-const char loaders_rcs[] = "$Id: loaders.c,v 1.2 2001/05/17 23:01:01 oes Exp $";
+const char loaders_rcs[] = "$Id: loaders.c,v 1.7 2001/05/26 00:28:36 jongfoster Exp $";
/*********************************************************************
*
* File : $Source: /cvsroot/ijbswa/current/loaders.c,v $
*
* Revisions :
* $Log: loaders.c,v $
+ * Revision 1.7 2001/05/26 00:28:36 jongfoster
+ * Automatic reloading of config file.
+ * Removed obsolete SIGHUP support (Unix) and Reload menu option (Win32).
+ * Most of the global variables have been moved to a new
+ * struct configuration_spec, accessed through csp->config->globalname
+ * Most of the globals remaining are used by the Win32 GUI.
+ *
+ * Revision 1.6 2001/05/23 12:27:33 oes
+ *
+ * Fixed ugly indentation of my last changes
+ *
+ * Revision 1.5 2001/05/23 10:39:05 oes
+ * - Added support for escaping the comment character
+ * in config files by a backslash
+ * - Added support for line continuation in config
+ * files
+ * - Fixed a buffer overflow bug with long config lines
+ *
+ * Revision 1.4 2001/05/22 18:56:28 oes
+ * CRLF -> LF
+ *
+ * Revision 1.3 2001/05/20 01:21:20 jongfoster
+ * Version 2.9.4 checkin.
+ * - Merged popupfile and cookiefile, and added control over PCRS
+ * filtering, in new "permissionsfile".
+ * - Implemented LOG_LEVEL_FATAL, so that if there is a configuration
+ * file error you now get a message box (in the Win32 GUI) rather
+ * than the program exiting with no explanation.
+ * - Made killpopup use the PCRS MIME-type checking and HTTP-header
+ * skipping.
+ * - Removed tabs from "config"
+ * - Moved duplicated url parsing code in "loaders.c" to a new funcition.
+ * - Bumped up version number.
+ *
* Revision 1.2 2001/05/17 23:01:01 oes
* - Cleaned CRLF's from the sources and related files
*
#define ijb_isspace(__X) isspace((int)(unsigned char)(__X))
-#define NLOADERS 8
-static int (*loaders[NLOADERS])(struct client_state *);
-\r
-\r
/*
* Currently active files.
* These are also entered in the main linked list of files.
#ifdef PCRS
static struct file_list *current_re_filterfile = NULL;
#endif /* def PCRS */
-\r
-\r
-static int create_url_spec(struct url_spec * url, char * buf);\r
-\r
+
+
+static int create_url_spec(struct url_spec * url, char * buf);
+
/*********************************************************************
*
{
/* mark this client's files as active */
+ /*
+ * Always have a configuration file.
+ * (Also note the slightly non-standard extra
+ * indirection here.)
