]> git.ipfire.org Git - thirdparty/squid.git/blame - src/cache_cf.cc
building outside the source tree fixes
[thirdparty/squid.git] / src / cache_cf.cc
CommitLineData
be335c22 1
30a4f2a8 2/*
0e7f8c14 3 * $Id: cache_cf.cc,v 1.244 1998/02/05 20:32:35 wessels Exp $
30a4f2a8 4 *
5 * DEBUG: section 3 Configuration File Parsing
6 * AUTHOR: Harvest Derived
7 *
42c04c16 8 * SQUID Internet Object Cache http://squid.nlanr.net/Squid/
30a4f2a8 9 * --------------------------------------------------------
10 *
11 * Squid is the result of efforts by numerous individuals from the
12 * Internet community. Development is led by Duane Wessels of the
13 * National Laboratory for Applied Network Research and funded by
14 * the National Science Foundation.
15 *
16 * This program is free software; you can redistribute it and/or modify
17 * it under the terms of the GNU General Public License as published by
18 * the Free Software Foundation; either version 2 of the License, or
19 * (at your option) any later version.
20 *
21 * This program is distributed in the hope that it will be useful,
22 * but WITHOUT ANY WARRANTY; without even the implied warranty of
23 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
24 * GNU General Public License for more details.
25 *
26 * You should have received a copy of the GNU General Public License
27 * along with this program; if not, write to the Free Software
28 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 *
30 */
cf5fd929 31
44a47c6e 32#include "squid.h"
1df370e3 33
34#if SQUID_SNMP
a97cfa48 35#include "snmp.h"
1df370e3 36#endif
090089c4 37
8813e606 38static const char *const T_SECOND_STR = "second";
39static const char *const T_MINUTE_STR = "minute";
40static const char *const T_HOUR_STR = "hour";
41static const char *const T_DAY_STR = "day";
42static const char *const T_WEEK_STR = "week";
43static const char *const T_FORTNIGHT_STR = "fortnight";
44static const char *const T_MONTH_STR = "month";
45static const char *const T_YEAR_STR = "year";
46static const char *const T_DECADE_STR = "decade";
aa0a0c7c 47
9906e724 48static const char *const B_BYTES_STR = "bytes";
49static const char *const B_KBYTES_STR = "KB";
50static const char *const B_MBYTES_STR = "MB";
51static const char *const B_GBYTES_STR = "GB";
52
4db43fab 53static const char *const list_sep = ", \t\n\r";
090089c4 54
24382924 55static char fatal_str[BUFSIZ];
f5b8bbc4 56static void self_destruct(void);
57static void wordlistAdd(wordlist **, const char *);
caebbe00 58
f5b8bbc4 59static void configDoConfigure(void);
1df370e3 60#if SQUID_SNMP
a97cfa48 61static void parse_snmp_conf(snmpconf **);
1df370e3 62#endif
f5b8bbc4 63static void parse_refreshpattern(refresh_t **);
64static int parseTimeUnits(const char *unit);
65static void parseTimeLine(time_t * tptr, const char *units);
66static void parse_string(char **);
67static void parse_wordlist(wordlist **);
68static void default_all(void);
69static void defaults_if_none(void);
70static int parse_line(char *);
71static void parseBytesLine(size_t * bptr, const char *units);
72static size_t parseBytesUnits(const char *unit);
f5b8bbc4 73static void free_all(void);
f0b19334 74static void requirePathnameExists(const char *name, const char *path);
270b86af 75
24382924 76static void
0673c0ba 77self_destruct(void)
090089c4 78{
56878878 79 snprintf(fatal_str, BUFSIZ, "Bungled %s line %d: %s",
b8de7ebe 80 cfg_filename, config_lineno, config_input_line);
090089c4 81 fatal(fatal_str);
82}
83
8203a132 84void
85wordlistDestroy(wordlist ** list)
0ffd22bc 86{
87 wordlist *w = NULL;
79d39a72 88 while ((w = *list) != NULL) {
b5639035 89 *list = w->next;
0ffd22bc 90 safe_free(w->key);
91 safe_free(w);
92 }
93 *list = NULL;
94}
95
24382924 96static void
fe4e214f 97wordlistAdd(wordlist ** list, const char *key)
090089c4 98{
0ffd22bc 99 wordlist *p = NULL;
100 wordlist *q = NULL;
090089c4 101
102 if (!(*list)) {
103 /* empty list */
30a4f2a8 104 *list = xcalloc(1, sizeof(wordlist));
090089c4 105 (*list)->key = xstrdup(key);
106 (*list)->next = NULL;
107 } else {
108 p = *list;
109 while (p->next)
110 p = p->next;
30a4f2a8 111 q = xcalloc(1, sizeof(wordlist));
090089c4 112 q->key = xstrdup(key);
113 q->next = NULL;
114 p->next = q;
115 }
116}
117
8203a132 118void
119intlistDestroy(intlist ** list)
92a6f4b1 120{
121 intlist *w = NULL;
122 intlist *n = NULL;
123
124 for (w = *list; w; w = n) {
125 n = w->next;
126 safe_free(w);
127 }
128 *list = NULL;
129}
130
403279e0 131
3c5557f9 132/*
133 * Use this #define in all the parse*() functions. Assumes char *token is
134 * defined
135 */
090089c4 136
137#define GetInteger(var) \
