2020-04-02 12:34:03 -04:00
|
|
|
/* original parser id follows */
|
|
|
|
|
/* yysccsid[] = "@(#)yaccpar 1.9 (Berkeley) 02/21/93" */
|
|
|
|
|
/* (use YYMAJOR/YYMINOR for ifdefs dependent on parser version) */
|
|
|
|
|
|
|
|
|
|
#define YYBYACC 1
|
|
|
|
|
#define YYMAJOR 1
|
|
|
|
|
#define YYMINOR 9
|
|
|
|
|
#define YYPATCH 20140715
|
|
|
|
|
|
|
|
|
|
#define YYEMPTY (-1)
|
|
|
|
|
#define yyclearin (yychar = YYEMPTY)
|
|
|
|
|
#define yyerrok (yyerrflag = 0)
|
|
|
|
|
#define YYRECOVERING() (yyerrflag != 0)
|
|
|
|
|
#define YYENOMEM (-2)
|
|
|
|
|
#define YYEOF 0
|
|
|
|
|
#define YYPREFIX "yy"
|
2009-03-13 05:27:37 -04:00
|
|
|
|
|
|
|
|
#define YYPURE 0
|
|
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#line 39 "./util/configparser.y"
|
2020-03-24 04:25:05 -04:00
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
|
|
#include <stdarg.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
|
|
#include "util/configyyrename.h"
|
|
|
|
|
#include "util/config_file.h"
|
|
|
|
|
#include "util/net_help.h"
|
|
|
|
|
|
|
|
|
|
int ub_c_lex(void);
|
|
|
|
|
void ub_c_error(const char *message);
|
|
|
|
|
|
|
|
|
|
static void validate_respip_action(const char* action);
|
|
|
|
|
|
|
|
|
|
/* these need to be global, otherwise they cannot be used inside yacc */
|
|
|
|
|
extern struct config_parser_state* cfg_parser;
|
|
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
|
#define OUTYY(s) printf s /* used ONLY when debugging */
|
|
|
|
|
#else
|
|
|
|
|
#define OUTYY(s)
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#line 66 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
#ifdef YYSTYPE
|
|
|
|
|
#undef YYSTYPE_IS_DECLARED
|
|
|
|
|
#define YYSTYPE_IS_DECLARED 1
|
2020-03-24 04:25:05 -04:00
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
#ifndef YYSTYPE_IS_DECLARED
|
|
|
|
|
#define YYSTYPE_IS_DECLARED 1
|
|
|
|
|
typedef union {
|
|
|
|
|
char* str;
|
|
|
|
|
} YYSTYPE;
|
|
|
|
|
#endif /* !YYSTYPE_IS_DECLARED */
|
|
|
|
|
#line 59 "util/configparser.c"
|
|
|
|
|
|
|
|
|
|
/* compatibility with bison */
|
|
|
|
|
#ifdef YYPARSE_PARAM
|
|
|
|
|
/* compatibility with FreeBSD */
|
|
|
|
|
# ifdef YYPARSE_PARAM_TYPE
|
|
|
|
|
# define YYPARSE_DECL() yyparse(YYPARSE_PARAM_TYPE YYPARSE_PARAM)
|
2020-03-24 04:25:05 -04:00
|
|
|
# else
|
2020-04-02 12:34:03 -04:00
|
|
|
# define YYPARSE_DECL() yyparse(void *YYPARSE_PARAM)
|
2009-03-13 05:27:37 -04:00
|
|
|
# endif
|
|
|
|
|
#else
|
2020-04-02 12:34:03 -04:00
|
|
|
# define YYPARSE_DECL() yyparse(void)
|
2009-03-13 05:27:37 -04:00
|
|
|
#endif
|
|
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
/* Parameters sent to lex. */
|
|
|
|
|
#ifdef YYLEX_PARAM
|
|
|
|
|
# define YYLEX_DECL() yylex(void *YYLEX_PARAM)
|
|
|
|
|
# define YYLEX yylex(YYLEX_PARAM)
|
2020-03-04 14:02:16 -05:00
|
|
|
#else
|
2020-04-02 12:34:03 -04:00
|
|
|
# define YYLEX_DECL() yylex(void)
|
|
|
|
|
# define YYLEX yylex()
|
2020-03-24 04:25:05 -04:00
|
|
|
#endif
|
|
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
/* Parameters sent to yyerror. */
|
|
|
|
|
#ifndef YYERROR_DECL
|
|
|
|
|
#define YYERROR_DECL() yyerror(const char *s)
|
2009-03-13 05:27:37 -04:00
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
#ifndef YYERROR_CALL
|
|
|
|
|
#define YYERROR_CALL(msg) yyerror(msg)
|
2009-03-13 05:27:37 -04:00
|
|
|
#endif
|
|
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
extern int YYPARSE_DECL();
|
|
|
|
|
|
|
|
|
|
#define SPACE 257
|
|
|
|
|
#define LETTER 258
|
|
|
|
|
#define NEWLINE 259
|
|
|
|
|
#define COMMENT 260
|
|
|
|
|
#define COLON 261
|
|
|
|
|
#define ANY 262
|
|
|
|
|
#define ZONESTR 263
|
|
|
|
|
#define STRING_ARG 264
|
|
|
|
|
#define VAR_SERVER 265
|
|
|
|
|
#define VAR_VERBOSITY 266
|
|
|
|
|
#define VAR_NUM_THREADS 267
|
|
|
|
|
#define VAR_PORT 268
|
|
|
|
|
#define VAR_OUTGOING_RANGE 269
|
|
|
|
|
#define VAR_INTERFACE 270
|
|
|
|
|
#define VAR_PREFER_IP4 271
|
|
|
|
|
#define VAR_DO_IP4 272
|
|
|
|
|
#define VAR_DO_IP6 273
|
|
|
|
|
#define VAR_PREFER_IP6 274
|
|
|
|
|
#define VAR_DO_UDP 275
|
|
|
|
|
#define VAR_DO_TCP 276
|
|
|
|
|
#define VAR_TCP_MSS 277
|
|
|
|
|
#define VAR_OUTGOING_TCP_MSS 278
|
|
|
|
|
#define VAR_TCP_IDLE_TIMEOUT 279
|
|
|
|
|
#define VAR_EDNS_TCP_KEEPALIVE 280
|
|
|
|
|
#define VAR_EDNS_TCP_KEEPALIVE_TIMEOUT 281
|
|
|
|
|
#define VAR_CHROOT 282
|
|
|
|
|
#define VAR_USERNAME 283
|
|
|
|
|
#define VAR_DIRECTORY 284
|
|
|
|
|
#define VAR_LOGFILE 285
|
|
|
|
|
#define VAR_PIDFILE 286
|
|
|
|
|
#define VAR_MSG_CACHE_SIZE 287
|
|
|
|
|
#define VAR_MSG_CACHE_SLABS 288
|
|
|
|
|
#define VAR_NUM_QUERIES_PER_THREAD 289
|
|
|
|
|
#define VAR_RRSET_CACHE_SIZE 290
|
|
|
|
|
#define VAR_RRSET_CACHE_SLABS 291
|
|
|
|
|
#define VAR_OUTGOING_NUM_TCP 292
|
|
|
|
|
#define VAR_INFRA_HOST_TTL 293
|
|
|
|
|
#define VAR_INFRA_LAME_TTL 294
|
|
|
|
|
#define VAR_INFRA_CACHE_SLABS 295
|
|
|
|
|
#define VAR_INFRA_CACHE_NUMHOSTS 296
|
|
|
|
|
#define VAR_INFRA_CACHE_LAME_SIZE 297
|
|
|
|
|
#define VAR_NAME 298
|
|
|
|
|
#define VAR_STUB_ZONE 299
|
|
|
|
|
#define VAR_STUB_HOST 300
|
|
|
|
|
#define VAR_STUB_ADDR 301
|
|
|
|
|
#define VAR_TARGET_FETCH_POLICY 302
|
|
|
|
|
#define VAR_HARDEN_SHORT_BUFSIZE 303
|
|
|
|
|
#define VAR_HARDEN_LARGE_QUERIES 304
|
|
|
|
|
#define VAR_FORWARD_ZONE 305
|
|
|
|
|
#define VAR_FORWARD_HOST 306
|
|
|
|
|
#define VAR_FORWARD_ADDR 307
|
|
|
|
|
#define VAR_DO_NOT_QUERY_ADDRESS 308
|
|
|
|
|
#define VAR_HIDE_IDENTITY 309
|
|
|
|
|
#define VAR_HIDE_VERSION 310
|
|
|
|
|
#define VAR_IDENTITY 311
|
|
|
|
|
#define VAR_VERSION 312
|
|
|
|
|
#define VAR_HARDEN_GLUE 313
|
|
|
|
|
#define VAR_MODULE_CONF 314
|
|
|
|
|
#define VAR_TRUST_ANCHOR_FILE 315
|
|
|
|
|
#define VAR_TRUST_ANCHOR 316
|
|
|
|
|
#define VAR_VAL_OVERRIDE_DATE 317
|
|
|
|
|
#define VAR_BOGUS_TTL 318
|
|
|
|
|
#define VAR_VAL_CLEAN_ADDITIONAL 319
|
|
|
|
|
#define VAR_VAL_PERMISSIVE_MODE 320
|
|
|
|
|
#define VAR_INCOMING_NUM_TCP 321
|
|
|
|
|
#define VAR_MSG_BUFFER_SIZE 322
|
|
|
|
|
#define VAR_KEY_CACHE_SIZE 323
|
|
|
|
|
#define VAR_KEY_CACHE_SLABS 324
|
|
|
|
|
#define VAR_TRUSTED_KEYS_FILE 325
|
|
|
|
|
#define VAR_VAL_NSEC3_KEYSIZE_ITERATIONS 326
|
|
|
|
|
#define VAR_USE_SYSLOG 327
|
|
|
|
|
#define VAR_OUTGOING_INTERFACE 328
|
|
|
|
|
#define VAR_ROOT_HINTS 329
|
|
|
|
|
#define VAR_DO_NOT_QUERY_LOCALHOST 330
|
|
|
|
|
#define VAR_CACHE_MAX_TTL 331
|
|
|
|
|
#define VAR_HARDEN_DNSSEC_STRIPPED 332
|
|
|
|
|
#define VAR_ACCESS_CONTROL 333
|
|
|
|
|
#define VAR_LOCAL_ZONE 334
|
|
|
|
|
#define VAR_LOCAL_DATA 335
|
|
|
|
|
#define VAR_INTERFACE_AUTOMATIC 336
|
|
|
|
|
#define VAR_STATISTICS_INTERVAL 337
|
|
|
|
|
#define VAR_DO_DAEMONIZE 338
|
|
|
|
|
#define VAR_USE_CAPS_FOR_ID 339
|
|
|
|
|
#define VAR_STATISTICS_CUMULATIVE 340
|
|
|
|
|
#define VAR_OUTGOING_PORT_PERMIT 341
|
|
|
|
|
#define VAR_OUTGOING_PORT_AVOID 342
|
|
|
|
|
#define VAR_DLV_ANCHOR_FILE 343
|
|
|
|
|
#define VAR_DLV_ANCHOR 344
|
|
|
|
|
#define VAR_NEG_CACHE_SIZE 345
|
|
|
|
|
#define VAR_HARDEN_REFERRAL_PATH 346
|
|
|
|
|
#define VAR_PRIVATE_ADDRESS 347
|
|
|
|
|
#define VAR_PRIVATE_DOMAIN 348
|
|
|
|
|
#define VAR_REMOTE_CONTROL 349
|
|
|
|
|
#define VAR_CONTROL_ENABLE 350
|
|
|
|
|
#define VAR_CONTROL_INTERFACE 351
|
|
|
|
|
#define VAR_CONTROL_PORT 352
|
|
|
|
|
#define VAR_SERVER_KEY_FILE 353
|
|
|
|
|
#define VAR_SERVER_CERT_FILE 354
|
|
|
|
|
#define VAR_CONTROL_KEY_FILE 355
|
|
|
|
|
#define VAR_CONTROL_CERT_FILE 356
|
|
|
|
|
#define VAR_CONTROL_USE_CERT 357
|
|
|
|
|
#define VAR_EXTENDED_STATISTICS 358
|
|
|
|
|
#define VAR_LOCAL_DATA_PTR 359
|
|
|
|
|
#define VAR_JOSTLE_TIMEOUT 360
|
|
|
|
|
#define VAR_STUB_PRIME 361
|
|
|
|
|
#define VAR_UNWANTED_REPLY_THRESHOLD 362
|
|
|
|
|
#define VAR_LOG_TIME_ASCII 363
|
|
|
|
|
#define VAR_DOMAIN_INSECURE 364
|
|
|
|
|
#define VAR_PYTHON 365
|
|
|
|
|
#define VAR_PYTHON_SCRIPT 366
|
|
|
|
|
#define VAR_VAL_SIG_SKEW_MIN 367
|
|
|
|
|
#define VAR_VAL_SIG_SKEW_MAX 368
|
|
|
|
|
#define VAR_CACHE_MIN_TTL 369
|
|
|
|
|
#define VAR_VAL_LOG_LEVEL 370
|
|
|
|
|
#define VAR_AUTO_TRUST_ANCHOR_FILE 371
|
|
|
|
|
#define VAR_KEEP_MISSING 372
|
|
|
|
|
#define VAR_ADD_HOLDDOWN 373
|
|
|
|
|
#define VAR_DEL_HOLDDOWN 374
|
|
|
|
|
#define VAR_SO_RCVBUF 375
|
|
|
|
|
#define VAR_EDNS_BUFFER_SIZE 376
|
|
|
|
|
#define VAR_PREFETCH 377
|
|
|
|
|
#define VAR_PREFETCH_KEY 378
|
|
|
|
|
#define VAR_SO_SNDBUF 379
|
|
|
|
|
#define VAR_SO_REUSEPORT 380
|
|
|
|
|
#define VAR_HARDEN_BELOW_NXDOMAIN 381
|
|
|
|
|
#define VAR_IGNORE_CD_FLAG 382
|
|
|
|
|
#define VAR_LOG_QUERIES 383
|
|
|
|
|
#define VAR_LOG_REPLIES 384
|
|
|
|
|
#define VAR_LOG_LOCAL_ACTIONS 385
|
|
|
|
|
#define VAR_TCP_UPSTREAM 386
|
|
|
|
|
#define VAR_SSL_UPSTREAM 387
|
|
|
|
|
#define VAR_SSL_SERVICE_KEY 388
|
|
|
|
|
#define VAR_SSL_SERVICE_PEM 389
|
|
|
|
|
#define VAR_SSL_PORT 390
|
|
|
|
|
#define VAR_FORWARD_FIRST 391
|
|
|
|
|
#define VAR_STUB_SSL_UPSTREAM 392
|
|
|
|
|
#define VAR_FORWARD_SSL_UPSTREAM 393
|
|
|
|
|
#define VAR_TLS_CERT_BUNDLE 394
|
|
|
|
|
#define VAR_STUB_FIRST 395
|
|
|
|
|
#define VAR_MINIMAL_RESPONSES 396
|
|
|
|
|
#define VAR_RRSET_ROUNDROBIN 397
|
|
|
|
|
#define VAR_MAX_UDP_SIZE 398
|
|
|
|
|
#define VAR_DELAY_CLOSE 399
|
|
|
|
|
#define VAR_UNBLOCK_LAN_ZONES 400
|
|
|
|
|
#define VAR_INSECURE_LAN_ZONES 401
|
|
|
|
|
#define VAR_INFRA_CACHE_MIN_RTT 402
|
|
|
|
|
#define VAR_DNS64_PREFIX 403
|
|
|
|
|
#define VAR_DNS64_SYNTHALL 404
|
|
|
|
|
#define VAR_DNS64_IGNORE_AAAA 405
