, errbuf); | |
990 | return; | |
991 | } | |
992 | pct = pct < 0 ? 0 : pct; | |
993 | max = max < 0 ? 0 : max; | |
994 | t = xcalloc(1, sizeof(refresh_t)); | |
995 | t->pattern = (char *) xstrdup(pattern); | |
996 | t->compiled_pattern = comp; | |
997 | t->min = min; | |
998 | t->pct = pct; | |
999 | t->max = max; | |
1000 | t->next = NULL; | |
1001 | while (*head) | |
1002 | head = &(*head)->next; | |
1003 | *head = t; | |
1004 | safe_free(pattern); | |
270b86af | 1005 | } |
090089c4 | 1006 | |
270b86af | 1007 | static void |
a47b9029 | 1008 | free_refreshpattern(refresh_t ** head) |
270b86af | 1009 | { |
f1dc9b30 | 1010 | refresh_t *t; |
79d39a72 | 1011 | while ((t = *head) != NULL) { |
f1dc9b30 | 1012 | *head = t->next; |
1013 | safe_free(t->pattern); | |
1014 | regfree(&t->compiled_pattern); | |
1015 | safe_free(t); | |
1016 | } | |
270b86af | 1017 | } |
12b9e9b1 | 1018 | |
270b86af | 1019 | static void |
a7d59104 | 1020 | dump_regexlist(StoreEntry * entry, const char *name, relist * var) |
270b86af | 1021 | { |
f53b06f9 | 1022 | storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name); |
270b86af | 1023 | } |
cf5fd929 | 1024 | |
270b86af | 1025 | static void |
1026 | parse_regexlist(relist ** var) | |
1027 | { | |
0153d498 | 1028 | aclParseRegexList(var); |
270b86af | 1029 | } |
fb263c4c | 1030 | |
270b86af | 1031 | static void |
0153d498 | 1032 | free_regexlist(relist ** var) |
270b86af | 1033 | { |
0153d498 | 1034 | aclDestroyRegexList(*var); |
1035 | *var = NULL; | |
270b86af | 1036 | } |
7d49daab | 1037 | |
270b86af | 1038 | static void |
a7d59104 | 1039 | dump_string(StoreEntry * entry, const char *name, char *var) |
270b86af | 1040 | { |
f53b06f9 | 1041 | if (var != NULL) |
a7d59104 | 1042 | storeAppendPrintf(entry, "%s %s\n", name, var); |
270b86af | 1043 | } |
98ffb7e4 | 1044 | |
270b86af | 1045 | static void |
0153d498 | 1046 | parse_string(char **var) |
270b86af | 1047 | { |
1048 | char *token = strtok(NULL, w_space); | |
270b86af | 1049 | safe_free(*var); |
1050 | if (token == NULL) | |
1051 | self_destruct(); | |
1052 | *var = xstrdup(token); | |
1053 | } | |
b15e6857 | 1054 | |
0153d498 | 1055 | static void |
1056 | free_string(char **var) | |
1057 | { | |
a47b9029 | 1058 | xfree(*var); |
1059 | *var = NULL; | |
0153d498 | 1060 | } |
caebbe00 | 1061 | |
270b86af | 1062 | static void |
f1dc9b30 | 1063 | parse_eol(char *volatile *var) |
270b86af | 1064 | { |
1065 | char *token = strtok(NULL, null_string); | |
270b86af | 1066 | safe_free(*var); |
f1dc9b30 | 1067 | if (token == NULL) |
1068 | self_destruct(); | |
270b86af | 1069 | *var = xstrdup(token); |
1070 | } | |
090089c4 | 1071 | |
270b86af | 1072 | static void |
a7d59104 | 1073 | dump_time_t(StoreEntry * entry, const char *name, time_t var) |
090089c4 | 1074 | { |
f53b06f9 | 1075 | storeAppendPrintf(entry, "%s %d seconds\n", name, (int) var); |
090089c4 | 1076 | } |
1077 | ||
270b86af | 1078 | static void |
a47b9029 | 1079 | parse_time_t(time_t * var) |
0ffd22bc | 1080 | { |
f1dc9b30 | 1081 | parseTimeLine(var, T_SECOND_STR); |
0ffd22bc | 1082 | } |
1083 | ||
270b86af | 1084 | static void |
a47b9029 | 1085 | free_time_t(time_t * var) |
270b86af | 1086 | { |
a47b9029 | 1087 | *var = 0; |
270b86af | 1088 | } |
9906e724 | 1089 | |
1090 | static void | |
a7d59104 | 1091 | dump_size_t(StoreEntry * entry, const char *name, size_t var) |
1b635117 | 1092 | { |
f53b06f9 | 1093 | storeAppendPrintf(entry, "%s %d\n", name, (int) var); |
1b635117 | 1094 | } |
1095 | ||
1096 | static void | |
a7d59104 | 1097 | dump_b_size_t(StoreEntry * entry, const char *name, size_t var) |
9906e724 | 1098 | { |
f53b06f9 | 1099 | storeAppendPrintf(entry, "%s %d %s\n", name, (int) var, B_BYTES_STR); |