138 token = strtok(NULL, w_space); \
30a4f2a8 139 if( token == NULL) \
3003c0f3 140 self_destruct(); \
090089c4 141 if (sscanf(token, "%d", &var) != 1) \
3003c0f3 142 self_destruct();
090089c4 143
270b86af 144int
145parseConfigFile(const char *file_name)
2546fcb3 146{
270b86af 147 FILE *fp = NULL;
148 char *token = NULL;
72121e8b 149 char *tmp_line;
0153d498 150 free_all();
151 default_all();
270b86af 152 if ((fp = fopen(file_name, "r")) == NULL) {
042461c3 153 snprintf(fatal_str, BUFSIZ, "Unable to open configuration file: %s: %s",
270b86af 154 file_name, xstrerror());
155 fatal(fatal_str);
156 }
157 cfg_filename = file_name;
158 if ((token = strrchr(cfg_filename, '/')))
159 cfg_filename = token + 1;
160 memset(config_input_line, '\0', BUFSIZ);
161 config_lineno = 0;
162 while (fgets(config_input_line, BUFSIZ, fp)) {
163 config_lineno++;
164 if ((token = strchr(config_input_line, '\n')))
165 *token = '\0';
166 if (config_input_line[0] == '#')
167 continue;
168 if (config_input_line[0] == '\0')
169 continue;
170 debug(3, 5) ("Processing: '%s'\n", config_input_line);
72121e8b 171 tmp_line = xstrdup(config_input_line);
270b86af 172 if (!parse_line(tmp_line)) {
173 debug(3, 0) ("parseConfigFile: line %d unrecognized: '%s'\n",
174 config_lineno,
175 config_input_line);
176 }
72121e8b 177 safe_free(tmp_line);
270b86af 178 }
f0b19334 179 fclose(fp);
180 defaults_if_none();
181 configDoConfigure();
182 return 0;
183}
270b86af 184
f0b19334 185static void
186configDoConfigure(void)
187{
188 LOCAL_ARRAY(char, buf, BUFSIZ);
189 memset(&Config2, '\0', sizeof(SquidConfig2));
270b86af 190 /* Sanity checks */
a95856a0 191 if (Config.cacheSwap.swapDirs == NULL)
192 fatal("No cache_dir's specified in config file");
f0b19334 193 if (Config.Swap.maxSize < (Config.Mem.maxSize >> 10))
194 fatal("cache_swap is lower than cache_mem");
f1dc9b30 195 if (Config.Announce.period < 1) {
196 Config.Announce.period = 86400 * 365; /* one year */
17a0a4ee 197 Config.onoff.announce = 0;
270b86af 198 }
f0b19334 199 if (Config.dnsChildren < 1)
200 fatal("No dnsservers allocated");
201 if (Config.dnsChildren > DefaultDnsChildrenMax) {
202 debug(3, 0) ("WARNING: dns_children was set to a bad value: %d\n",
270b86af 203 Config.dnsChildren);
f0b19334 204 debug(3, 0) ("Setting it to the maximum (%d).\n",
205 DefaultDnsChildrenMax);
270b86af 206 Config.dnsChildren = DefaultDnsChildrenMax;
207 }
208 if (Config.Program.redirect) {
209 if (Config.redirectChildren < 1) {
210 Config.redirectChildren = 0;
211 safe_free(Config.Program.redirect);
212 } else if (Config.redirectChildren > DefaultRedirectChildrenMax) {
f0b19334 213 debug(3, 0) ("WARNING: redirect_children was set to a bad value: %d\n",
270b86af 214 Config.redirectChildren);
f0b19334 215 debug(3, 0) ("Setting it to the maximum (%d).\n", DefaultRedirectChildrenMax);
270b86af 216 Config.redirectChildren = DefaultRedirectChildrenMax;
217 }
fea2e6e0 218 }
f1dc9b30 219 if (Config.Accel.host) {
a47b9029 220 snprintf(buf, BUFSIZ, "http://%s:%d", Config.Accel.host, Config.Accel.port);
221 Config2.Accel.prefix = xstrdup(buf);
222 Config2.Accel.on = 1;
f1dc9b30 223 }
224 if (Config.appendDomain)
225 if (*Config.appendDomain != '.')
226 fatal("append_domain must begin with a '.'");
270b86af 227 if (Config.errHtmlText == NULL)
228 Config.errHtmlText = xstrdup(null_string);
229 storeConfigure();
f1dc9b30 230 if (Config2.Accel.on && !strcmp(Config.Accel.host, "virtual"))
270b86af 231 vhost_mode = 1;
232 if (Config.Port.http == NULL)
233 fatal("No http_port specified!");
042461c3 234 snprintf(ThisCache, SQUIDHOSTNAMELEN << 1, "%s:%d (Squid/%s)",
270b86af 235 getMyHostname(),
236 (int) Config.Port.http->i,
237 SQUID_VERSION);
238 if (!Config.udpMaxHitObjsz || Config.udpMaxHitObjsz > SQUID_UDP_SO_SNDBUF)
239 Config.udpMaxHitObjsz = SQUID_UDP_SO_SNDBUF;
240 if (Config.appendDomain)
241 Config.appendDomainLen = strlen(Config.appendDomain);
242 else
243 Config.appendDomainLen = 0;
f1dc9b30 244 safe_free(debug_options)
245 debug_options = xstrdup(Config.debugOptions);
22c653cd 246 if (Config.retry.timeout < 5)
247 fatal("minimum_retry_timeout must be at least 5 seconds");
248 if (Config.retry.maxtries > 10)
249 fatal("maximum_single_addr_tries cannot be larger than 10");
250 if (Config.retry.maxtries < 1) {
22c653cd 251 debug(3, 0) ("WARNING: resetting 'maximum_single_addr_tries to 1\n");
5210854d 252 Config.retry.maxtries = 1;
253 }
254 if (Config.referenceAge < 300) {
255 debug(3, 0) ("WARNING: resetting 'reference_age' to 1 week\n");
256 Config.referenceAge = 86400 * 7;
22c653cd 257 }
f0b19334 258 requirePathnameExists("MIME Config Table", Config.mimeTablePathname);
