71
|
1 #include "context.h"
|
|
2
|
|
3 static char* context_version="$Id:";
|
|
4
|
|
5 char *token_black;
|
|
6 char *token_content;
|
|
7 char *token_context;
|
|
8 char *token_dccfrom;
|
|
9 char *token_dccto;
|
|
10 char *token_default;
|
|
11 char *token_dnsbl;
|
|
12 char *token_dnsbll;
|
|
13 char *token_envfrom;
|
|
14 char *token_envto;
|
|
15 char *token_filter;
|
|
16 char *token_host_limit;
|
|
17 char *token_html_limit;
|
|
18 char *token_html_tags;
|
|
19 char *token_ignore;
|
|
20 char *token_include;
|
|
21 char *token_inherit;
|
|
22 char *token_lbrace;
|
|
23 char *token_many;
|
|
24 char *token_off;
|
|
25 char *token_ok;
|
|
26 char *token_ok2;
|
|
27 char *token_on;
|
|
28 char *token_rbrace;
|
|
29 char *token_semi;
|
|
30 char *token_soft;
|
|
31 char *token_tld;
|
|
32 char *token_unknown;
|
|
33 char *token_white;
|
|
34
|
|
35 string_set all_strings; // owns all the strings, only modified by the config loader thread
|
|
36
|
|
37 DNSBL::DNSBL(char *n, char *s, char *m) {
|
|
38 name = n;
|
|
39 suffix = s;
|
|
40 message = m;
|
|
41 }
|
|
42
|
|
43
|
|
44 CONFIG::CONFIG() {
|
|
45 reference_count = 0;
|
|
46 generation = 0;
|
|
47 load_time = 0;
|
|
48 default_context = NULL;
|
|
49 }
|
|
50
|
|
51
|
|
52 CONFIG::~CONFIG() {
|
|
53 for (context_list::iterator i=contexts.begin(); i!=contexts.end(); i++) {
|
|
54 CONTEXT *c = *i;
|
|
55 delete c;
|
|
56 }
|
|
57 }
|
|
58
|
|
59
|
|
60 void CONFIG::add_context(CONTEXTP con) {
|
|
61 contexts.push_back(con);
|
|
62 if (!default_context && !con->get_parent()) {
|
|
63 // first global context
|
|
64 default_context = con;
|
|
65 }
|
|
66 }
|
|
67
|
|
68
|
|
69 CONTEXTP CONFIG::find_context(char *to, char *from) {
|
|
70 CONTEXTP con = NULL;
|
|
71 context_map::iterator i = env_to.find(from);
|
|
72 if (i != env_to.end()) {
|
|
73 con = (*i).second;
|
|
74 return con->find_from_context(from);
|
|
75 }
|
|
76 char *x = strchr(to, '@');
|
|
77 if (x) {
|
|
78 x++;
|
|
79 i = env_to.find(x);
|
|
80 if (i != env_to.end()) {
|
|
81 con = (*i).second;
|
|
82 return con->find_from_context(from);
|
|
83 }
|
|
84 }
|
|
85 if (default_context) {
|
|
86 return default_context->find_from_context(from);
|
|
87 }
|
|
88 return NULL;
|
|
89 }
|
|
90
|
|
91
|
|
92 void CONFIG::dump() {
|
|
93 if (default_context) default_context->dump();
|
|
94 for (context_list::iterator i=contexts.begin(); i!=contexts.end(); i++) {
|
|
95 CONTEXTP c = *i;
|
|
96 CONTEXTP p = c->get_parent();
|
|
97 if (!p && (c != default_context)) c->dump();
|
|
98 }
|
|
99 }
|
|
100
|
|
101
|
|
102 CONTEXT::CONTEXT(CONTEXTP parent_, char *name_) {
|
|
103 parent = parent_;
|
|
104 name = name_;
|
|
105 env_from_default = (parent) ? token_inherit : token_unknown;
|
|
106 content_filtering = (parent) ? parent->content_filtering : false;
|
|
107 content_suffix = NULL;
|
|
108 content_message = NULL;
|
|
109 host_limit = 0;
|
|
110 host_limit_message = NULL;
|
|
111 host_random = false;
|
|
112 tag_limit = 0;
|
|
113 tag_limit_message = NULL;
|
|
114 }
|
|
115
|
|
116
|
|
117 CONTEXT::~CONTEXT() {
|
|
118 for (dnsblp_map::iterator i=dnsbl_names.begin(); i!=dnsbl_names.end(); i++) {
|
|
119 DNSBLP d = (*i).second;
|
|
120 // delete the underlying DNSBL objects.