|
|
|
|
|
#define VAR_DNSTAP 406
|
|
|
|
|
#define VAR_DNSTAP_ENABLE 407
|
|
|
|
|
#define VAR_DNSTAP_SOCKET_PATH 408
|
|
|
|
|
#define VAR_DNSTAP_IP 409
|
|
|
|
|
#define VAR_DNSTAP_TLS 410
|
|
|
|
|
#define VAR_DNSTAP_TLS_SERVER_NAME 411
|
|
|
|
|
#define VAR_DNSTAP_TLS_CERT_BUNDLE 412
|
|
|
|
|
#define VAR_DNSTAP_TLS_CLIENT_KEY_FILE 413
|
|
|
|
|
#define VAR_DNSTAP_TLS_CLIENT_CERT_FILE 414
|
|
|
|
|
#define VAR_DNSTAP_SEND_IDENTITY 415
|
|
|
|
|
#define VAR_DNSTAP_SEND_VERSION 416
|
|
|
|
|
#define VAR_DNSTAP_IDENTITY 417
|
|
|
|
|
#define VAR_DNSTAP_VERSION 418
|
|
|
|
|
#define VAR_DNSTAP_LOG_RESOLVER_QUERY_MESSAGES 419
|
|
|
|
|
#define VAR_DNSTAP_LOG_RESOLVER_RESPONSE_MESSAGES 420
|
|
|
|
|
#define VAR_DNSTAP_LOG_CLIENT_QUERY_MESSAGES 421
|
|
|
|
|
#define VAR_DNSTAP_LOG_CLIENT_RESPONSE_MESSAGES 422
|
|
|
|
|
#define VAR_DNSTAP_LOG_FORWARDER_QUERY_MESSAGES 423
|
|
|
|
|
#define VAR_DNSTAP_LOG_FORWARDER_RESPONSE_MESSAGES 424
|
|
|
|
|
#define VAR_RESPONSE_IP_TAG 425
|
|
|
|
|
#define VAR_RESPONSE_IP 426
|
|
|
|
|
#define VAR_RESPONSE_IP_DATA 427
|
|
|
|
|
#define VAR_HARDEN_ALGO_DOWNGRADE 428
|
|
|
|
|
#define VAR_IP_TRANSPARENT 429
|
|
|
|
|
#define VAR_IP_DSCP 430
|
|
|
|
|
#define VAR_DISABLE_DNSSEC_LAME_CHECK 431
|
|
|
|
|
#define VAR_IP_RATELIMIT 432
|
|
|
|
|
#define VAR_IP_RATELIMIT_SLABS 433
|
|
|
|
|
#define VAR_IP_RATELIMIT_SIZE 434
|
|
|
|
|
#define VAR_RATELIMIT 435
|
|
|
|
|
#define VAR_RATELIMIT_SLABS 436
|
|
|
|
|
#define VAR_RATELIMIT_SIZE 437
|
|
|
|
|
#define VAR_RATELIMIT_FOR_DOMAIN 438
|
|
|
|
|
#define VAR_RATELIMIT_BELOW_DOMAIN 439
|
|
|
|
|
#define VAR_IP_RATELIMIT_FACTOR 440
|
|
|
|
|
#define VAR_RATELIMIT_FACTOR 441
|
|
|
|
|
#define VAR_SEND_CLIENT_SUBNET 442
|
|
|
|
|
#define VAR_CLIENT_SUBNET_ZONE 443
|
|
|
|
|
#define VAR_CLIENT_SUBNET_ALWAYS_FORWARD 444
|
|
|
|
|
#define VAR_CLIENT_SUBNET_OPCODE 445
|
|
|
|
|
#define VAR_MAX_CLIENT_SUBNET_IPV4 446
|
|
|
|
|
#define VAR_MAX_CLIENT_SUBNET_IPV6 447
|
|
|
|
|
#define VAR_MIN_CLIENT_SUBNET_IPV4 448
|
|
|
|
|
#define VAR_MIN_CLIENT_SUBNET_IPV6 449
|
|
|
|
|
#define VAR_MAX_ECS_TREE_SIZE_IPV4 450
|
|
|
|
|
#define VAR_MAX_ECS_TREE_SIZE_IPV6 451
|
|
|
|
|
#define VAR_CAPS_WHITELIST 452
|
|
|
|
|
#define VAR_CACHE_MAX_NEGATIVE_TTL 453
|
|
|
|
|
#define VAR_PERMIT_SMALL_HOLDDOWN 454
|
|
|
|
|
#define VAR_QNAME_MINIMISATION 455
|
|
|
|
|
#define VAR_QNAME_MINIMISATION_STRICT 456
|
|
|
|
|
#define VAR_IP_FREEBIND 457
|
|
|
|
|
#define VAR_DEFINE_TAG 458
|
|
|
|
|
#define VAR_LOCAL_ZONE_TAG 459
|
|
|
|
|
#define VAR_ACCESS_CONTROL_TAG 460
|
|
|
|
|
#define VAR_LOCAL_ZONE_OVERRIDE 461
|
|
|
|
|
#define VAR_ACCESS_CONTROL_TAG_ACTION 462
|
|
|
|
|
#define VAR_ACCESS_CONTROL_TAG_DATA 463
|
|
|
|
|
#define VAR_VIEW 464
|
|
|
|
|
#define VAR_ACCESS_CONTROL_VIEW 465
|
|
|
|
|
#define VAR_VIEW_FIRST 466
|
|
|
|
|
#define VAR_SERVE_EXPIRED 467
|
|
|
|
|
#define VAR_SERVE_EXPIRED_TTL 468
|
|
|
|
|
#define VAR_SERVE_EXPIRED_TTL_RESET 469
|
|
|
|
|
#define VAR_SERVE_EXPIRED_REPLY_TTL 470
|
|
|
|
|
#define VAR_SERVE_EXPIRED_CLIENT_TIMEOUT 471
|
|
|
|
|
#define VAR_FAKE_DSA 472
|
|
|
|
|
#define VAR_FAKE_SHA1 473
|
|
|
|
|
#define VAR_LOG_IDENTITY 474
|
|
|
|
|
#define VAR_HIDE_TRUSTANCHOR 475
|
|
|
|
|
#define VAR_TRUST_ANCHOR_SIGNALING 476
|
|
|
|
|
#define VAR_AGGRESSIVE_NSEC 477
|
|
|
|
|
#define VAR_USE_SYSTEMD 478
|
|
|
|
|
#define VAR_SHM_ENABLE 479
|
|
|
|
|
#define VAR_SHM_KEY 480
|
|
|
|
|
#define VAR_ROOT_KEY_SENTINEL 481
|
|
|
|
|
#define VAR_DNSCRYPT 482
|
|
|
|
|
#define VAR_DNSCRYPT_ENABLE 483
|
|
|
|
|
#define VAR_DNSCRYPT_PORT 484
|
|
|
|
|
#define VAR_DNSCRYPT_PROVIDER 485
|
|
|
|
|
#define VAR_DNSCRYPT_SECRET_KEY 486
|
|
|
|
|
#define VAR_DNSCRYPT_PROVIDER_CERT 487
|
|
|
|
|
#define VAR_DNSCRYPT_PROVIDER_CERT_ROTATED 488
|
|
|
|
|
#define VAR_DNSCRYPT_SHARED_SECRET_CACHE_SIZE 489
|
|
|
|
|
#define VAR_DNSCRYPT_SHARED_SECRET_CACHE_SLABS 490
|
|
|
|
|
#define VAR_DNSCRYPT_NONCE_CACHE_SIZE 491
|
|
|
|
|
#define VAR_DNSCRYPT_NONCE_CACHE_SLABS 492
|
|
|
|
|
#define VAR_PAD_RESPONSES 493
|
|
|
|
|
#define VAR_PAD_RESPONSES_BLOCK_SIZE 494
|
|
|
|
|
#define VAR_PAD_QUERIES 495
|
|
|
|
|
#define VAR_PAD_QUERIES_BLOCK_SIZE 496
|
|
|
|
|
#define VAR_IPSECMOD_ENABLED 497
|
|
|
|
|
#define VAR_IPSECMOD_HOOK 498
|
|
|
|
|
#define VAR_IPSECMOD_IGNORE_BOGUS 499
|
|
|
|
|
#define VAR_IPSECMOD_MAX_TTL 500
|
|
|
|
|
#define VAR_IPSECMOD_WHITELIST 501
|
|
|
|
|
#define VAR_IPSECMOD_STRICT 502
|
|
|
|
|
#define VAR_CACHEDB 503
|
|
|
|
|
#define VAR_CACHEDB_BACKEND 504
|
|
|
|
|
#define VAR_CACHEDB_SECRETSEED 505
|
|
|
|
|
#define VAR_CACHEDB_REDISHOST 506
|
|
|
|
|
#define VAR_CACHEDB_REDISPORT 507
|
|
|
|
|
#define VAR_CACHEDB_REDISTIMEOUT 508
|
2020-04-02 12:54:18 -04:00
|
|
|
#define VAR_CACHEDB_REDISEXPIRERECORDS 509
|
|
|
|
|
#define VAR_UDP_UPSTREAM_WITHOUT_DOWNSTREAM 510
|
|
|
|
|
#define VAR_FOR_UPSTREAM 511
|
|
|
|
|
#define VAR_AUTH_ZONE 512
|
|
|
|
|
#define VAR_ZONEFILE 513
|
|
|
|
|
#define VAR_MASTER 514
|
|
|
|
|
#define VAR_URL 515
|
|
|
|
|
#define VAR_FOR_DOWNSTREAM 516
|
|
|
|
|
#define VAR_FALLBACK_ENABLED 517
|
|
|
|
|
#define VAR_TLS_ADDITIONAL_PORT 518
|
|
|
|
|
#define VAR_LOW_RTT 519
|
|
|
|
|
#define VAR_LOW_RTT_PERMIL 520
|
|
|
|
|
#define VAR_FAST_SERVER_PERMIL 521
|
|
|
|
|
#define VAR_FAST_SERVER_NUM 522
|
|
|
|
|
#define VAR_ALLOW_NOTIFY 523
|
|
|
|
|
#define VAR_TLS_WIN_CERT 524
|
|
|
|
|
#define VAR_TCP_CONNECTION_LIMIT 525
|
|
|
|
|
#define VAR_FORWARD_NO_CACHE 526
|
|
|
|
|
#define VAR_STUB_NO_CACHE 527
|
|
|
|
|
#define VAR_LOG_SERVFAIL 528
|
|
|
|
|
#define VAR_DENY_ANY 529
|
|
|
|
|
#define VAR_UNKNOWN_SERVER_TIME_LIMIT 530
|
|
|
|
|
#define VAR_LOG_TAG_QUERYREPLY 531
|
|
|
|
|
#define VAR_STREAM_WAIT_SIZE 532
|
|
|
|
|
#define VAR_TLS_CIPHERS 533
|
|
|
|
|
#define VAR_TLS_CIPHERSUITES 534
|
|
|
|
|
#define VAR_IPSET 535
|
|
|
|
|
#define VAR_IPSET_NAME_V4 536
|
|
|
|
|
#define VAR_IPSET_NAME_V6 537
|
|
|
|
|
#define VAR_TLS_SESSION_TICKET_KEYS 538
|
|
|
|
|
#define VAR_RPZ 539
|
|
|
|
|
#define VAR_TAGS 540
|
|
|
|
|
#define VAR_RPZ_ACTION_OVERRIDE 541
|
|
|
|
|
#define VAR_RPZ_CNAME_OVERRIDE 542
|
|
|
|
|
#define VAR_RPZ_LOG 543
|
|
|
|
|
#define VAR_RPZ_LOG_NAME 544
|
2020-04-02 12:34:03 -04:00
|
|
|
#define YYERRCODE 256
|
|
|
|
|
typedef short YYINT;
|
|
|
|
|
static const YYINT yylhs[] = { -1,
|
|
|
|
|
0, 0, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 2, 3, 3, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
|
|
|
|
|
4, 5, 5, 220, 220, 220, 220, 220, 220, 220,
|
|
|
|
|
6, 7, 7, 228, 228, 228, 228, 228, 228, 14,
|
|
|
|
|
15, 15, 235, 235, 235, 235, 235, 235, 235, 22,
|
|
|
|
|
23, 23, 243, 243, 243, 243, 243, 243, 243, 243,
|
|
|
|
|
252, 253, 254, 255, 256, 24, 25, 25, 257, 257,
|
|
|
|
|
257, 257, 257, 257, 257, 257, 257, 257, 27, 28,
|
|
|
|
|
91, 94, 103, 191, 192, 29, 156, 157, 158, 159,
|
|
|
|
|
160, 161, 162, 163, 164, 165, 42, 82, 30, 95,
|
|
|
|
|
96, 53, 75, 90, 31, 32, 35, 36, 33, 34,
|
|
|
|
|
37, 38, 39, 40, 41, 126, 203, 127, 129, 130,
|
|
|
|
|
131, 205, 210, 206, 217, 218, 219, 187, 92, 81,
|
|
|
|
|
107, 124, 125, 215, 212, 128, 43, 44, 45, 46,
|
|
|
|
|
47, 83, 97, 98, 113, 69, 79, 70, 195, 196,
|
|
|
|
|
108, 63, 64, 194, 65, 66, 117, 121, 135, 144,
|
|
|
|
|
170, 147, 216, 118, 76, 48, 49, 50, 105, 136,
|
|
|
|
|
137, 138, 51, 52, 54, 55, 57, 58, 56, 142,
|
|
|
|
|
59, 60, 61, 67, 86, 122, 100, 143, 93, 166,
|
|
|
|
|
101, 102, 119, 120, 213, 106, 62, 84, 87, 68,
|
|
|
|
|
71, 109, 110, 85, 167, 111, 72, 73, 74, 204,
|
|
|
|
|
123, 180, 181, 182, 183, 184, 185, 193, 112, 80,
|
|
|
|
|
114, 115, 116, 168, 77, 78, 99, 88, 89, 104,
|
|
|
|
|
132, 133, 214, 134, 139, 140, 141, 171, 172, 174,
|
|
|
|
|
176, 177, 175, 178, 188, 145, 146, 150, 151, 148,
|
|
|
|
|
149, 152, 153, 155, 154, 207, 209, 208, 169, 179,
|
|
|
|
|
258, 259, 260, 261, 197, 199, 198, 200, 201, 202,
|
|
|
|
|
221, 222, 223, 225, 226, 227, 224, 229, 230, 231,
|
|
|
|
|
232, 233, 234, 244, 245, 246, 247, 251, 248, 249,
|
|
|
|
|
250, 236, 237, 240, 241, 238, 242, 239, 10, 11,
|
|
|
|
|
11, 262, 262, 262, 262, 262, 262, 262, 262, 263,
|
|
|
|
|
265, 264, 270, 266, 267, 268, 269, 12, 13, 13,
|
|
|
|
|
271, 271, 271, 271, 271, 271, 271, 271, 271, 271,
|
|
|
|
|
271, 271, 271, 271, 271, 271, 271, 271, 272, 273,
|
|
|
|
|
274, 275, 276, 277, 278, 279, 280, 281, 282, 283,
|
|
|
|
|
284, 285, 286, 287, 288, 289, 8, 9, 9, 290,
|
|
|
|
|
291, 173, 186, 189, 190, 16, 17, 17, 292, 292,
|
|
|
|
|
292, 292, 292, 292, 292, 292, 292, 292, 293, 294,
|
|
|
|
|
295, 297, 298, 296, 299, 300, 301, 302, 18, 19,
|
2020-04-02 12:54:18 -04:00
|
|
|
19, 303, 303, 303, 303, 303, 303, 304, 305, 306,
|
|
|
|
|
307, 308, 309, 211, 20, 21, 21, 310, 310, 311,
|
|
|
|
|
312,
|
2007-10-18 18:49:08 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yylen[] = { 2,
|
|
|
|
|
0, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 1, 2, 0, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 2, 0, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 2, 0, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
2, 0, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
2, 0, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
2, 2, 2, 2, 2, 1, 2, 0, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 3, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 3, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 3, 3,
|
|
|
|
|