259 requirePathnameExists("cache_dns_program", Config.Program.dnsserver);
260 requirePathnameExists("unlinkd_program", Config.Program.unlinkd);
261 if (Config.Program.redirect)
262 requirePathnameExists("redirect_program", Config.Program.redirect);
263 requirePathnameExists("announce_file", Config.Announce.file);
264 requirePathnameExists("Icon Directory", Config.icons.directory);
265 requirePathnameExists("Error Directory", Config.errorDirectory);
090089c4 266}
267
270b86af 268/* Parse a time specification from the config file. Store the
f1dc9b30 269 * result in 'tptr', after converting it to 'units' */
8203a132 270static void
a47b9029 271parseTimeLine(time_t * tptr, const char *units)
090089c4 272{
273 char *token;
270b86af 274 double d;
f1dc9b30 275 time_t m;
276 time_t u;
270b86af 277 if ((u = parseTimeUnits(units)) == 0)
3003c0f3 278 self_destruct();
270b86af 279 if ((token = strtok(NULL, w_space)) == NULL)
3003c0f3 280 self_destruct();
270b86af 281 d = atof(token);
282 m = u; /* default to 'units' if none specified */
9e975e4e 283 if ((token = strtok(NULL, w_space)) == NULL)
a47b9029 284 debug(3, 0) ("WARNING: No units on '%s', assuming %f %s\n",
285 config_input_line, d, units);
9e975e4e 286 else if ((m = parseTimeUnits(token)) == 0)
a47b9029 287 self_destruct();
f1dc9b30 288 *tptr = m * d / u;
090089c4 289}
290
270b86af 291static int
292parseTimeUnits(const char *unit)
293{
294 if (!strncasecmp(unit, T_SECOND_STR, strlen(T_SECOND_STR)))
295 return 1;
296 if (!strncasecmp(unit, T_MINUTE_STR, strlen(T_MINUTE_STR)))
297 return 60;
298 if (!strncasecmp(unit, T_HOUR_STR, strlen(T_HOUR_STR)))
299 return 3600;
300 if (!strncasecmp(unit, T_DAY_STR, strlen(T_DAY_STR)))
301 return 86400;
302 if (!strncasecmp(unit, T_WEEK_STR, strlen(T_WEEK_STR)))
303 return 86400 * 7;
304 if (!strncasecmp(unit, T_FORTNIGHT_STR, strlen(T_FORTNIGHT_STR)))
305 return 86400 * 14;
306 if (!strncasecmp(unit, T_MONTH_STR, strlen(T_MONTH_STR)))
307 return 86400 * 30;
308 if (!strncasecmp(unit, T_YEAR_STR, strlen(T_YEAR_STR)))
309 return 86400 * 365.2522;
310 if (!strncasecmp(unit, T_DECADE_STR, strlen(T_DECADE_STR)))
311 return 86400 * 365.2522 * 10;
312 debug(3, 1) ("parseTimeUnits: unknown time unit '%s'\n", unit);
313 return 0;
314}
315
9906e724 316static void
9e975e4e 317parseBytesLine(size_t * bptr, const char *units)
9906e724 318{
319 char *token;
320 double d;
321 size_t m;
322 size_t u;
323 if ((u = parseBytesUnits(units)) == 0)
324 self_destruct();
325 if ((token = strtok(NULL, w_space)) == NULL)
326 self_destruct();
327 d = atof(token);
328 m = u; /* default to 'units' if none specified */
9e975e4e 329 if ((token = strtok(NULL, w_space)) == NULL)
330 debug(3, 0) ("WARNING: No units on '%s', assuming %f %s\n",
331 config_input_line, d, units);
332 else if ((m = parseBytesUnits(token)) == 0)
333 self_destruct();
9906e724 334 *bptr = m * d / u;
335}
336
337static size_t
338parseBytesUnits(const char *unit)
339{
340 if (!strncasecmp(unit, B_BYTES_STR, strlen(B_BYTES_STR)))
341 return 1;
342 if (!strncasecmp(unit, B_KBYTES_STR, strlen(B_KBYTES_STR)))
a47b9029 343 return 1 << 10;
9906e724 344 if (!strncasecmp(unit, B_MBYTES_STR, strlen(B_MBYTES_STR)))
a47b9029 345 return 1 << 20;
9906e724 346 if (!strncasecmp(unit, B_GBYTES_STR, strlen(B_GBYTES_STR)))
a47b9029 347 return 1 << 30;
9906e724 348 debug(3, 1) ("parseBytesUnits: unknown bytes unit '%s'\n", unit);
349 return 0;
350}
351
270b86af 352/*****************************************************************************
353 * Max
354 *****************************************************************************/
355
8203a132 356static void
a7d59104 357dump_acl(StoreEntry * entry, const char *name, acl * acl)
090089c4 358{
f53b06f9 359 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
090089c4 360}
361
1df370e3 362#if SQUID_SNMP
a97cfa48 363static void
be335c22 364parse_snmp_conf(snmpconf ** s)
a97cfa48 365{
be335c22 366 static char buff[256];
367 static char *tokens[10], *p;
368 if (Mib == NULL) {
369 if (Config.Snmp.mibPath)
370 init_mib(Config.Snmp.mibPath);
371 else
372 fatal("snmp_mib_path should be defined before any snmp_agent_conf\n");
373 }
374 p = strtok(NULL, null_string);
0e7f8c14 375 xstrncpy(buff, p, 256);
be335c22 376 tokenize(buff, tokens, 10);
be335c22 377 if (!strcmp("view", tokens[0])) {
378 if (create_view(tokens) < 0)
379 debug(49, 5) ("snmp: parse_snmpconf(): error\n");
380 } else if (!strcmp("user", tokens[0])) {
381 if (create_user(tokens) < 0)
382 debug(49, 5) ("snmp: parse_snmpconf(): error\n");
383 } else if (!strcmp("community", tokens[0])) {