|
|
121 delete d;
|
|
122 }
|
|
123 }
|
|
124
|
|
125
|
|
126 char *CONTEXT::get_full_name(char *buffer, int size) {
|
|
127 if (!parent) return name;
|
|
128 const int maxlen = 1000;
|
|
129 char buf[maxlen];
|
|
130 snprintf(buffer, size, "%s.%s", parent->get_full_name(buf, maxlen), name);
|
|
131 return buffer;
|
|
132 }
|
|
133
|
|
134
|
|
135 bool CONTEXT::cover_env_to(char *to) {
|
|
136 const int maxlen = 1000;
|
|
137 char buffer[maxlen];
|
|
138 char *x = strchr(to, '@');
|
|
139 if (x) x++;
|
|
140 else x = to;
|
|
141 string_set::iterator i = env_to.find(x);
|
|
142 if (i != env_to.end()) return true;
|
|
143 return (parent) ? parent->cover_env_to(to) : false;
|
|
144 }
|
|
145
|
|
146
|
|
147 char *CONTEXT::find_from(char *from) {
|
|
148 // do we have a white/black/unknown for this full from value?
|
|
149 string_map::iterator i = env_from.find(from);
|
|
150 if (i != env_from.end()) return (*i).second;
|
|
151 // do we have a white/black/unknown for the source domain name?
|
|
152 char *x = strchr(from, '@');
|
|
153 if (x) {
|
|
154 x++;
|
|
155 i = env_from.find(x);
|
|
156 if (i != env_from.end()) return (*i).second;
|
|
157 }
|
|
158 if ((env_from_default == token_inherit) && parent) {
|
|
159 return parent->find_from(from);
|
|
160 }
|
|
161 return env_from_default;
|
|
162 }
|
|
163
|
|
164
|
|
165 CONTEXTP CONTEXT::find_from_context(char *from) {
|
|
166 // do we have a special child context for this full from value?
|
|
167 context_map::iterator j = env_from_context.find(from);
|
|
168 if (j != env_from_context.end()) {
|
|
169 CONTEXTP con = (*j).second;
|
|
170 return con->find_from_context(from);
|
|
171 }
|
|
172 char *x = strchr(from, '@');
|
|
173 if (x) {
|
|
174 x++;
|
|
175 // do we have a special context for the source domain name?
|
|
176 j = env_from_context.find(x);
|
|
177 if (j != env_from_context.end()) {
|
|
178 CONTEXTP con = (*j).second;
|
|
179 return con->find_from_context(from);
|
|
180 }
|
|
181 }
|
|
182 return this;
|
|
183 }
|
|
184
|
|
185
|
|
186 CONTEXTP CONTEXT::find_from_context_name(char *name) {
|
|
187 context_map::iterator i = children.find(name);
|
|
188 if (i != children.end()) return (*i).second;
|
|
189 return NULL;
|
|
190 }
|
|
191
|
|
192
|
|
193 DNSBLP CONTEXT::find_dnsbl(char *name) {
|
|
194 dnsblp_map::iterator i = dnsbl_names.find(name);
|
|
195 if (i != dnsbl_names.end()) return (*i).second;
|
|
196 if (parent) return parent->find_dnsbl(name);
|
|
197 return NULL;
|
|
198 }
|
|
199
|
|
200
|
|
201 void CONTEXT::dump(int level) {
|
|
202 const int maxlen = 1000;
|
|
203 char indent[maxlen];
|
|
204 int i = min(maxlen-1, level*4);
|
|
205 memset(indent, ' ', i);
|
|
206 indent[i] = '\0';
|
|
207 printf("%s context %s { \n", indent, name);
|
|
208
|
|
209 for (dnsblp_map::iterator i=dnsbl_names.begin(); i!=dnsbl_names.end(); i++) {
|
|
210 char *n = (*i).first;
|
|
211 DNSBL &d = *(*i).second;
|
|
212 printf("%s dnsbl %s %s \"%s\"; \n", indent, n, d.suffix, d.message);
|
|
213 }
|
|
214
|
|
215 if (!dnsbl_list.empty()) {
|
|
216 printf("%s dnsbl_list", indent);
|
|
217 for (dnsblp_list::iterator i=dnsbl_list.begin(); i!=dnsbl_list.end(); i++) {