+ */
+ ncsp->config->config_file_list->active = 1;
+
if (ncsp->blist) /* block files */
{
ncsp->blist->active = 1;
}
-/*********************************************************************\r
- *\r
- * Function : create_url_spec\r
- *\r
- * Description : Creates a "url_spec" structure from a string.\r
- * When finished, free with unload_url().\r
- *\r
- * Parameters :\r
- * 1 : url = Target url_spec to be filled in. Must be\r
- * zeroed out before the call (e.g. using zalloc).\r
- * 2 : buf = Source pattern, null terminated. NOTE: The\r
- * contents of this buffer are destroyed by this\r
- * function. If this function succeeds, the\r
- * buffer is copied to url->spec. If this\r
- * function fails, the contents of the buffer\r
- * are lost forever.\r
- *\r
- * Returns : 0 => Ok, everything else is an error.\r
- *\r
- *********************************************************************/\r
-static int create_url_spec(struct url_spec * url, char * buf)\r
-{\r
- char *p;\r
- struct url_spec tmp_url[1];\r
-\r
- /* paranoia - should never happen. */\r
- if ((url == NULL) || (buf == NULL))\r
- {\r
- return 1;\r
- }\r
-\r
- /* save a copy of the orignal specification */\r
- if ((url->spec = strdup(buf)) == NULL)\r
- {\r
- return 1;\r
- }\r
-\r
- if ((p = strchr(buf, '/')))\r
- {\r
- if (NULL == (url->path = strdup(p)))\r
- {\r
- freez(url->spec);\r
- return 1;\r
- }\r
- url->pathlen = strlen(url->path);\r
- *p = '\0';\r
- }\r
- else\r
- {\r
- url->path = NULL;\r
- url->pathlen = 0;\r
- }\r
-#ifdef REGEX\r
- if (url->path)\r
- {\r
- int errcode;\r
- char rebuf[BUFSIZ];\r
-\r
- if (NULL == (url->preg = zalloc(sizeof(*url->preg))))\r
- {\r
- freez(url->spec);\r
- freez(url->path);\r
- return 1;\r
- }\r
-\r
- sprintf(rebuf, "^(%s)", url->path);\r
-\r
- errcode = regcomp(url->preg, rebuf,\r
- (REG_EXTENDED|REG_NOSUB|REG_ICASE));\r
- if (errcode)\r
- {\r
- size_t errlen =\r
- regerror(errcode,\r
- url->preg, buf, sizeof(buf));\r
-\r
- buf[errlen] = '\0';\r
-\r
- log_error(LOG_LEVEL_ERROR, "error compiling %s: %s",\r
- url->spec, buf);\r
-\r
- freez(url->spec);\r
- freez(url->path);\r
- freez(url->preg);\r
-\r
- return 1;\r
- }\r
- }\r
-#endif\r
- if ((p = strchr(buf, ':')) == NULL)\r
- {\r
- url->port = 0;\r
- }\r
- else\r
- {\r
- *p++ = '\0';\r
- url->port = atoi(p);\r
- }\r
-\r
- if ((url->domain = strdup(buf)) == NULL)\r
- {\r
- freez(url->spec);\r
- freez(url->path);\r
-#ifdef REGEX\r
- freez(url->preg);\r
-#endif /* def REGEX */\r
- return 1;\r
- }\r
-\r
- /* split domain into components */\r
-\r
- *tmp_url = dsplit(url->domain);\r
- url->dbuf = tmp_url->dbuf;\r
- url->dcnt = tmp_url->dcnt;\r
- url->dvec = tmp_url->dvec;\r
-\r
- return 0; /* OK */\r
-}\r
-\r
-\r
+/*********************************************************************
+ *
+ * Function : create_url_spec
+ *
+ * Description : Creates a "url_spec" structure from a string.
+ * When finished, free with unload_url().
+ *
+ * Parameters :
+ * 1 : url = Target url_spec to be filled in. Must be
+ * zeroed out before the call (e.g. using zalloc).
+ * 2 : buf = Source pattern, null terminated. NOTE: The
+ * contents of this buffer are destroyed by this
+ * function. If this function succeeds, the
+ * buffer is copied to url->spec. If this
+ * function fails, the contents of the buffer
+ * are lost forever.
+ *
+ * Returns : 0 => Ok, everything else is an error.