384 if (create_community(tokens) < 0)
385 debug(49, 5) ("snmp: parse_snmpconf(): error\n");
386 } else
387 debug(49, 5) ("snmp: unknown directive %s\n", tokens[0]);
a97cfa48 388}
389
1df370e3 390static void
391dump_snmp_conf(StoreEntry * entry, const char *name, snmpconf * head)
392{
393 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
394}
395
396static void
397free_snmp_conf(snmpconf ** head)
398{
399 snmpconf *t;
400 while ((t = *head) != NULL) {
401 *head = t->next;
402 safe_free(t->line);
403 safe_free(t);
404 }
405}
406#endif
407
8203a132 408static void
a47b9029 409parse_acl(acl ** acl)
090089c4 410{
f1dc9b30 411 aclParseAclLine(acl);
412}
413
414static void
a47b9029 415free_acl(acl ** acl)
f1dc9b30 416{
417 aclDestroyAcls(acl);
090089c4 418}
419
8203a132 420static void
a7d59104 421dump_acl_access(StoreEntry * entry, const char *name, struct _acl_access *head)
30a4f2a8 422{
f53b06f9 423 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
30a4f2a8 424}
090089c4 425
8203a132 426static void
270b86af 427parse_acl_access(struct _acl_access **head)
090089c4 428{
270b86af 429 aclParseAccessLine(head);
090089c4 430}
431
0153d498 432static void
433free_acl_access(struct _acl_access **head)
434{
a47b9029 435 aclDestroyAccessList(head);
0153d498 436}
437
8203a132 438static void
a7d59104 439dump_address(StoreEntry * entry, const char *name, struct in_addr addr)
270b86af 440{
f53b06f9 441 storeAppendPrintf(entry, "%s %s\n", name, inet_ntoa(addr));
270b86af 442}
443
444static void
445parse_address(struct in_addr *addr)
090089c4 446{
0ee4272b 447 const struct hostent *hp;
270b86af 448 char *token = strtok(NULL, w_space);
449
30a4f2a8 450 if (token == NULL)
451 self_destruct();
429fdbec 452 if (safe_inet_addr(token, addr) == 1)
453 (void) 0;
ceb8994e 454 else if ((hp = gethostbyname(token))) /* dont use ipcache */
1d73e33a 455 *addr = inaddrFromHostent(hp);
30a4f2a8 456 else
3003c0f3 457 self_destruct();
090089c4 458}
459
0153d498 460static void
461free_address(struct in_addr *addr)
462{
a47b9029 463 memset(addr, '\0', sizeof(struct in_addr));
0153d498 464}
465
e90100aa 466static void
f53b06f9 467dump_cachedir(StoreEntry * entry, const char *name, struct _cacheSwap swap)
e90100aa 468{
f53b06f9 469 SwapDir *s;
470 int i;
a7d59104 471 for (i = 0; i < swap.n_configured; i++) {
472 s = swap.swapDirs + i;
f53b06f9 473 storeAppendPrintf(entry, "%s %s %d %d %d\n",
474 name,
475 s->path,
a7d59104 476 s->max_size >> 10,
f53b06f9 477 s->l1,
478 s->l2);
479 }
480}
481
482static int
483check_null_cachedir(struct _cacheSwap swap)
484{
485 return swap.swapDirs == NULL;
e90100aa 486}
487
53ad48e6 488static int
489check_null_string(char *s)
490{
491 return s == NULL;
492}
493
8203a132 494static void
f1dc9b30 495parse_cachedir(struct _cacheSwap *swap)
090089c4 496{
497 char *token;
7da279d6 498 char *path;
752c3b27 499 int i;
270b86af 500 int size;
501 int l1;
502 int l2;
503 int readonly = 0;
f1dc9b30 504 SwapDir *tmp = NULL;
505 if ((path = strtok(NULL, w_space)) == NULL)
752c3b27 506 self_destruct();
270b86af 507 GetInteger(i);
508 size = i << 10; /* Mbytes to kbytes */
893dbb06 509 if (size <= 0)
510 fatal("parse_cachedir: invalid size value");
270b86af 511 GetInteger(i);
512 l1 = i;
893dbb06 513 if (l1 <= 0)
514 fatal("parse_cachedir: invalid level 1 directories value");
270b86af 515 GetInteger(i);
516 l2 = i;
893dbb06 517 if (l2 <= 0)
518 fatal("parse_cachedir: invalid level 2 directories value");
270b86af 519 if ((token = strtok(NULL, w_space)))
520 if (!strcasecmp(token, "read-only"))
521 readonly = 1;
f1dc9b30 522 for (i = 0; i < swap->n_configured; i++) {
a47b9029 523 tmp = swap->swapDirs + i;
f1dc9b30 524 if (!strcmp(path, tmp->path)) {
525 /* just reconfigure it */
860ee7e3 526 if (size == tmp->max_size)
be335c22 527 debug(3, 1) ("Cache dir '%s' size remains unchanged at %d MB\n",
528 path, size);
860ee7e3 529 else
be335c22 530 debug(3, 1) ("Cache dir '%s' size changed to %d MB\n",
531 path, size);
a47b9029 532 tmp->max_size = size;
860ee7e3 533 if (tmp->read_only != readonly)
be335c22 534 debug(3, 1) ("Cache dir '%s' now %s\n",
535 readonly ? "Read-Only" : "Read-Write");
a47b9029 536 tmp->read_only = readonly;
f1dc9b30 537 return;
538 }
539 }
540 if (swap->swapDirs == NULL) {
541 swap->n_allocated = 4;
542 swap->swapDirs = xcalloc(swap->n_allocated, sizeof(SwapDir));
543 }
544 if (swap->n_allocated == swap->n_configured) {
545 swap->n_allocated <<= 1;
546 tmp = xcalloc(swap->n_allocated, sizeof(SwapDir));
547 xmemcpy(tmp, swap->swapDirs, swap->n_configured * sizeof(SwapDir));
548 xfree(swap->swapDirs);
549 swap->swapDirs = tmp;