4, 4, 4, 3, 3, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 3, 3, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 3, 3, 3, 2, 2, 2, 1, 2,
|
|
|
|
|
0, 1, 1, 1, 1, 1, 1, 1, 1, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 1, 2, 0,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 1, 2, 0, 1,
|
|
|
|
|
2, 2, 2, 3, 3, 1, 2, 0, 1, 1,
|
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 2, 2,
|
|
|
|
|
2, 2, 2, 2, 2, 2, 2, 2, 1, 2,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 1, 1, 1, 1, 1, 1, 2, 2, 2,
|
|
|
|
|
2, 2, 2, 3, 1, 2, 0, 1, 1, 2,
|
|
|
|
|
2,
|
2007-10-18 18:49:08 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yydefred[] = { 1,
|
|
|
|
|
0, 15, 211, 221, 489, 547, 508, 230, 556, 579,
|
2020-04-02 12:54:18 -04:00
|
|
|
240, 595, 256, 2, 17, 213, 223, 549, 491, 510,
|
|
|
|
|
232, 558, 581, 597, 242, 258, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 16, 18, 19, 20, 21, 22, 23, 24, 25,
|
|
|
|
|
26, 27, 28, 29, 30, 31, 32, 33, 34, 35,
|
|
|
|
|
36, 37, 38, 39, 40, 41, 42, 43, 44, 45,
|
|
|
|
|
46, 47, 48, 49, 50, 51, 52, 53, 54, 55,
|
|
|
|
|
56, 57, 58, 59, 60, 61, 62, 63, 64, 65,
|
|
|
|
|
66, 67, 68, 69, 70, 71, 72, 73, 74, 75,
|
|
|
|
|
76, 77, 78, 79, 80, 81, 82, 83, 84, 85,
|
|
|
|
|
86, 87, 88, 89, 90, 91, 92, 93, 94, 95,
|
|
|
|
|
96, 97, 98, 99, 100, 101, 102, 103, 104, 105,
|
|
|
|
|
106, 107, 108, 109, 110, 111, 112, 113, 114, 115,
|
|
|
|
|
116, 117, 118, 119, 120, 121, 122, 123, 124, 125,
|
|
|
|
|
126, 127, 128, 129, 130, 131, 132, 133, 134, 135,
|
|
|
|
|
136, 137, 138, 139, 140, 141, 142, 143, 144, 145,
|
|
|
|
|
146, 147, 148, 149, 150, 151, 152, 153, 154, 155,
|
|
|
|
|
156, 157, 158, 159, 160, 161, 162, 163, 164, 165,
|
|
|
|
|
166, 167, 168, 169, 170, 171, 172, 173, 174, 175,
|
|
|
|
|
176, 177, 178, 179, 180, 181, 182, 183, 184, 185,
|
|
|
|
|
186, 187, 188, 189, 190, 191, 192, 193, 194, 195,
|
|
|
|
|
196, 197, 198, 199, 200, 201, 202, 203, 204, 205,
|
|
|
|
|
206, 207, 208, 209, 210, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 212, 214, 215, 216, 217, 218, 219, 220,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 222, 224, 225, 226,
|
|
|
|
|
227, 228, 229, 0, 548, 550, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 490, 492, 493, 494, 495, 496,
|
|
|
|
|
497, 498, 499, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 509, 511, 512, 513, 514, 515, 516, 517, 518,
|
|
|
|
|
519, 520, 521, 522, 523, 524, 525, 526, 527, 528,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 231, 233, 234,
|
|
|
|
|
235, 236, 237, 238, 239, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 557, 559, 560, 561, 562,
|
|
|
|
|
563, 564, 565, 566, 567, 568, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 580, 582, 583, 584, 585, 586, 587, 0,
|
|
|
|
|
0, 596, 598, 599, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 241, 243, 244, 245, 246, 247, 248, 249,
|
|
|
|
|
250, 0, 0, 0, 0, 0, 259, 260, 262, 263,
|
|
|
|
|
264, 261, 265, 266, 267, 268, 257, 270, 269, 276,
|
|
|
|
|
289, 287, 299, 295, 296, 300, 297, 298, 301, 302,
|
|
|
|
|
303, 304, 305, 327, 328, 329, 330, 331, 356, 357,
|
|
|
|
|
358, 363, 364, 292, 365, 366, 369, 367, 368, 371,
|
|
|
|
|
372, 373, 387, 342, 343, 345, 346, 374, 390, 336,
|
|
|
|
|
338, 391, 397, 398, 399, 293, 355, 415, 416, 337,
|
|
|
|
|
410, 320, 288, 332, 388, 394, 375, 0, 0, 419,
|
|
|
|
|
294, 271, 319, 379, 272, 290, 291, 333, 334, 417,
|
|
|
|
|
377, 381, 382, 273, 420, 359, 386, 321, 341, 392,
|
|
|
|
|
393, 396, 409, 335, 413, 411, 412, 347, 354, 383,
|
|
|
|
|
384, 348, 349, 376, 401, 322, 323, 326, 306, 308,
|
|
|
|
|
309, 310, 311, 312, 421, 422, 424, 360, 361, 362,
|
|
|
|
|
370, 425, 426, 427, 0, 0, 0, 378, 350, 352,
|
|
|
|
|
552, 436, 440, 438, 437, 441, 439, 0, 0, 444,
|
|
|
|
|
445, 277, 278, 279, 280, 281, 282, 283, 284, 285,
|
|
|
|
|
286, 380, 395, 414, 449, 450, 351, 428, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 402, 403, 404, 405, 406, 407,
|
|
|
|
|
408, 553, 344, 339, 400, 318, 274, 275, 340, 455,
|
|
|
|
|
457, 456, 458, 459, 460, 307, 314, 446, 448, 447,
|
|
|
|
|
313, 0, 325, 385, 423, 324, 353, 315, 316, 317,
|
|
|
|
|
461, 462, 463, 467, 466, 464, 465, 468, 469, 470,
|
|
|
|
|
471, 473, 472, 551, 500, 502, 501, 504, 505, 506,
|
|
|
|
|
507, 503, 529, 530, 531, 532, 533, 534, 535, 536,
|
|
|
|
|
537, 538, 539, 540, 541, 542, 543, 544, 545, 546,
|
|
|
|
|
482, 0, 486, 487, 0, 0, 488, 569, 570, 571,
|
|
|
|
|
574, 572, 573, 575, 576, 577, 578, 588, 589, 590,
|
|
|
|
|
591, 592, 593, 600, 601, 474, 480, 475, 476, 477,
|
|
|
|
|
479, 481, 478, 251, 252, 253, 254, 255, 389, 418,
|
|
|
|
|
435, 554, 555, 442, 443, 429, 430, 0, 0, 0,
|
|
|
|
|
434, 594, 483, 484, 485, 433, 431, 432,
|
2007-10-18 18:49:08 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yydgoto[] = { 1,
|
|
|
|
|
14, 15, 27, 16, 28, 17, 29, 18, 30, 19,
|
|
|
|
|
31, 20, 32, 21, 33, 22, 34, 23, 35, 24,
|
|
|
|
|
36, 25, 37, 26, 38, 232, 233, 234, 235, 236,
|
|
|
|
|
237, 238, 239, 240, 241, 242, 243, 244, 245, 246,
|
|
|
|
|
247, 248, 249, 250, 251, 252, 253, 254, 255, 256,
|
|
|
|
|
257, 258, 259, 260, 261, 262, 263, 264, 265, 266,
|
|
|
|
|
267, 268, 269, 270, 271, 272, 273, 274, 275, 276,
|
|
|
|
|
277, 278, 279, 280, 281, 282, 283, 284, 285, 286,
|
|
|
|
|
287, 288, 289, 290, 291, 292, 293, 294, 295, 296,
|
|
|
|
|
297, 298, 299, 300, 301, 302, 303, 304, 305, 306,
|
|
|
|
|
307, 308, 309, 310, 311, 312, 313, 314, 315, 316,
|
|
|
|
|
317, 318, 319, 320, 321, 322, 323, 324, 325, 326,
|
|
|
|
|
327, 328, 329, 330, 331, 332, 333, 334, 335, 336,
|
|
|
|
|
337, 338, 339, 340, 341, 342, 343, 344, 345, 346,
|
|
|
|
|
347, 348, 349, 350, 351, 352, 353, 354, 355, 356,
|
|
|
|
|
357, 358, 359, 360, 361, 362, 363, 364, 365, 366,
|
|
|
|
|
367, 368, 369, 370, 371, 372, 373, 374, 375, 376,
|
|
|
|
|
377, 378, 379, 380, 381, 382, 383, 384, 385, 386,
|
|
|
|
|
387, 388, 389, 390, 391, 392, 393, 394, 395, 396,
|
|
|
|
|
397, 398, 399, 400, 401, 402, 403, 404, 405, 406,
|
|
|
|
|
407, 408, 409, 410, 411, 412, 413, 414, 415, 416,
|
|
|
|
|
417, 418, 419, 420, 421, 422, 423, 424, 425, 433,
|
|
|
|
|
434, 435, 436, 437, 438, 439, 440, 447, 448, 449,
|
|
|
|
|
450, 451, 452, 453, 518, 519, 520, 521, 522, 523,
|
2020-04-02 12:54:18 -04:00
|
|
|
524, 525, 573, 574, 575, 576, 577, 578, 579, 580,
|
|
|
|
|
581, 592, 593, 594, 595, 596, 597, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 465, 466, 467, 468, 469, 470, 471, 472, 473,
|
|
|
|
|
492, 493, 494, 495, 496, 497, 498, 499, 500, 501,
|
|
|
|
|
502, 503, 504, 505, 506, 507, 508, 509, 510, 455,
|
|
|
|
|
456, 536, 537, 538, 539, 540, 541, 542, 543, 544,
|
2020-04-02 12:54:18 -04:00
|
|
|
545, 546, 553, 554, 555, 556, 557, 558, 559, 562,
|
|
|
|
|
563, 564,
|
2007-10-18 18:49:08 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yysindex[] = { 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
-257, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 370, -291, -286, -360,
|
|
|
|
|
-301, -297, -298, -461, -442, -519, -253, -293, -251, -245,
|
|
|
|
|
-232, -231, -230, -229, -226, -225, -224, -223, -221, -220,
|
|
|
|
|
-218, -217, -207, -206, -205, -204, -196, -195, -193, -192,
|
|
|
|
|
-191, -190, -189, -188, -187, -186, -185, -184, -183, -182,
|
|
|
|
|
-179, -178, -177, -176, -175, -174, -173, -171, -167, -166,
|
|
|
|
|
-165, -164, -162, -161, -158, -155, -134, -133, -132, -131,
|
|
|
|
|
-130, -129, -128, -127, -126, -125, -124, -123, -122, -121,
|
|
|
|
|
-120, -119, -118, -117, -116, -114, -113, -112, -111, -110,
|
|
|
|
|
-109, -108, -107, -106, -105, -104, -103, -102, -101, -100,
|
|
|
|
|
-99, -98, -97, -95, -94, -93, -92, -91, -90, -89,
|
|
|
|
|
-88, -87, -86, -85, -84, -83, -82, -81, -80, -79,
|
|
|
|
|
-78, -77, -76, -75, -74, -73, -72, -71, -70, -69,
|
|
|
|
|
-68, -67, -66, -65, -64, -63, -62, -61, -60, -59,
|
|
|
|
|
-58, -56, -55, -54, -53, -52, -51, -50, -49, -48,
|
|
|
|
|
-47, -46, -45, -41, -40, -38, -37, -36, -35, -33,
|
|
|
|
|
-32, -31, -30, -29, -27, -26, -25, -23, -22, -21,
|
|
|
|
|
-20, -19, -12, -11, -10, -8, -7, -5, 7, 8,
|
|
|
|
|
9, 10, 11, 12, 13, 19, 20, 21, 22, 23,
|
|
|
|
|
24, 25, 26, 27, 28, 29, 30, 31, 32, 33,
|
|
|
|
|
34, 35, 40, 41, 46, 47, 48, 52, 53, 54,
|
|
|
|
|
58, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 0, 59, 60, 61, 62, 63,
|
|
|
|
|
64, 65, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
66, 67, 68, 69, 70, 71, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 72, 0, 0, 73, 74, 75, 76,
|
|
|
|
|
77, 78, 79, 80, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 81, 82, 90, 91, 92, 93, 98,
|
|
|
|
|
106, 107, 108, 109, 110, 111, 112, 113, 114, 120,
|
|
|
|
|
121, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
122, 123, 126, 127, 128, 132, 133, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 134, 138, 139, 140, 141,
|
|
|
|
|
142, 147, 148, 149, 150, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 151, 152, 153, 154,
|
|
|
|
|
155, 159, 0, 0, 0, 0, 0, 0, 0, 160,
|
|
|
|
|
161, 0, 0, 0, 162, 163, 164, 165, 166, 167,
|
|
|
|
|
170, 171, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 172, 173, 174, 175, 176, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 177, 178, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 182, 183, 186, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 187, 188, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 189, 190,
|
|
|
|
|
