Mercurial > dnsbl
comparison src/context.h @ 119:d9d2f8699621
uribl patch from Jeff Evans <jeffe@tricab.com>
author | carl |
---|---|
date | Sun, 12 Mar 2006 12:38:43 -0800 |
parents | aa07452e641b |
children | f4746d8a12a3 |
comparison
equal
deleted
inserted
replaced
118:13fcb0c66763 | 119:d9d2f8699621 |
---|---|
94 char * verify_host; // use this smtp host to verify email addresses | 94 char * verify_host; // use this smtp host to verify email addresses |
95 string_map env_from; // map senders to white/black/unknown | 95 string_map env_from; // map senders to white/black/unknown |
96 context_map env_from_context; // map senders to a child context | 96 context_map env_from_context; // map senders to a child context |
97 char * env_from_default; // default value for senders that are not found in the map white/black/unknown/inherit | 97 char * env_from_default; // default value for senders that are not found in the map white/black/unknown/inherit |
98 bool content_filtering; // | 98 bool content_filtering; // |
99 char * content_suffix; // for sbl url body filtering | 99 char * content_suffix; // for url body filtering based on ip addresses of hostnames in the body |
100 char * content_message; // "" | 100 char * content_message; // "" |
101 char * uribl_suffix; // for uribl body filtering based on hostnames in the body | |
102 char * uribl_message; // "" | |
101 string_set content_host_ignore;// hosts to ignore for content sbl checking | 103 string_set content_host_ignore;// hosts to ignore for content sbl checking |
102 string_set content_tlds; // | 104 string_set content_tlds; // |
103 string_set content_cctlds; // | 105 string_set content_cctlds; // |
104 string_set html_tags; // set of valid html tags | 106 string_set html_tags; // set of valid html tags |
105 int host_limit; // limit on host names | 107 int host_limit; // limit on host names |
133 CONTEXTP find_from_context_name(char *name); | 135 CONTEXTP find_from_context_name(char *name); |
134 | 136 |
135 void set_content_filtering(bool filter) {content_filtering = filter;}; | 137 void set_content_filtering(bool filter) {content_filtering = filter;}; |
136 void set_content_suffix(char *suffix) {content_suffix = suffix;}; | 138 void set_content_suffix(char *suffix) {content_suffix = suffix;}; |
137 void set_content_message(char *message) {content_message = message;}; | 139 void set_content_message(char *message) {content_message = message;}; |
140 void set_uribl_suffix(char *suffix) {uribl_suffix = suffix;}; | |
141 void set_uribl_message(char *message) {uribl_message = message;}; | |
138 void add_ignore(char *host) {content_host_ignore.insert(host);}; | 142 void add_ignore(char *host) {content_host_ignore.insert(host);}; |
139 void add_tld(char *tld) {content_tlds.insert(tld);}; | 143 void add_tld(char *tld) {content_tlds.insert(tld);}; |
140 void add_cctld(char *cctld) {content_cctlds.insert(cctld);}; | 144 void add_cctld(char *cctld) {content_cctlds.insert(cctld);}; |
141 | 145 |
142 void set_host_limit(int limit) {host_limit = limit;}; | 146 void set_host_limit(int limit) {host_limit = limit;}; |
153 bool get_content_filtering() {return content_filtering;}; | 157 bool get_content_filtering() {return content_filtering;}; |
154 int get_host_limit() {return host_limit;}; | 158 int get_host_limit() {return host_limit;}; |
155 bool get_host_random() {return host_random;}; | 159 bool get_host_random() {return host_random;}; |
156 char* get_content_suffix(); | 160 char* get_content_suffix(); |
157 char* get_content_message(); | 161 char* get_content_message(); |
162 char* get_uribl_suffix(); | |
163 char* get_uribl_message(); | |
158 string_set& get_content_host_ignore(); | 164 string_set& get_content_host_ignore(); |
159 string_set& get_content_tlds(); | 165 string_set& get_content_tlds(); |
160 string_set& get_content_cctlds(); | 166 string_set& get_content_cctlds(); |
161 string_set& get_html_tags(); | 167 string_set& get_html_tags(); |
162 dnsblp_list& get_dnsbl_list(); | 168 dnsblp_list& get_dnsbl_list(); |
217 extern char *token_semi; | 223 extern char *token_semi; |
218 extern char *token_soft; | 224 extern char *token_soft; |
219 extern char *token_substitute; | 225 extern char *token_substitute; |
220 extern char *token_tld; | 226 extern char *token_tld; |
221 extern char *token_unknown; | 227 extern char *token_unknown; |
228 extern char *token_uribl; | |
222 extern char *token_white; | 229 extern char *token_white; |
223 | 230 |
224 extern char *token_myhostname; | 231 extern char *token_myhostname; |
225 | 232 |
226 extern verify_map verifiers; // map of smtp hosts to verify structures, owns all the verify structures | 233 extern verify_map verifiers; // map of smtp hosts to verify structures, owns all the verify structures |