|
|
218 DNSBL &d = *(*i);
|
|
219 printf(" %s", d.name);
|
|
220 }
|
|
221 printf("; \n");
|
|
222 }
|
|
223
|
|
224 if (content_filtering) {
|
|
225 printf("%s content on { \n", indent, env_from_default);
|
|
226 if (content_suffix) {
|
|
227 printf("%s filter %s \"%s\"; \n", indent, content_suffix, content_message);
|
|
228 }
|
|
229 if (!content_host_ignore.empty()) {
|
|
230 printf("%s ignore { \n", indent);
|
|
231 for (string_set::iterator i=content_host_ignore.begin(); i!=content_host_ignore.end(); i++) {
|
|
232 printf("%s %s; \n", indent, *i);
|
|
233 }
|
|
234 printf("%s }; \n", indent);
|
|
235 }
|
|
236 if (!content_tlds.empty()) {
|
|
237 printf("%s tld { \n", indent);
|
|
238 printf("%s ", indent);
|
|
239 for (string_set::iterator i=content_tlds.begin(); i!=content_tlds.end(); i++) {
|
|
240 printf("%s; ", *i);
|
|
241 }
|
|
242 printf("\n%s }; \n", indent);
|
|
243 }
|
|
244 if (!html_tags.empty()) {
|
|
245 printf("%s html_tags { \n", indent);
|
|
246 printf("%s ", indent);
|
|
247 for (string_set::iterator i=html_tags.begin(); i!=html_tags.end(); i++) {
|
|
248 printf("%s; ", *i);
|
|
249 }
|
|
250 printf("\n%s }; \n", indent);
|
|
251 }
|
|
252 if (host_limit_message) {
|
|
253 printf("%s host_limit on %d \"%s\"; \n", indent, host_limit, host_limit_message);
|
|
254 }
|
|
255 else if (host_random) {
|
|
256 printf("%s host_limit soft %d; \n", indent, host_limit);
|
|
257 }
|
|
258 else {
|
|
259 printf("%s host_limit off; \n", indent);
|
|
260 }
|
|
261 if (tag_limit_message) {
|
|
262 printf("%s tag_limit on %d \"%s\"; \n", indent, tag_limit, tag_limit_message);
|
|
263 }
|
|
264 else {
|
|
265 printf("%s tag_limit off; \n", indent);
|
|
266 }
|
|
267 printf("%s }; \n", indent);
|
|
268 }
|
|
269 else {
|
|
270 printf("%s content off {}; \n", indent, env_from_default);
|
|
271 }
|
|
272
|
|
273 printf("%s env_to { \n", indent);
|
|
274 for (string_set::iterator i=env_to.begin(); i!=env_to.end(); i++) {
|
|
275 printf("%s %s; \n", indent, *i);
|
|
276 }
|
|
277 printf("%s }; \n", indent);
|
|
278
|
|
279 for (context_map::iterator i=children.begin(); i!=children.end(); i++) {
|
|
280 CONTEXTP c = (*i).second;
|
|
281 c->dump(level+1);
|
|
282 }
|
|
283
|
|
284 printf("%s env_from %s { \n", indent, env_from_default);
|
|
285 if (!env_from.empty()) {
|
|
286 printf("%s // white/black/unknown \n", indent);
|
|
287 for (string_map::iterator i=env_from.begin(); i!=env_from.end(); i++) {
|
|
288 char *f = (*i).first;
|
|
289 char *t = (*i).second;
|
|
290 printf("%s %s \t %s; \n", indent, f, t);
|
|
291 }
|
|
292 }
|
|
293 if (!env_from_context.empty()) {
|
|
294 printf("%s // child contexts \n", indent);
|
|
295 for (context_map::iterator j=env_from_context.begin(); j!=env_from_context.end(); j++) {
|
|
296 char *f = (*j).first;
|
|
297 CONTEXTP t = (*j).second;
|
|
298 printf("%s %s \t %s; \n", indent, f, t->name);
|
|
299 }
|
|
300 }
|
|
301 printf("%s }; \n", indent);
|
|
302
|
|
303 printf("%s }; \n", indent);
|
|
304 }
|
|
305
|
|
306
|
|
307 ////////////////////////////////////////////////
|
|