191, 192, 193, 194, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 198, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 199, 0, 0, 200, 205, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 206, 207, 208,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0,
|
2007-10-18 18:49:08 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yyrindex[] = { 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 1, 2, 3, 4,
|
2020-04-02 12:54:18 -04:00
|
|
|
14, 15, 16, 83, 84, 94, 95, 96, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0,
|
2020-03-24 04:25:05 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yygindex[] = { 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 227, 309, 320, 435, 0, 0, 0,
|
|
|
|
|
436, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0,
|
2007-10-18 18:49:08 -04:00
|
|
|
};
|
2020-04-02 12:54:18 -04:00
|
|
|
#define YYTABLESIZE 908
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yytable[] = { 511,
|
2020-04-02 12:54:18 -04:00
|
|
|
3, 4, 5, 6, 565, 454, 426, 2, 427, 428,
|
|
|
|
|
0, 441, 598, 7, 8, 9, 560, 561, 599, 442,
|
|
|
|
|
443, 526, 527, 528, 529, 530, 531, 532, 533, 534,
|
|
|
|
|
535, 600, 601, 602, 603, 512, 513, 604, 605, 606,
|
|
|
|
|
607, 3, 608, 609, 565, 610, 611, 4, 457, 458,
|
|
|
|
|
459, 460, 461, 462, 463, 464, 612, 613, 614, 615,
|
|
|
|
|
514, 547, 548, 549, 550, 551, 552, 616, 617, 429,
|
|
|
|
|
618, 619, 620, 621, 622, 623, 624, 625, 626, 627,
|
|
|
|
|
628, 629, 10, 11, 630, 631, 632, 633, 634, 635,
|
|
|
|
|
636, 5, 637, 12, 13, 14, 638, 639, 640, 641,
|
|
|
|
|
430, 642, 643, 431, 444, 644, 445, 6, 645, 474,
|
|
|
|
|
475, 476, 477, 478, 479, 480, 481, 482, 483, 484,
|
|
|
|
|
485, 486, 487, 488, 489, 490, 491, 515, 516, 646,
|
|
|
|
|
647, 648, 649, 650, 651, 652, 653, 654, 655, 656,
|
|
|
|
|
657, 658, 659, 660, 661, 662, 663, 664, 7, 665,
|
|
|
|
|
666, 667, 668, 669, 670, 671, 672, 673, 674, 675,
|
|
|
|
|
676, 677, 678, 679, 680, 681, 682, 517, 683, 684,
|
|
|
|
|
685, 686, 687, 688, 689, 690, 691, 692, 693, 694,
|
|
|
|
|
695, 696, 697, 698, 699, 700, 701, 702, 703, 704,
|
|
|
|
|
705, 706, 707, 708, 709, 710, 711, 712, 713, 714,
|
|
|
|
|
715, 716, 717, 718, 719, 720, 8, 721, 722, 723,
|
|
|
|
|
724, 725, 726, 727, 728, 729, 730, 731, 732, 567,
|
|
|
|
|
568, 569, 733, 734, 9, 735, 736, 737, 738, 572,
|
|
|
|
|
739, 740, 741, 742, 743, 432, 744, 745, 746, 446,
|
|
|
|
|
747, 748, 749, 750, 751, 10, 582, 583, 584, 585,
|
|
|
|
|
586, 752, 753, 754, 11, 755, 756, 566, 757, 567,
|
|
|
|
|
568, 569, 570, 571, 587, 3, 4, 5, 6, 572,
|
|
|
|
|
758, 759, 760, 761, 762, 763, 764, 12, 7, 8,
|
|
|
|
|
9, 13, 765, 766, 767, 768, 769, 770, 771, 772,
|
|
|
|
|
773, 774, 775, 776, 777, 778, 779, 780, 781, 3,
|
|
|
|
|
4, 5, 6, 782, 783, 3, 4, 5, 6, 784,
|
|
|
|
|
785, 786, 7, 8, 9, 787, 788, 789, 7, 8,
|
|
|
|
|
9, 790, 791, 792, 793, 794, 795, 796, 797, 798,
|
|
|
|
|
799, 800, 801, 802, 803, 804, 805, 806, 807, 808,
|
|
|
|
|
809, 810, 811, 812, 813, 814, 588, 10, 11, 3,
|
|
|
|
|
4, 5, 6, 815, 816, 817, 818, 589, 12, 13,
|
|
|
|
|
14, 819, 7, 8, 9, 3, 4, 5, 6, 820,
|
|
|
|
|
821, 822, 823, 824, 825, 826, 827, 828, 7, 8,
|
|
|
|
|
9, 10, 11, 829, 830, 831, 832, 10, 11, 833,
|
|
|
|
|
834, 835, 12, 13, 14, 836, 837, 838, 12, 13,
|
|
|
|
|
14, 839, 840, 841, 842, 843, 3, 4, 5, 6,
|
|
|
|
|
844, 845, 846, 847, 848, 849, 850, 851, 852, 7,
|
|
|
|
|
8, 9, 853, 854, 855, 856, 857, 858, 859, 860,
|
|
|
|
|
861, 10, 11, 862, 863, 864, 865, 866, 867, 868,
|
|
|
|
|
869, 870, 12, 13, 14, 871, 872, 10, 11, 873,
|
|
|
|
|
874, 875, 876, 877, 878, 879, 880, 881, 12, 13,
|
|
|
|
|
14, 882, 883, 884, 3, 4, 5, 6, 885, 886,
|
|
|
|
|
887, 888, 590, 591, 0, 0, 0, 7, 8, 9,
|
|
|
|
|
0, 0, 3, 4, 5, 6, 0, 0, 10, 11,
|
|
|
|
|
0, 0, 0, 0, 0, 7, 8, 9, 0, 12,
|
2020-04-02 12:34:03 -04:00
|
|
|
13, 14, 0, 3, 4, 5, 6, 0, 0, 0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 3, 4, 5, 6, 7, 8, 9, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 7, 8, 9, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 3, 4, 5, 6, 3,
|
|
|
|
|
4, 5, 6, 0, 0, 0, 10, 11, 7, 8,
|
|
|
|
|
9, 0, 7, 8, 9, 0, 0, 12, 13, 14,
|
|
|
|
|
0, 0, 0, 0, 10, 11, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 12, 13, 14, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 10, 11, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 10, 11, 12, 13, 14, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 12, 13, 14, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 10, 11, 0,
|
|
|
|
|
0, 10, 11, 0, 0, 0, 0, 0, 12, 13,
|
|
|
|
|
14, 0, 12, 13, 14, 39, 40, 41, 42, 43,
|
|
|
|
|
44, 45, 46, 47, 48, 49, 50, 51, 52, 53,
|
|
|
|
|
54, 55, 56, 57, 58, 59, 60, 61, 62, 63,
|
|
|
|
|
64, 65, 66, 67, 68, 69, 70, 0, 0, 0,
|
|
|
|
|
0, 71, 72, 73, 0, 0, 0, 74, 75, 76,
|
|
|
|
|
77, 78, 79, 80, 81, 82, 83, 84, 85, 86,
|
|
|
|
|
87, 88, 89, 90, 91, 92, 93, 94, 95, 96,
|
|
|
|
|
97, 98, 99, 100, 101, 102, 103, 104, 105, 106,
|
|
|
|
|
107, 108, 109, 110, 111, 112, 113, 114, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 115, 116, 117,
|
|
|
|
|
0, 118, 119, 120, 0, 0, 121, 122, 123, 124,
|
|
|
|
|
125, 126, 127, 128, 129, 130, 131, 132, 133, 134,
|
|
|
|
|
135, 136, 137, 138, 139, 140, 141, 142, 143, 144,
|
|
|
|
|
0, 0, 0, 145, 0, 146, 147, 148, 149, 150,
|
|
|
|
|
151, 152, 153, 154, 155, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 156, 157, 158, 159, 160, 161,
|
|
|
|
|
162, 163, 164, 165, 166, 167, 168, 169, 170, 171,
|
|
|
|
|
172, 173, 174, 175, 176, 177, 178, 179, 180, 181,
|
|
|
|
|
182, 183, 184, 185, 186, 187, 188, 189, 190, 191,
|
|
|
|
|
192, 193, 194, 0, 195, 0, 196, 197, 198, 199,
|
|
|
|
|
200, 201, 202, 203, 204, 205, 206, 207, 208, 209,
|
|
|
|
|
210, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 211, 212, 213, 214,
|
|
|
|
|
215, 216, 0, 0, 0, 0, 0, 0, 0, 217,
|
|
|
|
|
0, 0, 0, 0, 0, 0, 0, 218, 219, 0,
|
|
|
|
|
220, 221, 0, 222, 223, 0, 0, 224, 225, 226,
|
|
|
|
|
227, 228, 229, 230, 0, 0, 0, 231,
|
2009-03-13 05:27:37 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const YYINT yycheck[] = { 298,
|
2020-04-02 12:54:18 -04:00
|
|
|
0, 0, 0, 0, 298, 366, 298, 265, 300, 301,
|
|
|
|
|
-1, 298, 264, 0, 0, 0, 536, 537, 264, 306,
|
|
|
|
|
307, 483, 484, 485, 486, 487, 488, 489, 490, 491,
|
|
|
|
|
492, 264, 264, 264, 264, 334, 335, 264, 264, 264,
|
|
|
|
|
264, 299, 264, 264, 298, 264, 264, 305, 350, 351,
|
|
|
|
|
352, 353, 354, 355, 356, 357, 264, 264, 264, 264,
|
|
|
|
|
359, 504, 505, 506, 507, 508, 509, 264, 264, 361,
|
2020-04-02 12:34:03 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 0, 0, 264, 264, 264, 264, 264, 264,
|
|
|
|
|
264, 349, 264, 0, 0, 0, 264, 264, 264, 264,
|
|
|
|
|
392, 264, 264, 395, 391, 264, 393, 365, 264, 407,
|
|
|
|
|
408, 409, 410, 411, 412, 413, 414, 415, 416, 417,
|
|
|
|
|
418, 419, 420, 421, 422, 423, 424, 426, 427, 264,
|
2020-04-02 12:34:03 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 406, 264,
|
2020-04-02 12:34:03 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 466, 264, 264,
|
2020-04-02 12:34:03 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 464, 264, 264, 264,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 513,
|
|
|
|
|
514, 515, 264, 264, 482, 264, 264, 264, 264, 523,
|
|
|
|
|
264, 264, 264, 264, 264, 527, 264, 264, 264, 526,
|
|
|
|
|
264, 264, 264, 264, 264, 503, 540, 541, 542, 543,
|
|
|
|
|
544, 264, 264, 264, 512, 264, 264, 511, 264, 513,
|
|
|
|
|
514, 515, 516, 517, 38, 265, 265, 265, 265, 523,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 535, 265, 265,
|
|
|
|
|
265, 539, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:34:03 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 299,
|
|
|
|
|
299, 299, 299, 264, 264, 305, 305, 305, 305, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 299, 299, 299, 264, 264, 264, 305, 305,
|
2020-04-02 12:34:03 -04:00
|
|
|
305, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 38, 265, 265, 349,
|
|
|
|
|
349, 349, 349, 264, 264, 264, 264, 38, 265, 265,
|
|
|
|
|
265, 264, 349, 349, 349, 365, 365, 365, 365, 264,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 365, 365,
|
|
|
|
|
365, 299, 299, 264, 264, 264, 264, 305, 305, 264,
|
|
|
|
|
264, 264, 299, 299, 299, 264, 264, 264, 305, 305,
|
2020-04-02 12:34:03 -04:00
|
|
|
305, 264, 264, 264, 264, 264, 406, 406, 406, 406,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 264, 406,
|
2020-04-02 12:34:03 -04:00
|
|
|
406, 406, 264, 264, 264, 264, 264, 264, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 349, 349, 264, 264, 264, 264, 264, 264, 264,
|
|
|
|
|
264, 264, 349, 349, 349, 264, 264, 365, 365, 264,
|
|
|
|
|
264, 264, 264, 264, 264, 264, 264, 264, 365, 365,
|
2020-04-02 12:34:03 -04:00
|
|
|
365, 264, 264, 264, 464, 464, 464, 464, 264, 264,
|
2020-04-02 12:54:18 -04:00
|
|
|
264, 264, 38, 38, -1, -1, -1, 464, 464, 464,
|
|
|
|
|
-1, -1, 482, 482, 482, 482, -1, -1, 406, 406,
|
|
|
|
|
-1, -1, -1, -1, -1, 482, 482, 482, -1, 406,
|
2020-04-02 12:34:03 -04:00
|
|
|
406, 406, -1, 503, 503, 503, 503, -1, -1, -1,
|
2020-04-02 12:54:18 -04:00
|
|
|
-1, -1, 512, 512, 512, 512, 503, 503, 503, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, 512, 512, 512, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, 535, 535, 535, 535, 539,
|
|
|
|
|
539, 539, 539, -1, -1, -1, 464, 464, 535, 535,
|
|
|
|
|
535, -1, 539, 539, 539, -1, -1, 464, 464, 464,
|
|
|
|
|