550 }
f1dc9b30 551 tmp = swap->swapDirs + swap->n_configured;
552 tmp->path = xstrdup(path);
553 tmp->max_size = size;
554 tmp->l1 = l1;
555 tmp->l2 = l2;
556 tmp->read_only = readonly;
557 tmp->map = file_map_create(MAX_FILES_PER_DIR);
558 tmp->swaplog_fd = -1;
62607543 559 swap->n_configured++;
9906e724 560 Config.Swap.maxSize += size;
752c3b27 561}
562
8203a132 563static void
f1dc9b30 564free_cachedir(struct _cacheSwap *swap)
565{
a47b9029 566 SwapDir *s;
567 int i;
860ee7e3 568 /* DON'T FREE THESE FOR RECONFIGURE */
569 if (reconfigure_pending)
570 return;
a47b9029 571 for (i = 0; i < swap->n_configured; i++) {
572 s = swap->swapDirs + i;
f150dd4b 573 if (s->swaplog_fd > -1) {
574 file_close(s->swaplog_fd);
575 s->swaplog_fd = -1;
576 }
a47b9029 577 xfree(s->path);
578 filemapFreeMemory(s->map);
579 }
580 safe_free(swap->swapDirs);
581 swap->swapDirs = NULL;
582 swap->n_allocated = 0;
583 swap->n_configured = 0;
f1dc9b30 584}
585
586static void
a7d59104 587dump_peer(StoreEntry * entry, const char *name, peer * p)
98ffb7e4 588{
f53b06f9 589 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
98ffb7e4 590}
591
8203a132 592static void
40a1495e 593parse_peer(peer ** head)
7813c6d5 594{
270b86af 595 char *token = NULL;
40a1495e 596 peer *p;
7813c6d5 597 int i;
40a1495e 598 ushortlist *u;
f9e5a344 599 const char *me = null_string; /* XXX */
40a1495e 600 p = xcalloc(1, sizeof(peer));
601 p->http_port = CACHE_HTTP_PORT;
602 p->icp_port = CACHE_ICP_PORT;
603 p->weight = 1;
dc835977 604 p->stats.logged_state = PEER_ALIVE;
e481c2dc 605 if ((token = strtok(NULL, w_space)) == NULL)
270b86af 606 self_destruct();
40a1495e 607 p->host = xstrdup(token);
e481c2dc 608 if ((token = strtok(NULL, w_space)) == NULL)
270b86af 609 self_destruct();
40a1495e 610 p->type = parseNeighborType(token);
270b86af 611 GetInteger(i);
40a1495e 612 p->http_port = (u_short) i;
7813c6d5 613 GetInteger(i);
40a1495e 614 p->icp_port = (u_short) i;
615 if (strcmp(p->host, me) == 0) {
616 for (u = Config.Port.http; u; u = u->next) {
617 if (p->http_port != u->i)
618 continue;
619 debug(15, 0) ("parse_peer: Peer looks like myself: %s %s/%d/%d\n",
620 p->type, p->host, p->http_port, p->icp_port);
621 self_destruct();
622 }
623 }
270b86af 624 while ((token = strtok(NULL, w_space))) {
625 if (!strcasecmp(token, "proxy-only")) {
40a1495e 626 p->options |= NEIGHBOR_PROXY_ONLY;
270b86af 627 } else if (!strcasecmp(token, "no-query")) {
40a1495e 628 p->options |= NEIGHBOR_NO_QUERY;
270b86af 629 } else if (!strcasecmp(token, "multicast-responder")) {
40a1495e 630 p->options |= NEIGHBOR_MCAST_RESPONDER;
270b86af 631 } else if (!strncasecmp(token, "weight=", 7)) {
40a1495e 632 p->weight = atoi(token + 7);
b3264694 633 } else if (!strncasecmp(token, "closest-only", 12)) {
634 p->options |= NEIGHBOR_CLOSEST_ONLY;
270b86af 635 } else if (!strncasecmp(token, "ttl=", 4)) {
40a1495e 636 p->mcast.ttl = atoi(token + 4);
637 if (p->mcast.ttl < 0)
638 p->mcast.ttl = 0;
639 if (p->mcast.ttl > 128)
640 p->mcast.ttl = 128;
270b86af 641 } else if (!strncasecmp(token, "default", 7)) {
40a1495e 642 p->options |= NEIGHBOR_DEFAULT_PARENT;
270b86af 643 } else if (!strncasecmp(token, "round-robin", 11)) {
40a1495e 644 p->options |= NEIGHBOR_ROUNDROBIN;
270b86af 645 } else {
40a1495e 646 debug(3, 0) ("parse_peer: token='%s'\n", token);
270b86af 647 self_destruct();
648 }
649 }
40a1495e 650 if (p->weight < 1)
651 p->weight = 1;
652 p->icp_version = ICP_VERSION_CURRENT;
653 p->tcp_up = 1;
3f6c0fb2 654 cbdataAdd(p, MEM_NONE);
0153d498 655 while (*head != NULL)
656 head = &(*head)->next;
657 *head = p;
40a1495e 658 Config.npeers++;
0153d498 659}
660
661static void
40a1495e 662free_peer(peer ** P)
0153d498 663{
40a1495e 664 peer *p;
79d39a72 665 while ((p = *P) != NULL) {
a47b9029 666 *P = p->next;
40a1495e 667 peerDestroy(p);
a47b9029 668 }
987c67d1 669 Config.npeers = 0;
270b86af 670}
671
672static void
a7d59104 673dump_cachemgrpasswd(StoreEntry * entry, const char *name, cachemgr_passwd * list)
270b86af 674{
f53b06f9 675 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 676}
677
678static void
a47b9029 679parse_cachemgrpasswd(cachemgr_passwd ** head)
270b86af 680{
681 char *passwd = NULL;
682 wordlist *actions = NULL;
683 parse_string(&passwd);
684 parse_wordlist(&actions);
f1dc9b30 685 objcachePasswdAdd(head, passwd, actions);
270b86af 686 wordlistDestroy(&actions);
687}
688
689static void
a47b9029 690free_cachemgrpasswd(cachemgr_passwd ** head)
270b86af 691{
a47b9029 692 cachemgr_passwd *p;
79d39a72 693 while ((p = *head) != NULL) {
a47b9029 694 *head = p->next;
695 xfree(p->passwd);
696 xfree(p);