+ *
+ *********************************************************************/
+static int create_url_spec(struct url_spec * url, char * buf)
+{
+ char *p;
+ struct url_spec tmp_url[1];
+
+ /* paranoia - should never happen. */
+ if ((url == NULL) || (buf == NULL))
+ {
+ return 1;
+ }
+
+ /* save a copy of the orignal specification */
+ if ((url->spec = strdup(buf)) == NULL)
+ {
+ return 1;
+ }
+
+ if ((p = strchr(buf, '/')))
+ {
+ if (NULL == (url->path = strdup(p)))
+ {
+ freez(url->spec);
+ return 1;
+ }
+ url->pathlen = strlen(url->path);
+ *p = '\0';
+ }
+ else
+ {
+ url->path = NULL;
+ url->pathlen = 0;
+ }
+#ifdef REGEX
+ if (url->path)
+ {
+ int errcode;
+ char rebuf[BUFSIZ];
+
+ if (NULL == (url->preg = zalloc(sizeof(*url->preg))))
+ {
+ freez(url->spec);
+ freez(url->path);
+ return 1;
+ }
+
+ sprintf(rebuf, "^(%s)", url->path);
+
+ errcode = regcomp(url->preg, rebuf,
+ (REG_EXTENDED|REG_NOSUB|REG_ICASE));
+ if (errcode)
+ {
+ size_t errlen =
+ regerror(errcode,
+ url->preg, buf, sizeof(buf));
+
+ buf[errlen] = '\0';
+
+ log_error(LOG_LEVEL_ERROR, "error compiling %s: %s",
+ url->spec, buf);
+
+ freez(url->spec);
+ freez(url->path);
+ freez(url->preg);
+
+ return 1;
+ }
+ }
+#endif
+ if ((p = strchr(buf, ':')) == NULL)
+ {
+ url->port = 0;
+ }
+ else
+ {
+ *p++ = '\0';
+ url->port = atoi(p);
+ }
+
+ if ((url->domain = strdup(buf)) == NULL)
+ {
+ freez(url->spec);
+ freez(url->path);
+#ifdef REGEX
+ freez(url->preg);
+#endif /* def REGEX */
+ return 1;
+ }
+
+ /* split domain into components */
+
+ *tmp_url = dsplit(url->domain);
+ url->dbuf = tmp_url->dbuf;
+ url->dcnt = tmp_url->dcnt;
+ url->dvec = tmp_url->dvec;
+
+ return 0; /* OK */
+}
+
+
/*********************************************************************
*
* Function : unload_url
* Description : Unloads a permissions file.
*
* Parameters :
- * 1 : file_data = the data structure associated with the\r
+ * 1 : file_data = the data structure associated with the
* permissions file.
*
* Returns : N/A
*
*********************************************************************/
static void unload_permissions_file(void *file_data)
-{\r
+{
struct permissions_spec * next;
struct permissions_spec * cur = (struct permissions_spec *)file_data;
- while (cur != NULL)\r
- {\r
+ while (cur != NULL)
+ {
next = cur->next;
unload_url(cur->url);
- freez(cur);\r
- cur = next;\r
+ freez(cur);
+ cur = next;
}
}
* On error: 1 and sets newfl == NULL
*
*********************************************************************/
-static int check_file_changed(const struct file_list * current,
- const char * filename,
- struct file_list ** newfl)
+int check_file_changed(const struct file_list * current,
+ const char * filename,
+ struct file_list ** newfl)
{
struct file_list *fs;
struct stat statbuf[1];
* Function : read_config_line
*
* Description : Read a single non-empty line from a file and return
- * it. Trims comments, leading and trailing whitespace.
- * Also wites the file to fs->proxy_args.
+ * it. Trims comments, leading and trailing whitespace
+ * and respects escaping of newline and comment char.
+ * Also writes the file to fs->proxy_args.
*
* Parameters :
* 1 : buf = Buffer to use.