-1, -1, -1, -1, 482, 482, -1, -1, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, 482, 482, 482, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, 503, 503, -1, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, 512, 512, 503, 503, 503, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, 512, 512, 512, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, -1, -1, 535, 535, -1,
|
|
|
|
|
-1, 539, 539, -1, -1, -1, -1, -1, 535, 535,
|
|
|
|
|
535, -1, 539, 539, 539, 266, 267, 268, 269, 270,
|
|
|
|
|
271, 272, 273, 274, 275, 276, 277, 278, 279, 280,
|
|
|
|
|
281, 282, 283, 284, 285, 286, 287, 288, 289, 290,
|
|
|
|
|
291, 292, 293, 294, 295, 296, 297, -1, -1, -1,
|
|
|
|
|
-1, 302, 303, 304, -1, -1, -1, 308, 309, 310,
|
|
|
|
|
311, 312, 313, 314, 315, 316, 317, 318, 319, 320,
|
|
|
|
|
321, 322, 323, 324, 325, 326, 327, 328, 329, 330,
|
|
|
|
|
331, 332, 333, 334, 335, 336, 337, 338, 339, 340,
|
|
|
|
|
341, 342, 343, 344, 345, 346, 347, 348, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, -1, -1, 358, 359, 360,
|
|
|
|
|
-1, 362, 363, 364, -1, -1, 367, 368, 369, 370,
|
|
|
|
|
371, 372, 373, 374, 375, 376, 377, 378, 379, 380,
|
|
|
|
|
381, 382, 383, 384, 385, 386, 387, 388, 389, 390,
|
|
|
|
|
-1, -1, -1, 394, -1, 396, 397, 398, 399, 400,
|
|
|
|
|
401, 402, 403, 404, 405, -1, -1, -1, -1, -1,
|
2020-04-02 12:34:03 -04:00
|
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
2020-04-02 12:54:18 -04:00
|
|
|
-1, -1, -1, -1, 425, 426, 427, 428, 429, 430,
|
|
|
|
|
431, 432, 433, 434, 435, 436, 437, 438, 439, 440,
|
|
|
|
|
441, 442, 443, 444, 445, 446, 447, 448, 449, 450,
|
|
|
|
|
451, 452, 453, 454, 455, 456, 457, 458, 459, 460,
|
|
|
|
|
461, 462, 463, -1, 465, -1, 467, 468, 469, 470,
|
|
|
|
|
471, 472, 473, 474, 475, 476, 477, 478, 479, 480,
|
|
|
|
|
481, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
|
|
|
|
-1, -1, -1, -1, -1, -1, 497, 498, 499, 500,
|
|
|
|
|
501, 502, -1, -1, -1, -1, -1, -1, -1, 510,
|
|
|
|
|
-1, -1, -1, -1, -1, -1, -1, 518, 519, -1,
|
|
|
|
|
521, 522, -1, 524, 525, -1, -1, 528, 529, 530,
|
|
|
|
|
531, 532, 533, 534, -1, -1, -1, 538,
|
2016-01-14 03:28:46 -05:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
#define YYFINAL 1
|
|
|
|
|
#ifndef YYDEBUG
|
|
|
|
|
#define YYDEBUG 0
|
|
|
|
|
#endif
|
2020-04-02 12:54:18 -04:00
|
|
|
#define YYMAXTOKEN 544
|
|
|
|
|
#define YYUNDFTOKEN 859
|
2020-04-02 12:34:03 -04:00
|
|
|
#define YYTRANSLATE(a) ((a) > YYMAXTOKEN ? YYUNDFTOKEN : (a))
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
static const char *const yyname[] = {
|
|
|
|
|
|
|
|
|
|
"end-of-file",0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,"SPACE","LETTER","NEWLINE",
|
|
|
|
|
"COMMENT","COLON","ANY","ZONESTR","STRING_ARG","VAR_SERVER","VAR_VERBOSITY",
|
|
|
|
|
"VAR_NUM_THREADS","VAR_PORT","VAR_OUTGOING_RANGE","VAR_INTERFACE",
|
|
|
|
|
"VAR_PREFER_IP4","VAR_DO_IP4","VAR_DO_IP6","VAR_PREFER_IP6","VAR_DO_UDP",
|
|
|
|
|
"VAR_DO_TCP","VAR_TCP_MSS","VAR_OUTGOING_TCP_MSS","VAR_TCP_IDLE_TIMEOUT",
|
|
|
|
|
"VAR_EDNS_TCP_KEEPALIVE","VAR_EDNS_TCP_KEEPALIVE_TIMEOUT","VAR_CHROOT",
|
|
|
|
|
"VAR_USERNAME","VAR_DIRECTORY","VAR_LOGFILE","VAR_PIDFILE","VAR_MSG_CACHE_SIZE",
|
|
|
|
|
"VAR_MSG_CACHE_SLABS","VAR_NUM_QUERIES_PER_THREAD","VAR_RRSET_CACHE_SIZE",
|
|
|
|
|
"VAR_RRSET_CACHE_SLABS","VAR_OUTGOING_NUM_TCP","VAR_INFRA_HOST_TTL",
|
|
|
|
|
"VAR_INFRA_LAME_TTL","VAR_INFRA_CACHE_SLABS","VAR_INFRA_CACHE_NUMHOSTS",
|
|
|
|
|
"VAR_INFRA_CACHE_LAME_SIZE","VAR_NAME","VAR_STUB_ZONE","VAR_STUB_HOST",
|
|
|
|
|
"VAR_STUB_ADDR","VAR_TARGET_FETCH_POLICY","VAR_HARDEN_SHORT_BUFSIZE",
|
|
|
|
|
"VAR_HARDEN_LARGE_QUERIES","VAR_FORWARD_ZONE","VAR_FORWARD_HOST",
|
|
|
|
|
"VAR_FORWARD_ADDR","VAR_DO_NOT_QUERY_ADDRESS","VAR_HIDE_IDENTITY",
|
|
|
|
|
"VAR_HIDE_VERSION","VAR_IDENTITY","VAR_VERSION","VAR_HARDEN_GLUE",
|
|
|
|
|
"VAR_MODULE_CONF","VAR_TRUST_ANCHOR_FILE","VAR_TRUST_ANCHOR",
|
|
|
|
|
"VAR_VAL_OVERRIDE_DATE","VAR_BOGUS_TTL","VAR_VAL_CLEAN_ADDITIONAL",
|
|
|
|
|
"VAR_VAL_PERMISSIVE_MODE","VAR_INCOMING_NUM_TCP","VAR_MSG_BUFFER_SIZE",
|
|
|
|
|
"VAR_KEY_CACHE_SIZE","VAR_KEY_CACHE_SLABS","VAR_TRUSTED_KEYS_FILE",
|
|
|
|
|
"VAR_VAL_NSEC3_KEYSIZE_ITERATIONS","VAR_USE_SYSLOG","VAR_OUTGOING_INTERFACE",
|
|
|
|
|
"VAR_ROOT_HINTS","VAR_DO_NOT_QUERY_LOCALHOST","VAR_CACHE_MAX_TTL",
|
|
|
|
|
"VAR_HARDEN_DNSSEC_STRIPPED","VAR_ACCESS_CONTROL","VAR_LOCAL_ZONE",
|
|
|
|
|
"VAR_LOCAL_DATA","VAR_INTERFACE_AUTOMATIC","VAR_STATISTICS_INTERVAL",
|
|
|
|
|
"VAR_DO_DAEMONIZE","VAR_USE_CAPS_FOR_ID","VAR_STATISTICS_CUMULATIVE",
|
|
|
|
|
"VAR_OUTGOING_PORT_PERMIT","VAR_OUTGOING_PORT_AVOID","VAR_DLV_ANCHOR_FILE",
|
|
|
|
|
"VAR_DLV_ANCHOR","VAR_NEG_CACHE_SIZE","VAR_HARDEN_REFERRAL_PATH",
|
|
|
|
|
"VAR_PRIVATE_ADDRESS","VAR_PRIVATE_DOMAIN","VAR_REMOTE_CONTROL",
|
|
|
|
|
"VAR_CONTROL_ENABLE","VAR_CONTROL_INTERFACE","VAR_CONTROL_PORT",
|
|
|
|
|
"VAR_SERVER_KEY_FILE","VAR_SERVER_CERT_FILE","VAR_CONTROL_KEY_FILE",
|
|
|
|
|
"VAR_CONTROL_CERT_FILE","VAR_CONTROL_USE_CERT","VAR_EXTENDED_STATISTICS",
|
|
|
|
|
"VAR_LOCAL_DATA_PTR","VAR_JOSTLE_TIMEOUT","VAR_STUB_PRIME",
|
|
|
|
|
"VAR_UNWANTED_REPLY_THRESHOLD","VAR_LOG_TIME_ASCII","VAR_DOMAIN_INSECURE",
|
|
|
|
|
"VAR_PYTHON","VAR_PYTHON_SCRIPT","VAR_VAL_SIG_SKEW_MIN","VAR_VAL_SIG_SKEW_MAX",
|
|
|
|
|
"VAR_CACHE_MIN_TTL","VAR_VAL_LOG_LEVEL","VAR_AUTO_TRUST_ANCHOR_FILE",
|
|
|
|
|
"VAR_KEEP_MISSING","VAR_ADD_HOLDDOWN","VAR_DEL_HOLDDOWN","VAR_SO_RCVBUF",
|
|
|
|
|
"VAR_EDNS_BUFFER_SIZE","VAR_PREFETCH","VAR_PREFETCH_KEY","VAR_SO_SNDBUF",
|
|
|
|
|
"VAR_SO_REUSEPORT","VAR_HARDEN_BELOW_NXDOMAIN","VAR_IGNORE_CD_FLAG",
|
|
|
|
|
"VAR_LOG_QUERIES","VAR_LOG_REPLIES","VAR_LOG_LOCAL_ACTIONS","VAR_TCP_UPSTREAM",
|
|
|
|
|
"VAR_SSL_UPSTREAM","VAR_SSL_SERVICE_KEY","VAR_SSL_SERVICE_PEM","VAR_SSL_PORT",
|
|
|
|
|
"VAR_FORWARD_FIRST","VAR_STUB_SSL_UPSTREAM","VAR_FORWARD_SSL_UPSTREAM",
|
|
|
|
|
"VAR_TLS_CERT_BUNDLE","VAR_STUB_FIRST","VAR_MINIMAL_RESPONSES",
|
|
|
|
|
"VAR_RRSET_ROUNDROBIN","VAR_MAX_UDP_SIZE","VAR_DELAY_CLOSE",
|
|
|
|
|
"VAR_UNBLOCK_LAN_ZONES","VAR_INSECURE_LAN_ZONES","VAR_INFRA_CACHE_MIN_RTT",
|
|
|
|
|
"VAR_DNS64_PREFIX","VAR_DNS64_SYNTHALL","VAR_DNS64_IGNORE_AAAA","VAR_DNSTAP",
|
|
|
|
|
"VAR_DNSTAP_ENABLE","VAR_DNSTAP_SOCKET_PATH","VAR_DNSTAP_IP","VAR_DNSTAP_TLS",
|
|
|
|
|
"VAR_DNSTAP_TLS_SERVER_NAME","VAR_DNSTAP_TLS_CERT_BUNDLE",
|
|
|
|
|
"VAR_DNSTAP_TLS_CLIENT_KEY_FILE","VAR_DNSTAP_TLS_CLIENT_CERT_FILE",
|
|
|
|
|
"VAR_DNSTAP_SEND_IDENTITY","VAR_DNSTAP_SEND_VERSION","VAR_DNSTAP_IDENTITY",
|
|
|
|
|
"VAR_DNSTAP_VERSION","VAR_DNSTAP_LOG_RESOLVER_QUERY_MESSAGES",
|
|
|
|
|
"VAR_DNSTAP_LOG_RESOLVER_RESPONSE_MESSAGES",
|
|
|
|
|
"VAR_DNSTAP_LOG_CLIENT_QUERY_MESSAGES",
|
|
|
|
|
"VAR_DNSTAP_LOG_CLIENT_RESPONSE_MESSAGES",
|
|
|
|
|
"VAR_DNSTAP_LOG_FORWARDER_QUERY_MESSAGES",
|
|
|
|
|
"VAR_DNSTAP_LOG_FORWARDER_RESPONSE_MESSAGES","VAR_RESPONSE_IP_TAG",
|
|
|
|
|
"VAR_RESPONSE_IP","VAR_RESPONSE_IP_DATA","VAR_HARDEN_ALGO_DOWNGRADE",
|
|
|
|
|
"VAR_IP_TRANSPARENT","VAR_IP_DSCP","VAR_DISABLE_DNSSEC_LAME_CHECK",
|
|
|
|
|
"VAR_IP_RATELIMIT","VAR_IP_RATELIMIT_SLABS","VAR_IP_RATELIMIT_SIZE",
|
|
|
|
|
"VAR_RATELIMIT","VAR_RATELIMIT_SLABS","VAR_RATELIMIT_SIZE",
|
|
|
|
|
"VAR_RATELIMIT_FOR_DOMAIN","VAR_RATELIMIT_BELOW_DOMAIN",
|
|
|
|
|
"VAR_IP_RATELIMIT_FACTOR","VAR_RATELIMIT_FACTOR","VAR_SEND_CLIENT_SUBNET",
|
|
|
|
|
"VAR_CLIENT_SUBNET_ZONE","VAR_CLIENT_SUBNET_ALWAYS_FORWARD",
|
|
|
|
|
"VAR_CLIENT_SUBNET_OPCODE","VAR_MAX_CLIENT_SUBNET_IPV4",
|
|
|
|
|
"VAR_MAX_CLIENT_SUBNET_IPV6","VAR_MIN_CLIENT_SUBNET_IPV4",
|
|
|
|
|
"VAR_MIN_CLIENT_SUBNET_IPV6","VAR_MAX_ECS_TREE_SIZE_IPV4",
|
|
|
|
|
"VAR_MAX_ECS_TREE_SIZE_IPV6","VAR_CAPS_WHITELIST","VAR_CACHE_MAX_NEGATIVE_TTL",
|
|
|
|
|
"VAR_PERMIT_SMALL_HOLDDOWN","VAR_QNAME_MINIMISATION",
|
|
|
|
|
"VAR_QNAME_MINIMISATION_STRICT","VAR_IP_FREEBIND","VAR_DEFINE_TAG",
|
|
|
|
|
"VAR_LOCAL_ZONE_TAG","VAR_ACCESS_CONTROL_TAG","VAR_LOCAL_ZONE_OVERRIDE",
|
|
|
|
|
"VAR_ACCESS_CONTROL_TAG_ACTION","VAR_ACCESS_CONTROL_TAG_DATA","VAR_VIEW",
|
|
|
|
|
"VAR_ACCESS_CONTROL_VIEW","VAR_VIEW_FIRST","VAR_SERVE_EXPIRED",
|
|
|
|
|
"VAR_SERVE_EXPIRED_TTL","VAR_SERVE_EXPIRED_TTL_RESET",
|
|
|
|
|
"VAR_SERVE_EXPIRED_REPLY_TTL","VAR_SERVE_EXPIRED_CLIENT_TIMEOUT","VAR_FAKE_DSA",
|
|
|
|
|
"VAR_FAKE_SHA1","VAR_LOG_IDENTITY","VAR_HIDE_TRUSTANCHOR",
|
|
|
|
|
"VAR_TRUST_ANCHOR_SIGNALING","VAR_AGGRESSIVE_NSEC","VAR_USE_SYSTEMD",
|
|
|
|
|
"VAR_SHM_ENABLE","VAR_SHM_KEY","VAR_ROOT_KEY_SENTINEL","VAR_DNSCRYPT",
|
|
|
|
|
"VAR_DNSCRYPT_ENABLE","VAR_DNSCRYPT_PORT","VAR_DNSCRYPT_PROVIDER",
|
|
|
|
|
"VAR_DNSCRYPT_SECRET_KEY","VAR_DNSCRYPT_PROVIDER_CERT",
|
|
|
|
|
"VAR_DNSCRYPT_PROVIDER_CERT_ROTATED","VAR_DNSCRYPT_SHARED_SECRET_CACHE_SIZE",
|
|
|
|
|
"VAR_DNSCRYPT_SHARED_SECRET_CACHE_SLABS","VAR_DNSCRYPT_NONCE_CACHE_SIZE",
|
|
|
|
|
"VAR_DNSCRYPT_NONCE_CACHE_SLABS","VAR_PAD_RESPONSES",
|
|
|
|
|
"VAR_PAD_RESPONSES_BLOCK_SIZE","VAR_PAD_QUERIES","VAR_PAD_QUERIES_BLOCK_SIZE",
|
|
|
|
|
"VAR_IPSECMOD_ENABLED","VAR_IPSECMOD_HOOK","VAR_IPSECMOD_IGNORE_BOGUS",
|
|
|
|
|
"VAR_IPSECMOD_MAX_TTL","VAR_IPSECMOD_WHITELIST","VAR_IPSECMOD_STRICT",
|
|
|
|
|
"VAR_CACHEDB","VAR_CACHEDB_BACKEND","VAR_CACHEDB_SECRETSEED",
|
|
|
|
|
"VAR_CACHEDB_REDISHOST","VAR_CACHEDB_REDISPORT","VAR_CACHEDB_REDISTIMEOUT",
|
2020-04-02 12:54:18 -04:00
|
|
|
"VAR_CACHEDB_REDISEXPIRERECORDS","VAR_UDP_UPSTREAM_WITHOUT_DOWNSTREAM",
|
|
|
|
|
"VAR_FOR_UPSTREAM","VAR_AUTH_ZONE","VAR_ZONEFILE","VAR_MASTER","VAR_URL",
|
|
|
|
|
"VAR_FOR_DOWNSTREAM","VAR_FALLBACK_ENABLED","VAR_TLS_ADDITIONAL_PORT",
|
|
|
|
|