308 // helper to discard the strings held by a string_set
|
|
309 //
|
|
310 static void discard(string_set &s) {
|
|
311 for (string_set::iterator i=s.begin(); i!=s.end(); i++) {
|
|
312 free(*i);
|
|
313 }
|
|
314 s.clear();
|
|
315 }
|
|
316
|
|
317
|
|
318 ////////////////////////////////////////////////
|
|
319 // helper to register a string in a string set
|
|
320 //
|
|
321 char* register_string(string_set &s, char *name) {
|
|
322 string_set::iterator i = s.find(name);
|
|
323 if (i != s.end()) return *i;
|
|
324 char *x = strdup(name);
|
|
325 s.insert(x);
|
|
326 return x;
|
|
327 }
|
|
328
|
|
329
|
|
330 ////////////////////////////////////////////////
|
|
331 // register a global string
|
|
332 //
|
|
333 char* register_string(char *name) {
|
|
334 return register_string(all_strings, name);
|
|
335 }
|
|
336
|
|
337
|
|
338 ////////////////////////////////////////////////
|
|
339 //
|
|
340 bool tsa(TOKEN &tok, char *token);
|
|
341 bool tsa(TOKEN &tok, char *token) {
|
|
342 char *have = tok.next();
|
|
343 if (have == token) return true;
|
|
344 tok.token_error(token, have);
|
|
345 return false;
|
|
346 }
|
|
347
|
|
348
|
|
349 ////////////////////////////////////////////////
|
|
350 //
|
|
351 bool parse_dnsbl(TOKEN &tok, CONFIG &dc, CONTEXT &me);
|
|
352 bool parse_dnsbl(TOKEN &tok, CONFIG &dc, CONTEXT &me) {
|
|
353 char *name = tok.next();
|
|
354 char *suf = tok.next();
|
|
355 char *msg = tok.next();
|
|
356 if (!tsa(tok, token_semi)) return false;
|
|
357 DNSBLP dns = new DNSBL(name, suf, msg);
|
|
358 me.add_dnsbl(name, dns);
|
|
359 return true;
|
|
360 }
|
|
361
|
|
362
|
|
363 ////////////////////////////////////////////////
|
|
364 //
|
|
365 bool parse_dnsbll(TOKEN &tok, CONFIG &dc, CONTEXT &me);
|
|
366 bool parse_dnsbll(TOKEN &tok, CONFIG &dc, CONTEXT &me) {
|
|
367 while (true) {
|
|
368 char *have = tok.next();
|
|
369 if (!have) break;
|
|
370 if (have == token_semi) break;
|
|
371 DNSBLP dns = me.find_dnsbl(have);
|
|
372 if (dns) {
|
|
373 me.add_dnsbl(dns);
|
|
374 }
|
|
375 else {
|
|
376 tok.token_error("dnsbl name", have);
|
|
377 return false;
|
|
378 }
|
|
379 }
|
|
380 return true;
|
|
381 }
|
|
382
|
|
383
|
|
384 ////////////////////////////////////////////////
|
|
385 //
|
|
386 bool parse_content(TOKEN &tok, CONFIG &dc, CONTEXT &me);
|
|
387 bool parse_content(TOKEN &tok, CONFIG &dc, CONTEXT &me) {
|
|
388 char *setting = tok.next();
|
|
389 if (setting == token_on) {
|
|
390 me.set_content_filtering(true);
|
|
391 }
|
|
392 else if (setting == token_off) {
|
|
393 me.set_content_filtering(false);
|
|
394 }
|
|
395 else {
|
|
396 tok.token_error("on/off", setting);
|
|
397 return false;
|
|
398 }
|
|
399 if (!tsa(tok, token_lbrace)) return false;
|
|
400 while (true) {
|
|
401 char *have = tok.next();
|
|
402 if (!have) break;
|
|
403 if (have == token_filter) {
|
|
404 me.set_content_suffix(tok.next());
|
|
405 me.set_content_message(tok.next());
|
|
406 if (!tsa(tok, token_semi)) return false;
|
|
407 }
|
|
408 else if (have == token_ignore) {
|
|
409 if (!tsa(tok, token_lbrace)) return false;
|
|
410 while (true) {
|
|
411 if (!have) break;
|
|