9906e724 | 1100 | } |
1101 | ||
1102 | static void | |
a7d59104 | 1103 | dump_kb_size_t(StoreEntry * entry, const char *name, size_t var) |
9906e724 | 1104 | { |
f53b06f9 | 1105 | storeAppendPrintf(entry, "%s %d %s\n", name, (int) var, B_KBYTES_STR); |
9906e724 | 1106 | } |
1107 | ||
1108 | static void | |
a47b9029 | 1109 | parse_size_t(size_t * var) |
1b635117 | 1110 | { |
1111 | char *token; | |
1112 | int i; | |
1113 | GetInteger(i); | |
1114 | *var = (size_t) i; | |
1115 | } | |
1116 | ||
1117 | static void | |
1118 | parse_b_size_t(size_t * var) | |
9906e724 | 1119 | { |
1120 | parseBytesLine(var, B_BYTES_STR); | |
1121 | } | |
1122 | ||
1123 | static void | |
a47b9029 | 1124 | parse_kb_size_t(size_t * var) |
9906e724 | 1125 | { |
1126 | parseBytesLine(var, B_KBYTES_STR); | |
1127 | } | |
1128 | ||
1129 | static void | |
a47b9029 | 1130 | free_size_t(size_t * var) |
9906e724 | 1131 | { |
a47b9029 | 1132 | *var = 0; |
9906e724 | 1133 | } |
1134 | ||
1b635117 | 1135 | #define free_b_size_t free_size_t |
9906e724 | 1136 | #define free_kb_size_t free_size_t |
1137 | #define free_mb_size_t free_size_t | |
1138 | #define free_gb_size_t free_size_t | |
090089c4 | 1139 | |
8203a132 | 1140 | static void |
a7d59104 | 1141 | dump_ushort(StoreEntry * entry, const char *name, u_short var) |
090089c4 | 1142 | { |
f53b06f9 | 1143 | storeAppendPrintf(entry, "%s %d\n", name, var); |
270b86af | 1144 | } |
090089c4 | 1145 | |
0153d498 | 1146 | static void |
a47b9029 | 1147 | free_ushort(u_short * u) |
0153d498 | 1148 | { |
1149 | *u = 0; | |
1150 | } | |
1151 | ||
270b86af | 1152 | static void |
1153 | parse_ushort(u_short * var) | |
1154 | { | |
1155 | char *token; | |
1156 | int i; | |
090089c4 | 1157 | |
270b86af | 1158 | GetInteger(i); |
1159 | if (i < 0) | |
1160 | i = 0; | |
1161 | *var = (u_short) i; | |
090089c4 | 1162 | } |
1163 | ||
270b86af | 1164 | static void |
a7d59104 | 1165 | dump_wordlist(StoreEntry * entry, const char *name, wordlist * list) |
270b86af | 1166 | { |
270b86af | 1167 | while (list != NULL) { |
f53b06f9 | 1168 | storeAppendPrintf(entry, "%s %s\n", name, list->key); |
270b86af | 1169 | list = list->next; |
429fdbec | 1170 | } |
429fdbec | 1171 | } |
1172 | ||
270b86af | 1173 | static void |
1174 | parse_wordlist(wordlist ** list) | |
429fdbec | 1175 | { |
270b86af | 1176 | char *token; |
1177 | ||
1178 | while ((token = strtok(NULL, w_space))) | |
1179 | wordlistAdd(list, token); | |
429fdbec | 1180 | } |
270b86af | 1181 | |
0153d498 | 1182 | #define free_wordlist wordlistDestroy |
270b86af | 1183 | |
1184 | #include "cf_parser.c" | |
f1dc9b30 | 1185 | |
1186 | peer_t | |
1187 | parseNeighborType(const char *s) | |
1188 | { | |
1189 | if (!strcasecmp(s, "parent")) | |
1190 | return PEER_PARENT; | |
1191 | if (!strcasecmp(s, "neighbor")) | |
1192 | return PEER_SIBLING; | |
1193 | if (!strcasecmp(s, "neighbour")) | |
1194 | return PEER_SIBLING; | |
1195 | if (!strcasecmp(s, "sibling")) | |
1196 | return PEER_SIBLING; | |
1197 | if (!strcasecmp(s, "multicast")) | |
1198 | return PEER_MULTICAST; | |
1199 | debug(15, 0) ("WARNING: Unknown neighbor type: %s\n", s); | |
1200 | return PEER_SIBLING; | |
1201 | } | |
f150dd4b | 1202 | |
1203 | void | |
1204 | configFreeMemory(void) | |
1205 | { | |
23ff6968 | 1206 | free_all(); |
f150dd4b | 1207 | } |
f0b19334 | 1208 | |
1209 | static void | |
1210 | requirePathnameExists(const char *name, const char *path) | |
1211 | { | |
1212 | struct stat sb; | |
1213 | char buf[MAXPATHLEN]; | |
1214 | assert(path != NULL); | |
1215 | if (stat(path, &sb) < 0) { | |
1216 | snprintf(buf, MAXPATHLEN, "%s: %s", path, xstrerror()); | |
1217 | fatal(buf); | |
1218 | } | |
1219 | } |