"VAR_LOW_RTT","VAR_LOW_RTT_PERMIL","VAR_FAST_SERVER_PERMIL",
|
|
|
|
|
"VAR_FAST_SERVER_NUM","VAR_ALLOW_NOTIFY","VAR_TLS_WIN_CERT",
|
|
|
|
|
"VAR_TCP_CONNECTION_LIMIT","VAR_FORWARD_NO_CACHE","VAR_STUB_NO_CACHE",
|
|
|
|
|
"VAR_LOG_SERVFAIL","VAR_DENY_ANY","VAR_UNKNOWN_SERVER_TIME_LIMIT",
|
|
|
|
|
"VAR_LOG_TAG_QUERYREPLY","VAR_STREAM_WAIT_SIZE","VAR_TLS_CIPHERS",
|
|
|
|
|
"VAR_TLS_CIPHERSUITES","VAR_IPSET","VAR_IPSET_NAME_V4","VAR_IPSET_NAME_V6",
|
|
|
|
|
"VAR_TLS_SESSION_TICKET_KEYS","VAR_RPZ","VAR_TAGS","VAR_RPZ_ACTION_OVERRIDE",
|
|
|
|
|
"VAR_RPZ_CNAME_OVERRIDE","VAR_RPZ_LOG","VAR_RPZ_LOG_NAME",0,0,0,0,0,0,0,0,0,0,0,
|
2020-04-02 12:34:03 -04:00
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
|
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
|
2020-04-02 12:54:18 -04:00
|
|
|
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,"illegal-symbol",
|
2020-03-24 04:25:05 -04:00
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
static const char *const yyrule[] = {
|
|
|
|
|
"$accept : toplevelvars",
|
|
|
|
|
"toplevelvars :",
|
|
|
|
|
"toplevelvars : toplevelvars toplevelvar",
|
|
|
|
|
"toplevelvar : serverstart contents_server",
|
|
|
|
|
"toplevelvar : stubstart contents_stub",
|
|
|
|
|
"toplevelvar : forwardstart contents_forward",
|
|
|
|
|
"toplevelvar : pythonstart contents_py",
|
|
|
|
|
"toplevelvar : rcstart contents_rc",
|
|
|
|
|
"toplevelvar : dtstart contents_dt",
|
|
|
|
|
"toplevelvar : viewstart contents_view",
|
|
|
|
|
"toplevelvar : dnscstart contents_dnsc",
|
|
|
|
|
"toplevelvar : cachedbstart contents_cachedb",
|
|
|
|
|
"toplevelvar : ipsetstart contents_ipset",
|
|
|
|
|
"toplevelvar : authstart contents_auth",
|
|
|
|
|
"toplevelvar : rpzstart contents_rpz",
|
|
|
|
|
"serverstart : VAR_SERVER",
|
|
|
|
|
"contents_server : contents_server content_server",
|
|
|
|
|
"contents_server :",
|
|
|
|
|
"content_server : server_num_threads",
|
|
|
|
|
"content_server : server_verbosity",
|
|
|
|
|
"content_server : server_port",
|
|
|
|
|
"content_server : server_outgoing_range",
|
|
|
|
|
"content_server : server_do_ip4",
|
|
|
|
|
"content_server : server_do_ip6",
|
|
|
|
|
"content_server : server_prefer_ip4",
|
|
|
|
|
"content_server : server_prefer_ip6",
|
|
|
|
|
"content_server : server_do_udp",
|
|
|
|
|
"content_server : server_do_tcp",
|
|
|
|
|
"content_server : server_tcp_mss",
|
|
|
|
|
"content_server : server_outgoing_tcp_mss",
|
|
|
|
|
"content_server : server_tcp_idle_timeout",
|
|
|
|
|
"content_server : server_tcp_keepalive",
|
|
|
|
|
"content_server : server_tcp_keepalive_timeout",
|
|
|
|
|
"content_server : server_interface",
|
|
|
|
|
"content_server : server_chroot",
|
|
|
|
|
"content_server : server_username",
|
|
|
|
|
"content_server : server_directory",
|
|
|
|
|
"content_server : server_logfile",
|
|
|
|
|
"content_server : server_pidfile",
|
|
|
|
|
"content_server : server_msg_cache_size",
|
|
|
|
|
"content_server : server_msg_cache_slabs",
|
|
|
|
|
"content_server : server_num_queries_per_thread",
|
|
|
|
|
"content_server : server_rrset_cache_size",
|
|
|
|
|
"content_server : server_rrset_cache_slabs",
|
|
|
|
|
"content_server : server_outgoing_num_tcp",
|
|
|
|
|
"content_server : server_infra_host_ttl",
|
|
|
|
|
"content_server : server_infra_lame_ttl",
|
|
|
|
|
"content_server : server_infra_cache_slabs",
|
|
|
|
|
"content_server : server_infra_cache_numhosts",
|
|
|
|
|
"content_server : server_infra_cache_lame_size",
|
|
|
|
|
"content_server : server_target_fetch_policy",
|
|
|
|
|
"content_server : server_harden_short_bufsize",
|
|
|
|
|
"content_server : server_harden_large_queries",
|
|
|
|
|
"content_server : server_do_not_query_address",
|
|
|
|
|
"content_server : server_hide_identity",
|
|
|
|
|
"content_server : server_hide_version",
|
|
|
|
|
"content_server : server_identity",
|
|
|
|
|
"content_server : server_version",
|
|
|
|
|
"content_server : server_harden_glue",
|
|
|
|
|
"content_server : server_module_conf",
|
|
|
|
|
"content_server : server_trust_anchor_file",
|
|
|
|
|
"content_server : server_trust_anchor",
|
|
|
|
|
"content_server : server_val_override_date",
|
|
|
|
|
"content_server : server_bogus_ttl",
|
|
|
|
|
"content_server : server_val_clean_additional",
|
|
|
|
|
"content_server : server_val_permissive_mode",
|
|
|
|
|
"content_server : server_incoming_num_tcp",
|
|
|
|
|
"content_server : server_msg_buffer_size",
|
|
|
|
|
"content_server : server_key_cache_size",
|
|
|
|
|
"content_server : server_key_cache_slabs",
|
|
|
|
|
"content_server : server_trusted_keys_file",
|
|
|
|
|
"content_server : server_val_nsec3_keysize_iterations",
|
|
|
|
|
"content_server : server_use_syslog",
|
|
|
|
|
"content_server : server_outgoing_interface",
|
|
|
|
|
"content_server : server_root_hints",
|
|
|
|
|
"content_server : server_do_not_query_localhost",
|
|
|
|
|
"content_server : server_cache_max_ttl",
|
|
|
|
|
"content_server : server_harden_dnssec_stripped",
|
|
|
|
|
"content_server : server_access_control",
|
|
|
|
|
"content_server : server_local_zone",
|
|
|
|
|
"content_server : server_local_data",
|
|
|
|
|
"content_server : server_interface_automatic",
|
|
|
|
|
"content_server : server_statistics_interval",
|
|
|
|
|
"content_server : server_do_daemonize",
|
|
|
|
|
"content_server : server_use_caps_for_id",
|
|
|
|
|
"content_server : server_statistics_cumulative",
|
|
|
|
|
"content_server : server_outgoing_port_permit",
|
|
|
|
|
"content_server : server_outgoing_port_avoid",
|
|
|
|
|
"content_server : server_dlv_anchor_file",
|
|
|
|
|
"content_server : server_dlv_anchor",
|
|
|
|
|
"content_server : server_neg_cache_size",
|
|
|
|
|
"content_server : server_harden_referral_path",
|
|
|
|
|
"content_server : server_private_address",
|
|
|
|
|
"content_server : server_private_domain",
|
|
|
|
|
"content_server : server_extended_statistics",
|
|
|
|
|
"content_server : server_local_data_ptr",
|
|
|
|
|
"content_server : server_jostle_timeout",
|
|
|
|
|
"content_server : server_unwanted_reply_threshold",
|
|
|
|
|
"content_server : server_log_time_ascii",
|
|
|
|
|
"content_server : server_domain_insecure",
|
|
|
|
|
"content_server : server_val_sig_skew_min",
|
|
|
|
|
"content_server : server_val_sig_skew_max",
|
|
|
|
|
"content_server : server_cache_min_ttl",
|
|
|
|
|
"content_server : server_val_log_level",
|
|
|
|
|
"content_server : server_auto_trust_anchor_file",
|
|
|
|
|
"content_server : server_add_holddown",
|
|
|
|
|
"content_server : server_del_holddown",
|
|
|
|
|
"content_server : server_keep_missing",
|
|
|
|
|
"content_server : server_so_rcvbuf",
|
|
|
|
|
"content_server : server_edns_buffer_size",
|
|
|
|
|
"content_server : server_prefetch",
|
|
|
|
|
"content_server : server_prefetch_key",
|
|
|
|
|
"content_server : server_so_sndbuf",
|
|
|
|
|
"content_server : server_harden_below_nxdomain",
|
|
|
|
|
"content_server : server_ignore_cd_flag",
|
|
|
|
|
"content_server : server_log_queries",
|
|
|
|
|
"content_server : server_log_replies",
|
|
|
|
|
"content_server : server_tcp_upstream",
|
|
|
|
|
"content_server : server_ssl_upstream",
|
|
|
|
|
"content_server : server_log_local_actions",
|
|
|
|
|
"content_server : server_ssl_service_key",
|
|
|
|
|
"content_server : server_ssl_service_pem",
|
|
|
|
|
"content_server : server_ssl_port",
|
|
|
|
|
"content_server : server_minimal_responses",
|
|
|
|
|
"content_server : server_rrset_roundrobin",
|
|
|
|
|
"content_server : server_max_udp_size",
|
|
|
|
|
"content_server : server_so_reuseport",
|
|
|
|
|
"content_server : server_delay_close",
|
|
|
|
|
"content_server : server_unblock_lan_zones",
|
|
|
|
|
"content_server : server_insecure_lan_zones",
|
|
|
|
|
"content_server : server_dns64_prefix",
|
|
|
|
|
"content_server : server_dns64_synthall",
|
|
|
|
|
"content_server : server_dns64_ignore_aaaa",
|
|
|
|
|
"content_server : server_infra_cache_min_rtt",
|
|
|
|
|
"content_server : server_harden_algo_downgrade",
|
|
|
|
|
"content_server : server_ip_transparent",
|
|
|
|
|
"content_server : server_ip_ratelimit",
|
|
|
|
|
"content_server : server_ratelimit",
|
|
|
|
|
"content_server : server_ip_dscp",
|
|
|
|
|
"content_server : server_ip_ratelimit_slabs",
|
|
|
|
|
"content_server : server_ratelimit_slabs",
|
|
|
|
|
"content_server : server_ip_ratelimit_size",
|
|
|
|
|
"content_server : server_ratelimit_size",
|
|
|
|
|
"content_server : server_ratelimit_for_domain",
|
|
|
|
|
"content_server : server_ratelimit_below_domain",
|
|
|
|
|
"content_server : server_ratelimit_factor",
|
|
|
|
|
"content_server : server_ip_ratelimit_factor",
|
|
|
|
|
"content_server : server_send_client_subnet",
|
|
|
|
|
"content_server : server_client_subnet_zone",
|
|
|
|
|
"content_server : server_client_subnet_always_forward",
|
|
|
|
|
"content_server : server_client_subnet_opcode",
|
|
|
|
|
"content_server : server_max_client_subnet_ipv4",
|
|
|
|
|
"content_server : server_max_client_subnet_ipv6",
|
|
|
|
|
"content_server : server_min_client_subnet_ipv4",
|
|
|
|
|
"content_server : server_min_client_subnet_ipv6",
|
|
|
|
|
"content_server : server_max_ecs_tree_size_ipv4",
|
|
|
|
|
"content_server : server_max_ecs_tree_size_ipv6",
|
|
|
|
|
"content_server : server_caps_whitelist",
|
|
|
|
|
"content_server : server_cache_max_negative_ttl",
|
|
|
|
|
"content_server : server_permit_small_holddown",
|
|
|
|
|
"content_server : server_qname_minimisation",