{
char *p, *q;
char linebuf[BUFSIZ];
+ int contflag = 0;
+
+ *buf = '\0';
while (fgets(linebuf, sizeof(linebuf), fp))
{
}
#endif /* ndef SPLIT_PROXY_ARGS */
- /* Trim off newline and any comment */
- if ((p = strpbrk(linebuf, "\r\n#")) != NULL)
+ /* Trim off newline */
+ if ((p = strpbrk(linebuf, "\r\n")) != NULL)
+ {
+ *p = '\0';
+ }
+
+ /* Line continuation? Trim escape and set flag. */
+ if ((p != linebuf) && (*--p == '\\'))
{
+ contflag = 1;
*p = '\0';
}
+
+ /* If there's a comment char.. */
+ if ((p = strpbrk(linebuf, "#")) != NULL)
+ {
+ /* ..and it's escaped, left-shift the line over the escape. */
+ if ((p != linebuf) && (*(p-1) == '\\'))
+ {
+ q = p-1;
+ while ((*q++ = *p++) != '\0') /* nop */;
+ }
+ /* Else, chop off the rest of the line */
+ else
+ {
+ *p = '\0';
+ }
+ }
/* Trim leading whitespace */
p = linebuf;
while (*p && ijb_isspace(*p))
{
- *p++;
+ p++;
}
if (*p)
/* More paranoia. This if statement is always true. */
if (*linebuf)
{
- strcpy(buf, linebuf);
- return buf;
+ strncat(buf, linebuf, buflen - strlen(buf));
+ if (contflag)
+ {
+ contflag = 0;
+ continue;
+ }
+ else
+ {
+ return buf;
+ }
}
}
}
struct access_control_list *a, *bl;
struct file_list *fs;
- if (!check_file_changed(current_aclfile, aclfile, &fs))
+ if (!check_file_changed(current_aclfile, csp->config->aclfile, &fs))
{
/* No need to load */
if (csp)
goto load_aclfile_error;
}
- fp = fopen(aclfile, "r");
+ fp = fopen(csp->config->aclfile, "r");
if (fp == NULL)
{
return(0);
load_aclfile_error:
- log_error(LOG_LEVEL_ERROR, "can't load access control list %s: %E", aclfile);
+ log_error(LOG_LEVEL_ERROR, "can't load access control list %s: %E",
+ csp->config->aclfile);
return(-1);
}
int reject;
struct file_list *fs;
- if (!check_file_changed(current_blockfile, blockfile, &fs))
+ if (!check_file_changed(current_blockfile, csp->config->blockfile, &fs))
{
/* No need to load */
if (csp)
goto load_blockfile_error;
}
- if ((fp = fopen(blockfile, "r")) == NULL)
+ if ((fp = fopen(csp->config->blockfile, "r")) == NULL)
{
goto load_blockfile_error;
}
bl->next = b;
b->reject = reject;
-\r
- /* Save the URL pattern */\r
- if (create_url_spec(b->url, buf))\r
- {\r
- fclose(fp);\r
- goto load_blockfile_error;\r
- }\r
+
+ /* Save the URL pattern */
+ if (create_url_spec(b->url, buf))
+ {
+ fclose(fp);
+ goto load_blockfile_error;
+ }
}
fclose(fp);
return(0);
load_blockfile_error:
- log_error(LOG_LEVEL_ERROR, "can't load blockfile '%s': %E", blockfile);
+ log_error(LOG_LEVEL_ERROR, "can't load blockfile '%s': %E", csp->config->blockfile);
return(-1);
}
int reject;
struct file_list *fs;
- if (!check_file_changed(current_imagefile, imagefile, &fs))
+ if (!check_file_changed(current_imagefile, csp->config->imagefile, &fs))
{
/* No need to load */
if (csp)
goto load_imagefile_error;
}
- if ((fp = fopen(imagefile, "r")) == NULL)
+ if ((fp = fopen(csp->config->imagefile, "r")) == NULL)
{
goto load_imagefile_error;
}
/* add it to the list */
b->next = bl->next;
bl->next = b;
-\r
- b->reject = reject;\r
- /* Save the URL pattern */\r
- if (create_url_spec(b->url, buf))\r
+ b->reject = reject;
+
+ /* Save the URL pattern */
+ if (create_url_spec(b->url, buf))
{
fclose(fp);
goto load_imagefile_error;
}
}
-\r
+
fclose(fp);
#ifndef SPLIT_PROXY_ARGS
return(0);
load_imagefile_error:
- log_error(LOG_LEVEL_ERROR, "can't load imagefile '%s': %E", imagefile);
+ log_error(LOG_LEVEL_ERROR, "can't load imagefile '%s': %E", csp->config->imagefile);
return(-1);
}
#endif /* def USE_IMAGE_LIST */
-\r
+
/*********************************************************************
*
* Function : load_permissions_file
*
- * Description : Read and parse a permissions file and add to files\r
+ * Description : Read and parse a permissions file and add to files
* list.
