comparison src/context.h @ 119:d9d2f8699621

uribl patch from Jeff Evans <jeffe@tricab.com>
author carl
date Sun, 12 Mar 2006 12:38:43 -0800
parents aa07452e641b
children f4746d8a12a3
comparison
equal deleted inserted replaced
118:13fcb0c66763 119:d9d2f8699621
94 char * verify_host; // use this smtp host to verify email addresses 94 char * verify_host; // use this smtp host to verify email addresses
95 string_map env_from; // map senders to white/black/unknown 95 string_map env_from; // map senders to white/black/unknown
96 context_map env_from_context; // map senders to a child context 96 context_map env_from_context; // map senders to a child context
97 char * env_from_default; // default value for senders that are not found in the map white/black/unknown/inherit 97 char * env_from_default; // default value for senders that are not found in the map white/black/unknown/inherit
98 bool content_filtering; // 98 bool content_filtering; //
99 char * content_suffix; // for sbl url body filtering 99 char * content_suffix; // for url body filtering based on ip addresses of hostnames in the body
100 char * content_message; // "" 100 char * content_message; // ""
101 char * uribl_suffix; // for uribl body filtering based on hostnames in the body
102 char * uribl_message; // ""
101 string_set content_host_ignore;// hosts to ignore for content sbl checking 103 string_set content_host_ignore;// hosts to ignore for content sbl checking
102 string_set content_tlds; // 104 string_set content_tlds; //
103 string_set content_cctlds; // 105 string_set content_cctlds; //
104 string_set html_tags; // set of valid html tags 106 string_set html_tags; // set of valid html tags
105 int host_limit; // limit on host names 107 int host_limit; // limit on host names
133 CONTEXTP find_from_context_name(char *name); 135 CONTEXTP find_from_context_name(char *name);
134 136
135 void set_content_filtering(bool filter) {content_filtering = filter;}; 137 void set_content_filtering(bool filter) {content_filtering = filter;};
136 void set_content_suffix(char *suffix) {content_suffix = suffix;}; 138 void set_content_suffix(char *suffix) {content_suffix = suffix;};
137 void set_content_message(char *message) {content_message = message;}; 139 void set_content_message(char *message) {content_message = message;};
140 void set_uribl_suffix(char *suffix) {uribl_suffix = suffix;};
141 void set_uribl_message(char *message) {uribl_message = message;};
138 void add_ignore(char *host) {content_host_ignore.insert(host);}; 142 void add_ignore(char *host) {content_host_ignore.insert(host);};
139 void add_tld(char *tld) {content_tlds.insert(tld);}; 143 void add_tld(char *tld) {content_tlds.insert(tld);};
140 void add_cctld(char *cctld) {content_cctlds.insert(cctld);}; 144 void add_cctld(char *cctld) {content_cctlds.insert(cctld);};
141 145
142 void set_host_limit(int limit) {host_limit = limit;}; 146 void set_host_limit(int limit) {host_limit = limit;};
153 bool get_content_filtering() {return content_filtering;}; 157 bool get_content_filtering() {return content_filtering;};
154 int get_host_limit() {return host_limit;}; 158 int get_host_limit() {return host_limit;};
155 bool get_host_random() {return host_random;}; 159 bool get_host_random() {return host_random;};
156 char* get_content_suffix(); 160 char* get_content_suffix();
157 char* get_content_message(); 161 char* get_content_message();
162 char* get_uribl_suffix();
163 char* get_uribl_message();
158 string_set& get_content_host_ignore(); 164 string_set& get_content_host_ignore();
159 string_set& get_content_tlds(); 165 string_set& get_content_tlds();
160 string_set& get_content_cctlds(); 166 string_set& get_content_cctlds();
161 string_set& get_html_tags(); 167 string_set& get_html_tags();
162 dnsblp_list& get_dnsbl_list(); 168 dnsblp_list& get_dnsbl_list();
217 extern char *token_semi; 223 extern char *token_semi;
218 extern char *token_soft; 224 extern char *token_soft;
219 extern char *token_substitute; 225 extern char *token_substitute;
220 extern char *token_tld; 226 extern char *token_tld;
221 extern char *token_unknown; 227 extern char *token_unknown;
228 extern char *token_uribl;
222 extern char *token_white; 229 extern char *token_white;
223 230
224 extern char *token_myhostname; 231 extern char *token_myhostname;
225 232
226 extern verify_map verifiers; // map of smtp hosts to verify structures, owns all the verify structures 233 extern verify_map verifiers; // map of smtp hosts to verify structures, owns all the verify structures