|
|
|
|
|
"content_server : server_ip_freebind",
|
|
|
|
|
"content_server : server_define_tag",
|
|
|
|
|
"content_server : server_local_zone_tag",
|
|
|
|
|
"content_server : server_disable_dnssec_lame_check",
|
|
|
|
|
"content_server : server_access_control_tag",
|
|
|
|
|
"content_server : server_local_zone_override",
|
|
|
|
|
"content_server : server_access_control_tag_action",
|
|
|
|
|
"content_server : server_access_control_tag_data",
|
|
|
|
|
"content_server : server_access_control_view",
|
|
|
|
|
"content_server : server_qname_minimisation_strict",
|
|
|
|
|
"content_server : server_serve_expired",
|
|
|
|
|
"content_server : server_serve_expired_ttl",
|
|
|
|
|
"content_server : server_serve_expired_ttl_reset",
|
|
|
|
|
"content_server : server_serve_expired_reply_ttl",
|
|
|
|
|
"content_server : server_serve_expired_client_timeout",
|
|
|
|
|
"content_server : server_fake_dsa",
|
|
|
|
|
"content_server : server_log_identity",
|
|
|
|
|
"content_server : server_use_systemd",
|
|
|
|
|
"content_server : server_response_ip_tag",
|
|
|
|
|
"content_server : server_response_ip",
|
|
|
|
|
"content_server : server_response_ip_data",
|
|
|
|
|
"content_server : server_shm_enable",
|
|
|
|
|
"content_server : server_shm_key",
|
|
|
|
|
"content_server : server_fake_sha1",
|
|
|
|
|
"content_server : server_hide_trustanchor",
|
|
|
|
|
"content_server : server_trust_anchor_signaling",
|
|
|
|
|
"content_server : server_root_key_sentinel",
|
|
|
|
|
"content_server : server_ipsecmod_enabled",
|
|
|
|
|
"content_server : server_ipsecmod_hook",
|
|
|
|
|
"content_server : server_ipsecmod_ignore_bogus",
|
|
|
|
|
"content_server : server_ipsecmod_max_ttl",
|
|
|
|
|
"content_server : server_ipsecmod_whitelist",
|
|
|
|
|
"content_server : server_ipsecmod_strict",
|
|
|
|
|
"content_server : server_udp_upstream_without_downstream",
|
|
|
|
|
"content_server : server_aggressive_nsec",
|
|
|
|
|
"content_server : server_tls_cert_bundle",
|
|
|
|
|
"content_server : server_tls_additional_port",
|
|
|
|
|
"content_server : server_low_rtt",
|
|
|
|
|
"content_server : server_fast_server_permil",
|
|
|
|
|
"content_server : server_fast_server_num",
|
|
|
|
|
"content_server : server_tls_win_cert",
|
|
|
|
|
"content_server : server_tcp_connection_limit",
|
|
|
|
|
"content_server : server_log_servfail",
|
|
|
|
|
"content_server : server_deny_any",
|
|
|
|
|
"content_server : server_unknown_server_time_limit",
|
|
|
|
|
"content_server : server_log_tag_queryreply",
|
|
|
|
|
"content_server : server_stream_wait_size",
|
|
|
|
|
"content_server : server_tls_ciphers",
|
|
|
|
|
"content_server : server_tls_ciphersuites",
|
|
|
|
|
"content_server : server_tls_session_ticket_keys",
|
|
|
|
|
"stubstart : VAR_STUB_ZONE",
|
|
|
|
|
"contents_stub : contents_stub content_stub",
|
|
|
|
|
"contents_stub :",
|
|
|
|
|
"content_stub : stub_name",
|
|
|
|
|
"content_stub : stub_host",
|
|
|
|
|
"content_stub : stub_addr",
|
|
|
|
|
"content_stub : stub_prime",
|
|
|
|
|
"content_stub : stub_first",
|
|
|
|
|
"content_stub : stub_no_cache",
|
|
|
|
|
"content_stub : stub_ssl_upstream",
|
|
|
|
|
"forwardstart : VAR_FORWARD_ZONE",
|
|
|
|
|
"contents_forward : contents_forward content_forward",
|
|
|
|
|
"contents_forward :",
|
|
|
|
|
"content_forward : forward_name",
|
|
|
|
|
"content_forward : forward_host",
|
|
|
|
|
"content_forward : forward_addr",
|
|
|
|
|
"content_forward : forward_first",
|
|
|
|
|
"content_forward : forward_no_cache",
|
|
|
|
|
"content_forward : forward_ssl_upstream",
|
|
|
|
|
"viewstart : VAR_VIEW",
|
|
|
|
|
"contents_view : contents_view content_view",
|
|
|
|
|
"contents_view :",
|
|
|
|
|
"content_view : view_name",
|
|
|
|
|
"content_view : view_local_zone",
|
|
|
|
|
"content_view : view_local_data",
|
|
|
|
|
"content_view : view_first",
|
|
|
|
|
"content_view : view_response_ip",
|
|
|
|
|
"content_view : view_response_ip_data",
|
|
|
|
|
"content_view : view_local_data_ptr",
|
|
|
|
|
"authstart : VAR_AUTH_ZONE",
|
|
|
|
|
"contents_auth : contents_auth content_auth",
|
|
|
|
|
"contents_auth :",
|
|
|
|
|
"content_auth : auth_name",
|
|
|
|
|
"content_auth : auth_zonefile",
|
|
|
|
|
"content_auth : auth_master",
|
|
|
|
|
"content_auth : auth_url",
|
|
|
|
|
"content_auth : auth_for_downstream",
|
|
|
|
|
"content_auth : auth_for_upstream",
|
|
|
|
|
"content_auth : auth_fallback_enabled",
|
|
|
|
|
"content_auth : auth_allow_notify",
|
|
|
|
|
"rpz_tag : VAR_TAGS STRING_ARG",
|
|
|
|
|
"rpz_action_override : VAR_RPZ_ACTION_OVERRIDE STRING_ARG",
|
|
|
|
|
"rpz_cname_override : VAR_RPZ_CNAME_OVERRIDE STRING_ARG",
|
|
|
|
|
"rpz_log : VAR_RPZ_LOG STRING_ARG",
|
|
|
|
|
"rpz_log_name : VAR_RPZ_LOG_NAME STRING_ARG",
|
|
|
|
|
"rpzstart : VAR_RPZ",
|
|
|
|
|
"contents_rpz : contents_rpz content_rpz",
|
|
|
|
|
"contents_rpz :",
|
|
|
|
|
"content_rpz : auth_name",
|
|
|
|
|
"content_rpz : auth_zonefile",
|
|
|
|
|
"content_rpz : rpz_tag",
|
|
|
|
|
"content_rpz : auth_master",
|
|
|
|
|
"content_rpz : auth_url",
|
|
|
|
|
"content_rpz : auth_allow_notify",
|
|
|
|
|
"content_rpz : rpz_action_override",
|
|
|
|
|
"content_rpz : rpz_cname_override",
|
|
|
|
|
"content_rpz : rpz_log",
|
|
|
|
|
"content_rpz : rpz_log_name",
|
|
|
|
|
"server_num_threads : VAR_NUM_THREADS STRING_ARG",
|
|
|
|
|
"server_verbosity : VAR_VERBOSITY STRING_ARG",
|
|
|
|
|
"server_statistics_interval : VAR_STATISTICS_INTERVAL STRING_ARG",
|
|
|
|
|
"server_statistics_cumulative : VAR_STATISTICS_CUMULATIVE STRING_ARG",
|
|
|
|
|
"server_extended_statistics : VAR_EXTENDED_STATISTICS STRING_ARG",
|
|
|
|
|
"server_shm_enable : VAR_SHM_ENABLE STRING_ARG",
|
|
|
|
|
"server_shm_key : VAR_SHM_KEY STRING_ARG",
|
|
|
|
|
"server_port : VAR_PORT STRING_ARG",
|
|
|
|
|
"server_send_client_subnet : VAR_SEND_CLIENT_SUBNET STRING_ARG",
|
|
|
|
|
"server_client_subnet_zone : VAR_CLIENT_SUBNET_ZONE STRING_ARG",
|
|
|
|
|
"server_client_subnet_always_forward : VAR_CLIENT_SUBNET_ALWAYS_FORWARD STRING_ARG",
|
|
|
|
|
"server_client_subnet_opcode : VAR_CLIENT_SUBNET_OPCODE STRING_ARG",
|
|
|
|
|
"server_max_client_subnet_ipv4 : VAR_MAX_CLIENT_SUBNET_IPV4 STRING_ARG",
|
|
|
|
|
"server_max_client_subnet_ipv6 : VAR_MAX_CLIENT_SUBNET_IPV6 STRING_ARG",
|
|
|
|
|
"server_min_client_subnet_ipv4 : VAR_MIN_CLIENT_SUBNET_IPV4 STRING_ARG",
|
|
|
|
|
"server_min_client_subnet_ipv6 : VAR_MIN_CLIENT_SUBNET_IPV6 STRING_ARG",
|
|
|
|
|
"server_max_ecs_tree_size_ipv4 : VAR_MAX_ECS_TREE_SIZE_IPV4 STRING_ARG",
|
|
|
|
|
"server_max_ecs_tree_size_ipv6 : VAR_MAX_ECS_TREE_SIZE_IPV6 STRING_ARG",
|
|
|
|
|
"server_interface : VAR_INTERFACE STRING_ARG",
|
|
|
|
|
"server_outgoing_interface : VAR_OUTGOING_INTERFACE STRING_ARG",
|
|
|
|
|
"server_outgoing_range : VAR_OUTGOING_RANGE STRING_ARG",
|
|
|
|
|
"server_outgoing_port_permit : VAR_OUTGOING_PORT_PERMIT STRING_ARG",
|
|
|
|
|
"server_outgoing_port_avoid : VAR_OUTGOING_PORT_AVOID STRING_ARG",
|
|
|
|
|
"server_outgoing_num_tcp : VAR_OUTGOING_NUM_TCP STRING_ARG",
|
|
|
|
|
"server_incoming_num_tcp : VAR_INCOMING_NUM_TCP STRING_ARG",
|
|
|
|
|
"server_interface_automatic : VAR_INTERFACE_AUTOMATIC STRING_ARG",
|
|
|
|
|
"server_do_ip4 : VAR_DO_IP4 STRING_ARG",
|
|
|
|
|
"server_do_ip6 : VAR_DO_IP6 STRING_ARG",
|
|
|
|
|
"server_do_udp : VAR_DO_UDP STRING_ARG",
|
|
|
|
|
"server_do_tcp : VAR_DO_TCP STRING_ARG",
|
|
|
|
|
"server_prefer_ip4 : VAR_PREFER_IP4 STRING_ARG",
|
|
|
|
|
"server_prefer_ip6 : VAR_PREFER_IP6 STRING_ARG",
|
|
|
|
|
"server_tcp_mss : VAR_TCP_MSS STRING_ARG",
|
|
|
|
|
"server_outgoing_tcp_mss : VAR_OUTGOING_TCP_MSS STRING_ARG",
|
|
|
|
|
"server_tcp_idle_timeout : VAR_TCP_IDLE_TIMEOUT STRING_ARG",
|
|
|
|
|
"server_tcp_keepalive : VAR_EDNS_TCP_KEEPALIVE STRING_ARG",
|
|
|
|
|
"server_tcp_keepalive_timeout : VAR_EDNS_TCP_KEEPALIVE_TIMEOUT STRING_ARG",
|
|
|
|
|
"server_tcp_upstream : VAR_TCP_UPSTREAM STRING_ARG",
|
|
|
|
|
"server_udp_upstream_without_downstream : VAR_UDP_UPSTREAM_WITHOUT_DOWNSTREAM STRING_ARG",
|
|
|
|
|
"server_ssl_upstream : VAR_SSL_UPSTREAM STRING_ARG",
|
|
|
|
|
"server_ssl_service_key : VAR_SSL_SERVICE_KEY STRING_ARG",
|
|
|
|
|
"server_ssl_service_pem : VAR_SSL_SERVICE_PEM STRING_ARG",
|
|
|
|
|
"server_ssl_port : VAR_SSL_PORT STRING_ARG",
|
|
|
|
|
"server_tls_cert_bundle : VAR_TLS_CERT_BUNDLE STRING_ARG",
|
|
|
|
|
"server_tls_win_cert : VAR_TLS_WIN_CERT STRING_ARG",
|
|
|
|
|
"server_tls_additional_port : VAR_TLS_ADDITIONAL_PORT STRING_ARG",
|
|
|
|
|
"server_tls_ciphers : VAR_TLS_CIPHERS STRING_ARG",
|
|
|
|
|
"server_tls_ciphersuites : VAR_TLS_CIPHERSUITES STRING_ARG",
|
|
|
|
|
"server_tls_session_ticket_keys : VAR_TLS_SESSION_TICKET_KEYS STRING_ARG",
|
|
|
|
|
"server_use_systemd : VAR_USE_SYSTEMD STRING_ARG",
|
|
|
|
|
"server_do_daemonize : VAR_DO_DAEMONIZE STRING_ARG",
|
|
|
|
|
"server_use_syslog : VAR_USE_SYSLOG STRING_ARG",
|
|
|
|
|
"server_log_time_ascii : VAR_LOG_TIME_ASCII STRING_ARG",
|
|
|
|
|
"server_log_queries : VAR_LOG_QUERIES STRING_ARG",
|
|
|
|
|
"server_log_replies : VAR_LOG_REPLIES STRING_ARG",
|
|
|
|
|
"server_log_tag_queryreply : VAR_LOG_TAG_QUERYREPLY STRING_ARG",
|
|
|
|
|
"server_log_servfail : VAR_LOG_SERVFAIL STRING_ARG",
|
|
|
|
|
"server_log_local_actions : VAR_LOG_LOCAL_ACTIONS STRING_ARG",
|
|
|
|
|
"server_chroot : VAR_CHROOT STRING_ARG",
|
|
|
|
|
"server_username : VAR_USERNAME STRING_ARG",
|
|
|
|
|
"server_directory : VAR_DIRECTORY STRING_ARG",
|
|
|