*
* Parameters :
struct permissions_spec *b, *bl;
char buf[BUFSIZ], *p, *q;
int permissions;
- struct file_list *fs;\r
+ struct file_list *fs;
int i;
- if (!check_file_changed(current_permissions_file, permissions_file, &fs))
+ if (!check_file_changed(current_permissions_file, csp->config->permissions_file, &fs))
{
/* No need to load */
if (csp)
goto load_permissions_error;
}
- if ((fp = fopen(permissions_file, "r")) == NULL)
+ if ((fp = fopen(csp->config->permissions_file, "r")) == NULL)
{
goto load_permissions_error;
- }\r
+ }
-\r
- /*\r
- * default_permissions is set in this file.\r
- *\r
- * Reset it to default first.\r
- */\r
- default_permissions = PERMIT_RE_FILTER;\r
+
+ /*
+ * default_permissions is set in this file.
+ *
+ * Reset it to default first.
+ */
+ csp->config->default_permissions = PERMIT_RE_FILTER;
while (read_config_line(buf, sizeof(buf), fp, fs) != NULL)
{
- p = buf;\r
-\r
- permissions = PERMIT_COOKIE_SET | PERMIT_COOKIE_READ | PERMIT_POPUPS;\r
-\r
- /*\r
- * FIXME: for() loop is a kludge. Want to loop around until we\r
- * find a non-control character. Assume there will be at most 4\r
- * characters.\r
- */\r
- for (i = 0; i < 4; i++)\r
- {\r
+ p = buf;
+
+ permissions = PERMIT_COOKIE_SET | PERMIT_COOKIE_READ | PERMIT_POPUPS;
+
+ /*
+ * FIXME: for() loop is a kludge. Want to loop around until we
+ * find a non-control character. Assume there will be at most 4
+ * characters.
+ */
+ for (i = 0; i < 4; i++)
+ {
switch ((int)*p)
{
- case '>':\r
- /*\r
- * Allow cookies to be read by the server, but do\r
- * not allow them to be set.\r
- */\r
+ case '>':
+ /*
+ * Allow cookies to be read by the server, but do
+ * not allow them to be set.
+ */
permissions = (permissions & ~PERMIT_COOKIE_SET);
p++;
break;
case '<':
- /*\r
- * Allow server to set cookies but do not let the\r
- * server read them.\r
- */\r
- permissions = (permissions & ~PERMIT_COOKIE_READ);\r
+ /*
+ * Allow server to set cookies but do not let the
+ * server read them.
+ */
+ permissions = (permissions & ~PERMIT_COOKIE_READ);
p++;
break;
- case '^':\r
- /*\r
- * Block popups\r
- */\r
- permissions = (permissions & ~PERMIT_POPUPS);\r
- p++;\r
- break;\r
-\r
- case '%':\r
- /*\r
- * Permit filtering using PCRS\r
- */\r
- permissions = (permissions | PERMIT_RE_FILTER);\r
- p++;\r
- break;\r
-\r
- case '~':\r
- /*\r
- * All of the above (maximum filtering).\r
+ case '^':
+ /*
+ * Block popups
+ */
+ permissions = (permissions & ~PERMIT_POPUPS);
+ p++;
+ break;
+
+ case '%':
+ /*
+ * Permit filtering using PCRS
*/
- permissions = PERMIT_RE_FILTER;\r
+ permissions = (permissions | PERMIT_RE_FILTER);
p++;
break;
- default:\r
- /*\r
- * FIXME: Should break out of the loop here.\r
+ case '~':
+ /*
+ * All of the above (maximum filtering).
*/
+ permissions = PERMIT_RE_FILTER;
+ p++;
break;
- }\r
+
+ default:
+ /*
+ * FIXME: Should break out of the loop here.