697 }
270b86af 698}
699
270b86af 700
8203a132 701static void
a7d59104 702dump_denyinfo(StoreEntry * entry, const char *name, struct _acl_deny_info_list *var)
270b86af 703{
f53b06f9 704 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 705}
706
707static void
f1dc9b30 708parse_denyinfo(struct _acl_deny_info_list **var)
6e40f263 709{
f1dc9b30 710 aclParseDenyInfoLine(var);
6e40f263 711}
403279e0 712
1273d501 713void
a47b9029 714free_denyinfo(acl_deny_info_list ** list)
3c5557f9 715{
1273d501 716 struct _acl_deny_info_list *a = NULL;
717 struct _acl_deny_info_list *a_next = NULL;
718 struct _acl_name_list *l = NULL;
719 struct _acl_name_list *l_next = NULL;
720 for (a = *list; a; a = a_next) {
a47b9029 721 for (l = a->acl_list; l; l = l_next) {
722 l_next = l->next;
723 safe_free(l);
724 }
725 a_next = a->next;
726 safe_free(a);
1273d501 727 }
728 *list = NULL;
270b86af 729}
730
731static void
f1dc9b30 732parse_peeracl(void)
270b86af 733{
734 char *host = NULL;
735 char *aclname = NULL;
53ad48e6 736
270b86af 737 if (!(host = strtok(NULL, w_space)))
738 self_destruct();
f1dc9b30 739 while ((aclname = strtok(NULL, list_sep))) {
40a1495e 740 peer *p;
f1dc9b30 741 acl_list *L = NULL;
742 acl_list **Tail = NULL;
743 acl *a = NULL;
40a1495e 744 if ((p = peerFindByName(host)) == NULL) {
43c3424b 745 debug(15, 0) ("%s, line %d: No cache_peer '%s'\n",
f1dc9b30 746 cfg_filename, config_lineno, host);
747 return;
748 }
749 L = xcalloc(1, sizeof(struct _acl_list));
750 L->op = 1;
751 if (*aclname == '!') {
752 L->op = 0;
753 aclname++;
754 }
755 debug(15, 3) ("neighborAddAcl: looking for ACL name '%s'\n", aclname);
756 a = aclFindByName(aclname);
757 if (a == NULL) {
758 debug(15, 0) ("%s line %d: %s\n",
759 cfg_filename, config_lineno, config_input_line);
760 debug(15, 0) ("neighborAddAcl: ACL name '%s' not found.\n", aclname);
761 xfree(L);
762 return;
763 }
764 L->acl = a;
765 for (Tail = &p->acls; *Tail; Tail = &(*Tail)->next);
766 *Tail = L;
767 }
270b86af 768}
769
270b86af 770static void
771parse_hostdomain(void)
772{
773 char *host = NULL;
774 char *domain = NULL;
775 if (!(host = strtok(NULL, w_space)))
776 self_destruct();
f1dc9b30 777 while ((domain = strtok(NULL, list_sep))) {
778 domain_ping *l = NULL;
779 domain_ping **L = NULL;
40a1495e 780 peer *p;
781 if ((p = peerFindByName(host)) == NULL) {
43c3424b 782 debug(15, 0) ("%s, line %d: No cache_peer '%s'\n",
f1dc9b30 783 cfg_filename, config_lineno, host);
784 continue;
785 }
786 l = xcalloc(1, sizeof(struct _domain_ping));
787 l->do_ping = 1;
788 if (*domain == '!') { /* check for !.edu */
789 l->do_ping = 0;
790 domain++;
791 }
792 l->domain = xstrdup(domain);
793 for (L = &(p->pinglist); *L; L = &((*L)->next));
794 *L = l;
795 }
270b86af 796}
797
798static void
799parse_hostdomaintype(void)
800{
801 char *host = NULL;
802 char *type = NULL;
803 char *domain = NULL;
804 if (!(host = strtok(NULL, w_space)))
805 self_destruct();
806 if (!(type = strtok(NULL, w_space)))
807 self_destruct();
f1dc9b30 808 while ((domain = strtok(NULL, list_sep))) {
809 domain_type *l = NULL;
810 domain_type **L = NULL;
40a1495e 811 peer *p;
812 if ((p = peerFindByName(host)) == NULL) {
43c3424b 813 debug(15, 0) ("%s, line %d: No cache_peer '%s'\n",
f1dc9b30 814 cfg_filename, config_lineno, host);
815 return;
816 }
817 l = xcalloc(1, sizeof(struct _domain_type));
818 l->type = parseNeighborType(type);
819 l->domain = xstrdup(domain);
820 for (L = &(p->typelist); *L; L = &((*L)->next));
821 *L = l;
822 }
270b86af 823}
824
825static void
a7d59104 826dump_httpanonymizer(StoreEntry * entry, const char *name, int var)
270b86af 827{
828 switch (var) {
829 case ANONYMIZER_NONE:
f0b19334 830 storeAppendPrintf(entry, "%s off\n", name);
270b86af 831 break;
832 case ANONYMIZER_STANDARD:
f0b19334 833 storeAppendPrintf(entry, "%s paranoid\n", name);
270b86af 834 break;
835 case ANONYMIZER_PARANOID:
f0b19334 836 storeAppendPrintf(entry, "%s standard\n", name);
270b86af 837 break;
838 }
839}
840
841static void
842parse_httpanonymizer(int *var)
fa562c67 843{
844 char *token;
845 token = strtok(NULL, w_space);
846 if (token == NULL)
bba6fa8f 847 self_destruct();
fa562c67 848 if (!strcasecmp(token, "off"))
270b86af 849 *var = ANONYMIZER_NONE;
fa562c67 850 else if (!strcasecmp(token, "paranoid"))
270b86af 851 *var = ANONYMIZER_PARANOID;
fa562c67 852 else
270b86af 853 *var = ANONYMIZER_STANDARD;
854}
855
641941c0 856
270b86af 857static void
a7d59104 858dump_ushortlist(StoreEntry * entry, const char *name, ushortlist * u)
090089c4 859{
270b86af 860 while (u) {
f53b06f9 861 storeAppendPrintf(entry, "%s %d\n", name, (int) u->i);