412 char *have = tok.next();
|
|
413 if (have == token_rbrace) {
|
|
414 break; // done
|
|
415 }
|
|
416 else {
|
|
417 me.add_ignore(have);
|
|
418 }
|
|
419 }
|
|
420 if (!tsa(tok, token_semi)) return false;
|
|
421 }
|
|
422 else if (have == token_tld) {
|
|
423 if (!tsa(tok, token_lbrace)) return false;
|
|
424 while (true) {
|
|
425 char *have = tok.next();
|
|
426 if (!have) break;
|
|
427 if (have == token_rbrace) {
|
|
428 break; // done
|
|
429 }
|
|
430 else {
|
|
431 me.add_tld(have);
|
|
432 }
|
|
433 }
|
|
434 if (!tsa(tok, token_semi)) return false;
|
|
435 }
|
|
436 else if (have == token_html_limit) {
|
|
437 have = tok.next();
|
|
438 if (have == token_on) {
|
|
439 me.set_tag_limit(tok.nextint());
|
|
440 me.set_tag_message(tok.next());
|
|
441 }
|
|
442 else if (have == token_off) {
|
|
443 me.set_tag_limit(0);
|
|
444 me.set_tag_message(NULL);
|
|
445 }
|
|
446 else {
|
|
447 tok.token_error("on/off", have);
|
|
448 return false;
|
|
449 }
|
|
450 if (!tsa(tok, token_semi)) return false;
|
|
451 }
|
|
452 else if (have == token_html_tags) {
|
|
453 if (!tsa(tok, token_lbrace)) return false;
|
|
454 while (true) {
|
|
455 char *have = tok.next();
|
|
456 if (!have) break;
|
|
457 if (have == token_rbrace) {
|
|
458 break; // done
|
|
459 }
|
|
460 else {
|
|
461 me.add_tag(have);
|
|
462 }
|
|
463 }
|
|
464 if (!tsa(tok, token_semi)) return false;
|
|
465 }
|
|
466 else if (have == token_host_limit) {
|
|
467 have = tok.next();
|
|
468 if (have == token_on) {
|
|
469 me.set_host_limit(tok.nextint());
|
|
470 me.set_host_message(tok.next());
|
|
471 me.set_host_random(false);
|
|
472 }
|
|
473 else if (have == token_off) {
|
|
474 me.set_host_limit(0);
|
|
475 me.set_host_message(NULL);
|
|
476 me.set_host_random(false);
|
|
477 }
|
|
478 else if (have == token_soft) {
|
|
479 me.set_host_limit(tok.nextint());
|
|
480 me.set_host_message(NULL);
|
|
481 me.set_host_random(true);
|
|
482 }
|
|
483 else {
|
|
484 tok.token_error("on/off/soft", have);
|
|
485 return false;
|
|
486 }
|
|
487 if (!tsa(tok, token_semi)) return false;
|
|
488 }
|
|
489 else if (have == token_rbrace) {
|
|
490 break; // done
|
|
491 }
|
|
492 else {
|
|
493 tok.token_error("content keyword", have);
|
|
494 return false;
|
|
495 }
|
|
496 }
|
|
497 return tsa(tok, token_semi);
|
|
498 }
|
|
499
|
|
500
|
|
501 ////////////////////////////////////////////////
|
|
502 //
|
|
503 bool parse_envto(TOKEN &tok, CONFIG &dc, CONTEXT &me);
|
|
504 bool parse_envto(TOKEN &tok, CONFIG &dc, CONTEXT &me) {
|
|
505 if (!tsa(tok, token_lbrace)) return false;
|
|
506 while (true) {
|
|
507 char *have = tok.next();
|
|
508 if (!have) break;
|
|
509 if (have == token_rbrace) break;
|
|
510 if (have == token_semi) {
|
|
511 // optional separators
|
|
512 }
|
|
513 else if (have == token_dccto) {
|
|
514 char *flavor = tok.next();
|
|
515 if (!tsa(tok, token_lbrace)) return false;
|
|
516 bool keeping = false;
|
|
517 while (true) {
|
|
518 char *have = tok.next();
|
|
519 if (!have) break;
|
|
520 if (have == token_rbrace) break;
|
|
521 if (have == flavor) {
|
|
522 keeping = true;
|
|
523 continue;
|
|