+ */
+ break;
+ }
}
/*
* front of the pattern
*/
q = buf;
- if (p > q)\r
- {\r
+ if (p > q)
+ {
while ((*q++ = *p++) != '\0')
{
/* nop */
- }\r
+ }
}
/* a lines containing only "special" chars sets default */
if (*buf == '\0')
- {\r
- default_permissions = permissions;
+ {
+ csp->config->default_permissions = permissions;
continue;
}
/* add it to the list */
b->next = bl->next;
bl->next = b;
-\r
+
/* Save flags */
- b->permissions = permissions;\r
-\r
- /* Save the URL pattern */\r
- if (create_url_spec(b->url, buf))\r
- {\r
+ b->permissions = permissions;
+
+ /* Save the URL pattern */
+ if (create_url_spec(b->url, buf))
+ {
fclose(fp);
goto load_permissions_error;
}
return(0);
load_permissions_error:
- log_error(LOG_LEVEL_ERROR, "can't load permissions file '%s': %E", permissions_file);
+ log_error(LOG_LEVEL_ERROR, "can't load permissions file '%s': %E",
+ csp->config->permissions_file);
return(-1);
}
int reject, trusted;
struct file_list *fs;
- if (!check_file_changed(current_trustfile, trustfile, &fs))
+ if (!check_file_changed(current_trustfile, csp->config->trustfile, &fs))
{
/* No need to load */
if (csp)
goto load_trustfile_error;
}
- if ((fp = fopen(trustfile, "r")) == NULL)
+ if ((fp = fopen(csp->config->trustfile, "r")) == NULL)
{
goto load_trustfile_error;
}
- tl = trust_list;
+ tl = csp->config->trust_list;
while (read_config_line(buf, sizeof(buf), fp, fs) != NULL)
{
b->reject = reject;
- /* Save the URL pattern */\r
- if (create_url_spec(b->url, buf))\r
+ /* Save the URL pattern */
+ if (create_url_spec(b->url, buf))
{
fclose(fp);
goto load_trustfile_error;
return(0);
load_trustfile_error:
- log_error(LOG_LEVEL_ERROR, "can't load trustfile '%s': %E", trustfile);
+ log_error(LOG_LEVEL_ERROR, "can't load trustfile '%s': %E",
+ csp->config->trustfile);
return(-1);
}
struct forward_spec *b, *bl;
char buf[BUFSIZ], *p, *q, *tmp;
char *vec[4];
- int port, n, reject;
+ int n, reject;
struct file_list *fs;
const struct gateway *gw;
- struct url_spec url[1];
- if (!check_file_changed(current_forwardfile, forwardfile, &fs))
+ if (!check_file_changed(current_forwardfile, csp->config->forwardfile, &fs))
{
/* No need to load */
if (csp)
goto load_forwardfile_error;
}
- if ((fp = fopen(forwardfile, "r")) == NULL)
+ if ((fp = fopen(csp->config->forwardfile, "r")) == NULL)
{
goto load_forwardfile_error;
}
/* allocate a new node */
if (((b = zalloc(sizeof(*b))) == NULL)
-#ifdef REGEX
- || ((b->url->preg = zalloc(sizeof(*b->url->preg))) == NULL)
-#endif
)
{
fclose(fp);
b->next = bl->next;
bl->next = b;
- /* save a copy of the orignal specification */
- if ((b->url->spec = strdup(buf)) == NULL)
- {
- fclose(fp);
- goto load_forwardfile_error;
- }
-
- b->reject = reject;
-
- if ((p = strchr(buf, '/')))
- {
- b->url->path = strdup(p);
- b->url->pathlen = strlen(b->url->path);
- *p = '\0';
- }
- else
- {
- b->url->path = NULL;
- b->url->pathlen = 0;
- }
-#ifdef REGEX
- if (b->url->path)
- {
- int errcode;
- char rebuf[BUFSIZ];
-
- sprintf(rebuf, "^(%s)", b->url->path);
-
- errcode = regcomp(b->url->preg, rebuf,
- (REG_EXTENDED|REG_NOSUB|REG_ICASE));