270b86af 862 u = u->next;
863 }
864}
090089c4 865
f53b06f9 866static int
867check_null_ushortlist(ushortlist * u)
868{
869 return u == NULL;
870}
871
270b86af 872static void
873parse_ushortlist(ushortlist ** P)
874{
875 char *token;
876 int i;
877 ushortlist *u;
878 ushortlist **U;
879 while ((token = strtok(NULL, w_space))) {
880 if (sscanf(token, "%d", &i) != 1)
881 self_destruct();
882 if (i < 0)
883 i = 0;
884 u = xcalloc(1, sizeof(ushortlist));
885 u->i = (u_short) i;
886 for (U = P; *U; U = &(*U)->next);
887 *U = u;
090089c4 888 }
270b86af 889}
090089c4 890
0153d498 891static void
a47b9029 892free_ushortlist(ushortlist ** P)
0153d498 893{
a47b9029 894 ushortlist *u;
79d39a72 895 while ((u = *P) != NULL) {
a47b9029 896 *P = u->next;
897 xfree(u);
898 }
0153d498 899}
900
270b86af 901static void
a7d59104 902dump_int(StoreEntry * entry, const char *name, int var)
270b86af 903{
f53b06f9 904 storeAppendPrintf(entry, "%s %d\n", name, var);
270b86af 905}
c1c29eb6 906
270b86af 907static void
908parse_int(int *var)
909{
910 char *token;
911 int i;
270b86af 912 GetInteger(i);
913 *var = i;
914}
090089c4 915
0153d498 916static void
917free_int(int *var)
918{
a47b9029 919 *var = 0;
0153d498 920}
921
270b86af 922static void
a7d59104 923dump_onoff(StoreEntry * entry, const char *name, int var)
270b86af 924{
f53b06f9 925 storeAppendPrintf(entry, "%s %s\n", name, var ? "on" : "off");
270b86af 926}
090089c4 927
270b86af 928static void
929parse_onoff(int *var)
930{
931 char *token = strtok(NULL, w_space);
090089c4 932
270b86af 933 if (token == NULL)
934 self_destruct();
935 if (!strcasecmp(token, "on") || !strcasecmp(token, "enable"))
936 *var = 1;
937 else
938 *var = 0;
939}
e90100aa 940
0153d498 941#define free_onoff free_int
f1dc9b30 942#define free_httpanonymizer free_int
f1dc9b30 943#define dump_eol dump_string
944#define free_eol free_string
30a4f2a8 945
270b86af 946static void
a7d59104 947dump_refreshpattern(StoreEntry * entry, const char *name, refresh_t * head)
270b86af 948{
f53b06f9 949 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 950}
090089c4 951
270b86af 952static void
f1dc9b30 953parse_refreshpattern(refresh_t ** head)
270b86af 954{
f1dc9b30 955 char *token;
956 char *pattern;
957 time_t min = 0;
958 int pct = 0;
959 time_t max = 0;
960 int i;
961 refresh_t *t;
962 regex_t comp;
963 int errcode;
964 int flags = REG_EXTENDED | REG_NOSUB;
965 if ((token = strtok(NULL, w_space)) == NULL)
966 self_destruct();
967 if (strcmp(token, "-i") == 0) {
968 flags |= REG_ICASE;
969 token = strtok(NULL, w_space);
970 } else if (strcmp(token, "+i") == 0) {
971 flags &= ~REG_ICASE;
972 token = strtok(NULL, w_space);
973 }
974 if (token == NULL)
975 self_destruct();
976 pattern = xstrdup(token);
977 GetInteger(i); /* token: min */
978 min = (time_t) (i * 60); /* convert minutes to seconds */
979 GetInteger(i); /* token: pct */
980 pct = i;
981 GetInteger(i); /* token: max */
982 max = (time_t) (i * 60); /* convert minutes to seconds */
983 if ((errcode = regcomp(&comp, pattern, flags)) != 0) {
984 char errbuf[256];
985 regerror(errcode, &comp, errbuf, sizeof errbuf);
986 debug(22, 0) ("%s line %d: %s\n",
987 cfg_filename, config_lineno, config_input_line);
988 debug(22, 0) ("refreshAddToList: Invalid regular expression '%s': %s\n",
989 pattern, errbuf);
990 return;
991 }
992 pct = pct < 0 ? 0 : pct;
993 max = max < 0 ? 0 : max;
994 t = xcalloc(1, sizeof(refresh_t));
995 t->pattern = (char *) xstrdup(pattern);
996 t->compiled_pattern = comp;
997 t->min = min;
998 t->pct = pct;
999 t->max = max;
1000 t->next = NULL;
1001 while (*head)
1002 head = &(*head)->next;
1003 *head = t;
1004 safe_free(pattern);
270b86af 1005}
090089c4 1006
270b86af 1007static void
a47b9029 1008free_refreshpattern(refresh_t ** head)
270b86af 1009{
f1dc9b30 1010 refresh_t *t;
79d39a72 1011 while ((t = *head) != NULL) {
f1dc9b30 1012 *head = t->next;
1013 safe_free(t->pattern);
1014 regfree(&t->compiled_pattern);
1015 safe_free(t);
1016 }
270b86af 1017}
12b9e9b1 1018
270b86af 1019static void
a7d59104 1020dump_regexlist(StoreEntry * entry, const char *name, relist * var)
270b86af 1021{
f53b06f9 1022 storeAppendPrintf(entry, "%s -- UNIMPLEMENTED\n", name);
270b86af 1023}
cf5fd929 1024
270b86af 1025static void
1026parse_regexlist(relist ** var)
1027{
0153d498 1028 aclParseRegexList(var);
270b86af 1029}
fb263c4c 1030
270b86af 1031static void
0153d498 1032free_regexlist(relist ** var)
270b86af 1033{
0153d498 1034 aclDestroyRegexList(*var);
1035 *var = NULL;
270b86af 1036}
7d49daab 1037
270b86af 1038static void
a7d59104 1039dump_string(StoreEntry * entry, const char *name, char *var)