524 }
|
|
525 else if ((have == token_ok) || (have == token_ok2) || (have == token_many)) {
|
|
526 keeping = false;
|
|
527 continue;
|
|
528 }
|
|
529 if (have == token_envto) {
|
|
530 have = tok.next();
|
|
531 if (keeping) {
|
|
532 if (me.allow_env_to(have)) {
|
|
533 me.add_to(have);
|
|
534 dc.add_to(have, &me);
|
|
535 }
|
|
536 }
|
|
537 }
|
|
538 tok.skipeol();
|
|
539 }
|
|
540 }
|
|
541 else if (me.allow_env_to(have)) {
|
|
542 me.add_to(have);
|
|
543 dc.add_to(have, &me);
|
|
544 }
|
|
545 else {
|
|
546 tok.token_error("valid env_to address or domain name", have);
|
|
547 return false;
|
|
548 }
|
|
549 }
|
|
550 return tsa(tok, token_semi);
|
|
551 }
|
|
552
|
|
553
|
|
554 ////////////////////////////////////////////////
|
|
555 //
|
|
556 bool parse_envfrom(TOKEN &tok, CONFIG &dc, CONTEXT &me);
|
|
557 bool parse_envfrom(TOKEN &tok, CONFIG &dc, CONTEXT &me) {
|
|
558 char *st = tok.next();
|
|
559 if ((st == token_black) || (st == token_white) || (st == token_unknown)) {
|
|
560 me.set_from_default(st);
|
|
561 }
|
|
562 else {
|
|
563 tok.push(st);
|
|
564 }
|
|
565 if (!tsa(tok, token_lbrace)) return false;
|
|
566 while (true) {
|
|
567 char *have = tok.next();
|
|
568 if (!have) break;
|
|
569 if (have == token_rbrace) break;
|
|
570 if (have == token_semi) {
|
|
571 // optional separators
|
|
572 }
|
|
573 else if (have == token_dccfrom) {
|
|
574 if (!tsa(tok, token_lbrace)) return false;
|
|
575 bool keeping = false;
|
|
576 bool many = false;
|
|
577 while (true) {
|
|
578 char *have = tok.next();
|
|
579 if (!have) break;
|
|
580 if (have == token_rbrace) break;
|
|
581 if (have == token_ok) {
|
|
582 keeping = true;
|
|
583 many = false;
|
|
584 continue;
|
|
585 }
|
|
586 else if (have == token_many) {
|
|
587 keeping = true;
|
|
588 many = true;
|
|
589 continue;
|
|
590 }
|
|
591 else if (have == token_ok2) {
|
|
592 keeping = false;
|
|
593 continue;
|
|
594 }
|
|
595 if (have == token_envfrom) {
|
|
596 have = tok.next();
|
|
597 if (keeping) {
|
|
598 me.add_from(have, (many) ? token_black : token_white);
|
|
599 }
|
|
600 }
|
|
601 tok.skipeol();
|
|
602 }
|
|
603 }
|
|
604 else {
|
|
605 // may be a valid email address or domain name
|
|
606 char *st = tok.next();
|
|
607 if ((st == token_black) || (st == token_white) || (st == token_unknown)) {
|
|
608 me.add_from(have, st);
|
|
609 }
|
|
610 else {
|
|
611 CONTEXTP con = me.find_from_context_name(st);
|
|
612 if (con) {
|
|
613 me.add_from_context(have, con);
|
|
614 }
|
|
615 else {
|
|
616 tok.token_error("white/black/unknown or child context name", st);
|
|
617 return false;
|
|
618 }
|
|
619 }
|
|
620 }
|
|
621 }
|
|
622 return tsa(tok, token_semi);
|
|
623 }
|
|
624
|
|
625
|
|
626 ////////////////////////////////////////////////
|
|
627 //
|
|
628 bool parse_context(TOKEN &tok, CONFIG &dc, CONTEXTP parent);
|
|
629 bool parse_context(TOKEN &tok, CONFIG &dc, CONTEXTP parent) {
|
|
630 char *name = tok.next();
|
|
631 if (!tsa(tok, token_lbrace)) return false;
|
|
632 CONTEXTP con = new CONTEXT(parent, name);
|
|
633
|
|
634 while (true) {
|
|
635 char *have = tok.next();
|
|