-
- if (errcode)
- {
- size_t errlen = regerror(errcode, b->url->preg, buf, sizeof(buf));
-
- buf[errlen] = '\0';
-
- log_error(LOG_LEVEL_ERROR, "error compiling %s: %s",
- b->url->spec, buf);
- fclose(fp);
- goto load_forwardfile_error;
- }
- }
- else
- {
- freez(b->url->preg);
- }
-#endif
- if ((p = strchr(buf, ':')) == NULL)
- {
- port = 0;
- }
- else
- {
- *p++ = '\0';
- port = atoi(p);
- }
-
- b->url->port = port;
-
- if ((b->url->domain = strdup(buf)) == NULL)
- {
- fclose(fp);
- goto load_forwardfile_error;
- }
-
- /* split domain into components */
- *url = dsplit(b->url->domain);
- b->url->dbuf = url->dbuf;
- b->url->dcnt = url->dcnt;
- b->url->dvec = url->dvec;
+ b->reject = reject;\r
+\r
+ /* Save the URL pattern */\r
+ if (create_url_spec(b->url, buf))\r
+ {\r
+ fclose(fp);\r
+ goto load_forwardfile_error;\r
+ }\r
/* now parse the gateway specs */
return(0);
load_forwardfile_error:
- log_error(LOG_LEVEL_ERROR, "can't load forwardfile '%s': %E", forwardfile);
+ log_error(LOG_LEVEL_ERROR, "can't load forwardfile '%s': %E",
+ csp->config->forwardfile);
return(-1);
}
int error;
pcrs_job *dummy;
- if (!check_file_changed(current_re_filterfile, re_filterfile, &fs))
+ if (!check_file_changed(current_re_filterfile, csp->config->re_filterfile, &fs))
{
/* No need to load */
if (csp)
}
/* Open the file or fail */
- if ((fp = fopen(re_filterfile, "r")) == NULL)
+ if ((fp = fopen(csp->config->re_filterfile, "r")) == NULL)
{
goto load_re_filterfile_error;
}
return( 0 );
load_re_filterfile_error:
- log_error(LOG_LEVEL_ERROR, "can't load re_filterfile '%s': %E", re_filterfile);
+ log_error(LOG_LEVEL_ERROR, "can't load re_filterfile '%s': %E",
+ csp->config->re_filterfile);
return(-1);
}
* Parameters :
* 1 : loader = pointer to a function that can parse and load
* the appropriate config file.
+ * 2 : config = The configuration_spec to add the loader to.
*
* Returns : N/A
*
*********************************************************************/
-void add_loader(int (*loader)(struct client_state *))
+void add_loader(int (*loader)(struct client_state *),
+ struct configuration_spec * config)
{
int i;
for (i=0; i < NLOADERS; i++)
{
- if (loaders[i] == NULL)
+ if (config->loaders[i] == NULL)
{
- loaders[i] = loader;
+ config->loaders[i] = loader;
break;
}
}
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
+ * Must be non-null. Reads: "csp->config"
+ * Writes: various data members.
*
* Returns : 0 => Ok, everything else is an error.
*
for (i=0; i < NLOADERS; i++)
{
- if (loaders[i] == NULL)
+ if (csp->config->loaders[i] == NULL)
{
break;
}
- ret |= (loaders[i])(csp);
+ ret |= (csp->config->loaders[i])(csp);
}
return(ret);
}
-/*********************************************************************
- *
- * Function : remove_all_loaders
- *
- * Description : Remove all loaders from the list.
- *
- * Parameters : N/A
- *
- * Returns : N/A
- *
- *********************************************************************/
-void remove_all_loaders(void)
-{
- memset( loaders, 0, sizeof( loaders ) );
-}
-
-
/*
Local Variables:
tab-width: 3