270b86af 1040{
f53b06f9 1041 if (var != NULL)
a7d59104 1042 storeAppendPrintf(entry, "%s %s\n", name, var);
270b86af 1043}
98ffb7e4 1044
270b86af 1045static void
0153d498 1046parse_string(char **var)
270b86af 1047{
1048 char *token = strtok(NULL, w_space);
270b86af 1049 safe_free(*var);
1050 if (token == NULL)
1051 self_destruct();
1052 *var = xstrdup(token);
1053}
b15e6857 1054
0153d498 1055static void
1056free_string(char **var)
1057{
a47b9029 1058 xfree(*var);
1059 *var = NULL;
0153d498 1060}
caebbe00 1061
270b86af 1062static void
f1dc9b30 1063parse_eol(char *volatile *var)
270b86af 1064{
1065 char *token = strtok(NULL, null_string);
270b86af 1066 safe_free(*var);
f1dc9b30 1067 if (token == NULL)
1068 self_destruct();
270b86af 1069 *var = xstrdup(token);
1070}
090089c4 1071
270b86af 1072static void
a7d59104 1073dump_time_t(StoreEntry * entry, const char *name, time_t var)
090089c4 1074{
f53b06f9 1075 storeAppendPrintf(entry, "%s %d seconds\n", name, (int) var);
090089c4 1076}
1077
270b86af 1078static void
a47b9029 1079parse_time_t(time_t * var)
0ffd22bc 1080{
f1dc9b30 1081 parseTimeLine(var, T_SECOND_STR);
0ffd22bc 1082}
1083
270b86af 1084static void
a47b9029 1085free_time_t(time_t * var)
270b86af 1086{
a47b9029 1087 *var = 0;
270b86af 1088}
9906e724 1089
1090static void
a7d59104 1091dump_size_t(StoreEntry * entry, const char *name, size_t var)
1b635117 1092{
f53b06f9 1093 storeAppendPrintf(entry, "%s %d\n", name, (int) var);
1b635117 1094}
1095
1096static void
a7d59104 1097dump_b_size_t(StoreEntry * entry, const char *name, size_t var)
9906e724 1098{
f53b06f9 1099 storeAppendPrintf(entry, "%s %d %s\n", name, (int) var, B_BYTES_STR);
9906e724 1100}
1101
1102static void
a7d59104 1103dump_kb_size_t(StoreEntry * entry, const char *name, size_t var)
9906e724 1104{
f53b06f9 1105 storeAppendPrintf(entry, "%s %d %s\n", name, (int) var, B_KBYTES_STR);
9906e724 1106}
1107
1108static void
a47b9029 1109parse_size_t(size_t * var)
1b635117 1110{
1111 char *token;
1112 int i;
1113 GetInteger(i);
1114 *var = (size_t) i;
1115}
1116
1117static void
1118parse_b_size_t(size_t * var)
9906e724 1119{
1120 parseBytesLine(var, B_BYTES_STR);
1121}
1122
1123static void
a47b9029 1124parse_kb_size_t(size_t * var)
9906e724 1125{
1126 parseBytesLine(var, B_KBYTES_STR);
1127}
1128
1129static void
a47b9029 1130free_size_t(size_t * var)
9906e724 1131{
a47b9029 1132 *var = 0;
9906e724 1133}
1134
1b635117 1135#define free_b_size_t free_size_t
9906e724 1136#define free_kb_size_t free_size_t
1137#define free_mb_size_t free_size_t
1138#define free_gb_size_t free_size_t
090089c4 1139
8203a132 1140static void
a7d59104 1141dump_ushort(StoreEntry * entry, const char *name, u_short var)
090089c4 1142{
f53b06f9 1143 storeAppendPrintf(entry, "%s %d\n", name, var);
270b86af 1144}
090089c4 1145
0153d498 1146static void
a47b9029 1147free_ushort(u_short * u)
0153d498 1148{
1149 *u = 0;
1150}
1151
270b86af 1152static void
1153parse_ushort(u_short * var)
1154{
1155 char *token;
1156 int i;
090089c4 1157
270b86af 1158 GetInteger(i);
1159 if (i < 0)
1160 i = 0;
1161 *var = (u_short) i;
090089c4 1162}
1163
270b86af 1164static void
a7d59104 1165dump_wordlist(StoreEntry * entry, const char *name, wordlist * list)
270b86af 1166{
270b86af 1167 while (list != NULL) {
f53b06f9 1168 storeAppendPrintf(entry, "%s %s\n", name, list->key);
270b86af 1169 list = list->next;
429fdbec 1170 }
429fdbec 1171}
1172
270b86af 1173static void
1174parse_wordlist(wordlist ** list)
429fdbec 1175{
270b86af 1176 char *token;
1177
1178 while ((token = strtok(NULL, w_space)))
1179 wordlistAdd(list, token);
429fdbec 1180}
270b86af 1181
0153d498 1182#define free_wordlist wordlistDestroy
270b86af 1183
1184#include "cf_parser.c"
f1dc9b30 1185
1186peer_t
1187parseNeighborType(const char *s)
1188{
1189 if (!strcasecmp(s, "parent"))
1190 return PEER_PARENT;
1191 if (!strcasecmp(s, "neighbor"))
1192 return PEER_SIBLING;
1193 if (!strcasecmp(s, "neighbour"))
1194 return PEER_SIBLING;
1195 if (!strcasecmp(s, "sibling"))
1196 return PEER_SIBLING;
1197 if (!strcasecmp(s, "multicast"))
1198 return PEER_MULTICAST;
1199 debug(15, 0) ("WARNING: Unknown neighbor type: %s\n", s);
1200 return PEER_SIBLING;
1201}
f150dd4b 1202
1203void
1204configFreeMemory(void)
1205{
23ff6968 1206 free_all();
f150dd4b 1207}
f0b19334 1208
1209static void
1210requirePathnameExists(const char *name, const char *path)
1211{
1212 struct stat sb;
1213 char buf[MAXPATHLEN];
1214 assert(path != NULL);
1215 if (stat(path, &sb) < 0) {
1216 snprintf(buf, MAXPATHLEN, "%s: %s", path, xstrerror());
1217 fatal(buf);
1218 }
1219}