636 if (!have) break;
|
|
637 if (have == token_rbrace) break; // done
|
|
638 if (have == token_dnsbl) {
|
|
639 if (!parse_dnsbl(tok, dc, *con)) return false;
|
|
640 }
|
|
641 else if (have == token_dnsbll) {
|
|
642 if (!parse_dnsbll(tok, dc, *con)) return false;
|
|
643 }
|
|
644 else if (have == token_content) {
|
|
645 if (!parse_content(tok, dc, *con)) return false;
|
|
646 }
|
|
647 else if (have == token_envto) {
|
|
648 if (!parse_envto(tok, dc, *con)) return false;
|
|
649 }
|
|
650 else if (have == token_envfrom) {
|
|
651 if (!parse_envfrom(tok, dc, *con)) return false;
|
|
652 }
|
|
653 else if (have == token_context) {
|
|
654 if (!parse_context(tok, dc, con)) return false;
|
|
655 }
|
|
656 else {
|
|
657 tok.token_error("context keyword", have);
|
|
658 return false;
|
|
659 }
|
|
660 }
|
|
661
|
|
662 if (!tsa(tok, token_semi)) {
|
|
663 delete con;
|
|
664 return false;
|
|
665 }
|
|
666 dc.add_context(con);
|
|
667 if (parent) parent->add_context(con);
|
|
668 return true;
|
|
669 }
|
|
670
|
|
671
|
|
672 ////////////////////////////////////////////////
|
|
673 // parse a config file
|
|
674 //
|
|
675 bool load_conf(CONFIG &dc, char *fn) {
|
|
676 TOKEN tok(fn, &dc.config_files);
|
|
677 while (true) {
|
|
678 char *have = tok.next();
|
|
679 if (!have) break;
|
|
680 if (have == token_context) {
|
|
681 if (!parse_context(tok, dc, NULL)) {
|
|
682 return false;
|
|
683 }
|
|
684 }
|
|
685 else {
|
|
686 tok.token_error(token_context, have);
|
|
687 return false;
|
|
688 }
|
|
689 }
|
|
690 return true;
|
|
691 }
|
|
692
|
|
693
|
|
694 ////////////////////////////////////////////////
|
|
695 // init the tokens
|
|
696 //
|
|
697 void token_init() {
|
|
698 token_black = register_string("black");
|
|
699 token_content = register_string("content");
|
|
700 token_context = register_string("context");
|
|
701 token_dccfrom = register_string("dcc_from");
|
|
702 token_dccto = register_string("dcc_to");
|
|
703 token_default = register_string("default");
|
|
704 token_dnsbl = register_string("dnsbl");
|
|
705 token_dnsbll = register_string("dnsbl_list");
|
|
706 token_envfrom = register_string("env_from");
|
|
707 token_envto = register_string("env_to");
|
|
708 token_filter = register_string("filter");
|
|
709 token_host_limit = register_string("host_limit");
|
|
710 token_html_limit = register_string("html_limit");
|
|
711 token_html_tags = register_string("html_tags");
|
|
712 token_ignore = register_string("ignore");
|
|
713 token_include = register_string("include");
|
|
714 token_inherit = register_string("inherit");
|
|
715 token_lbrace = register_string("{");
|
|
716 token_many = register_string("many");
|
|
717 token_off = register_string("off");
|
|
718 token_ok = register_string("ok");
|
|
719 token_ok2 = register_string("ok2");
|
|
720 token_on = register_string("on");
|
|
721 token_rbrace = register_string("}");
|
|
722 token_semi = register_string(";");
|
|
723 token_soft = register_string("soft");
|
|
724 token_tld = register_string("tld");
|
|
725 token_unknown = register_string("unknown");
|
|
726 token_white = register_string("white");
|
|
727 }
|