|
|
"server_logfile : VAR_LOGFILE STRING_ARG",
|
|
|
|
|
"server_pidfile : VAR_PIDFILE STRING_ARG",
|
|
|
|
|
"server_root_hints : VAR_ROOT_HINTS STRING_ARG",
|
|
|
|
|
"server_dlv_anchor_file : VAR_DLV_ANCHOR_FILE STRING_ARG",
|
|
|
|
|
"server_dlv_anchor : VAR_DLV_ANCHOR STRING_ARG",
|
|
|
|
|
"server_auto_trust_anchor_file : VAR_AUTO_TRUST_ANCHOR_FILE STRING_ARG",
|
|
|
|
|
"server_trust_anchor_file : VAR_TRUST_ANCHOR_FILE STRING_ARG",
|
|
|
|
|
"server_trusted_keys_file : VAR_TRUSTED_KEYS_FILE STRING_ARG",
|
|
|
|
|
"server_trust_anchor : VAR_TRUST_ANCHOR STRING_ARG",
|
|
|
|
|
"server_trust_anchor_signaling : VAR_TRUST_ANCHOR_SIGNALING STRING_ARG",
|
|
|
|
|
"server_root_key_sentinel : VAR_ROOT_KEY_SENTINEL STRING_ARG",
|
|
|
|
|
"server_domain_insecure : VAR_DOMAIN_INSECURE STRING_ARG",
|
|
|
|
|
"server_hide_identity : VAR_HIDE_IDENTITY STRING_ARG",
|
|
|
|
|
"server_hide_version : VAR_HIDE_VERSION STRING_ARG",
|
|
|
|
|
"server_hide_trustanchor : VAR_HIDE_TRUSTANCHOR STRING_ARG",
|
|
|
|
|
"server_identity : VAR_IDENTITY STRING_ARG",
|
|
|
|
|
"server_version : VAR_VERSION STRING_ARG",
|
|
|
|
|
"server_so_rcvbuf : VAR_SO_RCVBUF STRING_ARG",
|
|
|
|
|
"server_so_sndbuf : VAR_SO_SNDBUF STRING_ARG",
|
|
|
|
|
"server_so_reuseport : VAR_SO_REUSEPORT STRING_ARG",
|
|
|
|
|
"server_ip_transparent : VAR_IP_TRANSPARENT STRING_ARG",
|
|
|
|
|
"server_ip_freebind : VAR_IP_FREEBIND STRING_ARG",
|
|
|
|
|
"server_ip_dscp : VAR_IP_DSCP STRING_ARG",
|
|
|
|
|
"server_stream_wait_size : VAR_STREAM_WAIT_SIZE STRING_ARG",
|
|
|
|
|
"server_edns_buffer_size : VAR_EDNS_BUFFER_SIZE STRING_ARG",
|
|
|
|
|
"server_msg_buffer_size : VAR_MSG_BUFFER_SIZE STRING_ARG",
|
|
|
|
|
"server_msg_cache_size : VAR_MSG_CACHE_SIZE STRING_ARG",
|
|
|
|
|
"server_msg_cache_slabs : VAR_MSG_CACHE_SLABS STRING_ARG",
|
|
|
|
|
"server_num_queries_per_thread : VAR_NUM_QUERIES_PER_THREAD STRING_ARG",
|
|
|
|
|
"server_jostle_timeout : VAR_JOSTLE_TIMEOUT STRING_ARG",
|
|
|
|
|
"server_delay_close : VAR_DELAY_CLOSE STRING_ARG",
|
|
|
|
|
"server_unblock_lan_zones : VAR_UNBLOCK_LAN_ZONES STRING_ARG",
|
|
|
|
|
"server_insecure_lan_zones : VAR_INSECURE_LAN_ZONES STRING_ARG",
|
|
|
|
|
"server_rrset_cache_size : VAR_RRSET_CACHE_SIZE STRING_ARG",
|
|
|
|
|
"server_rrset_cache_slabs : VAR_RRSET_CACHE_SLABS STRING_ARG",
|
|
|
|
|
"server_infra_host_ttl : VAR_INFRA_HOST_TTL STRING_ARG",
|
|
|
|
|
"server_infra_lame_ttl : VAR_INFRA_LAME_TTL STRING_ARG",
|
|
|
|
|
"server_infra_cache_numhosts : VAR_INFRA_CACHE_NUMHOSTS STRING_ARG",
|
|
|
|
|
"server_infra_cache_lame_size : VAR_INFRA_CACHE_LAME_SIZE STRING_ARG",
|
|
|
|
|
"server_infra_cache_slabs : VAR_INFRA_CACHE_SLABS STRING_ARG",
|
|
|
|
|
"server_infra_cache_min_rtt : VAR_INFRA_CACHE_MIN_RTT STRING_ARG",
|
|
|
|
|
"server_target_fetch_policy : VAR_TARGET_FETCH_POLICY STRING_ARG",
|
|
|
|
|
"server_harden_short_bufsize : VAR_HARDEN_SHORT_BUFSIZE STRING_ARG",
|
|
|
|
|
"server_harden_large_queries : VAR_HARDEN_LARGE_QUERIES STRING_ARG",
|
|
|
|
|
"server_harden_glue : VAR_HARDEN_GLUE STRING_ARG",
|
|
|
|
|
"server_harden_dnssec_stripped : VAR_HARDEN_DNSSEC_STRIPPED STRING_ARG",
|
|
|
|
|
"server_harden_below_nxdomain : VAR_HARDEN_BELOW_NXDOMAIN STRING_ARG",
|
|
|
|
|
"server_harden_referral_path : VAR_HARDEN_REFERRAL_PATH STRING_ARG",
|
|
|
|
|
"server_harden_algo_downgrade : VAR_HARDEN_ALGO_DOWNGRADE STRING_ARG",
|
|
|
|
|
"server_use_caps_for_id : VAR_USE_CAPS_FOR_ID STRING_ARG",
|
|
|
|
|
"server_caps_whitelist : VAR_CAPS_WHITELIST STRING_ARG",
|
|
|
|
|
"server_private_address : VAR_PRIVATE_ADDRESS STRING_ARG",
|
|
|
|
|
"server_private_domain : VAR_PRIVATE_DOMAIN STRING_ARG",
|
|
|
|
|
"server_prefetch : VAR_PREFETCH STRING_ARG",
|
|
|
|
|
"server_prefetch_key : VAR_PREFETCH_KEY STRING_ARG",
|
|
|
|
|
"server_deny_any : VAR_DENY_ANY STRING_ARG",
|
|
|
|
|
"server_unwanted_reply_threshold : VAR_UNWANTED_REPLY_THRESHOLD STRING_ARG",
|
|
|
|
|
"server_do_not_query_address : VAR_DO_NOT_QUERY_ADDRESS STRING_ARG",
|
|
|
|
|
"server_do_not_query_localhost : VAR_DO_NOT_QUERY_LOCALHOST STRING_ARG",
|
|
|
|
|
"server_access_control : VAR_ACCESS_CONTROL STRING_ARG STRING_ARG",
|
|
|
|
|
"server_module_conf : VAR_MODULE_CONF STRING_ARG",
|
|
|
|
|
"server_val_override_date : VAR_VAL_OVERRIDE_DATE STRING_ARG",
|
|
|
|
|
"server_val_sig_skew_min : VAR_VAL_SIG_SKEW_MIN STRING_ARG",
|
|
|
|
|
"server_val_sig_skew_max : VAR_VAL_SIG_SKEW_MAX STRING_ARG",
|
|
|
|
|
"server_cache_max_ttl : VAR_CACHE_MAX_TTL STRING_ARG",
|
|
|
|
|
"server_cache_max_negative_ttl : VAR_CACHE_MAX_NEGATIVE_TTL STRING_ARG",
|
|
|
|
|
"server_cache_min_ttl : VAR_CACHE_MIN_TTL STRING_ARG",
|
|
|
|
|
"server_bogus_ttl : VAR_BOGUS_TTL STRING_ARG",
|
|
|
|
|
"server_val_clean_additional : VAR_VAL_CLEAN_ADDITIONAL STRING_ARG",
|
|
|
|
|
"server_val_permissive_mode : VAR_VAL_PERMISSIVE_MODE STRING_ARG",
|
|
|
|
|
"server_aggressive_nsec : VAR_AGGRESSIVE_NSEC STRING_ARG",
|
|
|
|
|
"server_ignore_cd_flag : VAR_IGNORE_CD_FLAG STRING_ARG",
|
|
|
|
|
"server_serve_expired : VAR_SERVE_EXPIRED STRING_ARG",
|
|
|
|
|
"server_serve_expired_ttl : VAR_SERVE_EXPIRED_TTL STRING_ARG",
|
|
|
|
|
"server_serve_expired_ttl_reset : VAR_SERVE_EXPIRED_TTL_RESET STRING_ARG",
|
|
|
|
|
"server_serve_expired_reply_ttl : VAR_SERVE_EXPIRED_REPLY_TTL STRING_ARG",
|
|
|
|
|
"server_serve_expired_client_timeout : VAR_SERVE_EXPIRED_CLIENT_TIMEOUT STRING_ARG",
|
|
|
|
|
"server_fake_dsa : VAR_FAKE_DSA STRING_ARG",
|
|
|
|
|
"server_fake_sha1 : VAR_FAKE_SHA1 STRING_ARG",
|
|
|
|
|
"server_val_log_level : VAR_VAL_LOG_LEVEL STRING_ARG",
|
|
|
|
|
"server_val_nsec3_keysize_iterations : VAR_VAL_NSEC3_KEYSIZE_ITERATIONS STRING_ARG",
|
|
|
|
|
"server_add_holddown : VAR_ADD_HOLDDOWN STRING_ARG",
|
|
|
|
|
"server_del_holddown : VAR_DEL_HOLDDOWN STRING_ARG",
|
|
|
|
|
"server_keep_missing : VAR_KEEP_MISSING STRING_ARG",
|
|
|
|
|
"server_permit_small_holddown : VAR_PERMIT_SMALL_HOLDDOWN STRING_ARG",
|
|
|
|
|
"server_key_cache_size : VAR_KEY_CACHE_SIZE STRING_ARG",
|
|
|
|
|
"server_key_cache_slabs : VAR_KEY_CACHE_SLABS STRING_ARG",
|
|
|
|
|
"server_neg_cache_size : VAR_NEG_CACHE_SIZE STRING_ARG",
|
|
|
|
|
"server_local_zone : VAR_LOCAL_ZONE STRING_ARG STRING_ARG",
|
|
|
|
|
"server_local_data : VAR_LOCAL_DATA STRING_ARG",
|
|
|
|
|
"server_local_data_ptr : VAR_LOCAL_DATA_PTR STRING_ARG",
|
|
|
|
|
"server_minimal_responses : VAR_MINIMAL_RESPONSES STRING_ARG",
|
|
|
|
|
"server_rrset_roundrobin : VAR_RRSET_ROUNDROBIN STRING_ARG",
|
|
|
|
|
"server_unknown_server_time_limit : VAR_UNKNOWN_SERVER_TIME_LIMIT STRING_ARG",
|
|
|
|
|
"server_max_udp_size : VAR_MAX_UDP_SIZE STRING_ARG",
|
|
|
|
|
"server_dns64_prefix : VAR_DNS64_PREFIX STRING_ARG",
|
|
|
|
|
"server_dns64_synthall : VAR_DNS64_SYNTHALL STRING_ARG",
|
|
|
|
|
"server_dns64_ignore_aaaa : VAR_DNS64_IGNORE_AAAA STRING_ARG",
|
|
|
|
|
"server_define_tag : VAR_DEFINE_TAG STRING_ARG",
|
|
|
|
|
"server_local_zone_tag : VAR_LOCAL_ZONE_TAG STRING_ARG STRING_ARG",
|
|
|
|
|
"server_access_control_tag : VAR_ACCESS_CONTROL_TAG STRING_ARG STRING_ARG",
|
|
|
|
|
"server_access_control_tag_action : VAR_ACCESS_CONTROL_TAG_ACTION STRING_ARG STRING_ARG STRING_ARG",
|
|
|
|
|
"server_access_control_tag_data : VAR_ACCESS_CONTROL_TAG_DATA STRING_ARG STRING_ARG STRING_ARG",
|
|
|
|
|
"server_local_zone_override : VAR_LOCAL_ZONE_OVERRIDE STRING_ARG STRING_ARG STRING_ARG",
|
|
|
|
|
"server_access_control_view : VAR_ACCESS_CONTROL_VIEW STRING_ARG STRING_ARG",
|
|
|
|
|
"server_response_ip_tag : VAR_RESPONSE_IP_TAG STRING_ARG STRING_ARG",
|
|
|
|
|
"server_ip_ratelimit : VAR_IP_RATELIMIT STRING_ARG",
|
|
|
|
|
"server_ratelimit : VAR_RATELIMIT STRING_ARG",
|
|
|
|
|
"server_ip_ratelimit_size : VAR_IP_RATELIMIT_SIZE STRING_ARG",
|
|
|
|
|
"server_ratelimit_size : VAR_RATELIMIT_SIZE STRING_ARG",
|
|
|
|
|
"server_ip_ratelimit_slabs : VAR_IP_RATELIMIT_SLABS STRING_ARG",
|
|
|
|
|
"server_ratelimit_slabs : VAR_RATELIMIT_SLABS STRING_ARG",
|
|
|
|
|
"server_ratelimit_for_domain : VAR_RATELIMIT_FOR_DOMAIN STRING_ARG STRING_ARG",
|
|
|
|
|
"server_ratelimit_below_domain : VAR_RATELIMIT_BELOW_DOMAIN STRING_ARG STRING_ARG",
|
|
|
|
|
"server_ip_ratelimit_factor : VAR_IP_RATELIMIT_FACTOR STRING_ARG",
|
|
|
|
|
"server_ratelimit_factor : VAR_RATELIMIT_FACTOR STRING_ARG",
|
|
|
|
|
"server_low_rtt : VAR_LOW_RTT STRING_ARG",
|
|
|
|
|
"server_fast_server_num : VAR_FAST_SERVER_NUM STRING_ARG",
|
|
|
|
|
"server_fast_server_permil : VAR_FAST_SERVER_PERMIL STRING_ARG",
|
|
|
|
|
"server_qname_minimisation : VAR_QNAME_MINIMISATION STRING_ARG",
|
|
|
|
|
"server_qname_minimisation_strict : VAR_QNAME_MINIMISATION_STRICT STRING_ARG",
|
|
|
|
|
"server_pad_responses : VAR_PAD_RESPONSES STRING_ARG",
|
|
|
|
|
"server_pad_responses_block_size : VAR_PAD_RESPONSES_BLOCK_SIZE STRING_ARG",
|
|
|
|
|
"server_pad_queries : VAR_PAD_QUERIES STRING_ARG",
|
|
|
|
|
"server_pad_queries_block_size : VAR_PAD_QUERIES_BLOCK_SIZE STRING_ARG",
|
|
|
|
|
"server_ipsecmod_enabled : VAR_IPSECMOD_ENABLED STRING_ARG",
|
|
|
|
|
"server_ipsecmod_ignore_bogus : VAR_IPSECMOD_IGNORE_BOGUS STRING_ARG",
|
|
|
|
|
"server_ipsecmod_hook : VAR_IPSECMOD_HOOK STRING_ARG",
|
|
|
|
|
"server_ipsecmod_max_ttl : VAR_IPSECMOD_MAX_TTL STRING_ARG",
|
|
|
|
|
"server_ipsecmod_whitelist : VAR_IPSECMOD_WHITELIST STRING_ARG",
|
|
|
|
|
"server_ipsecmod_strict : VAR_IPSECMOD_STRICT STRING_ARG",
|
|
|
|
|
"stub_name : VAR_NAME STRING_ARG",
|
|
|
|
|
"stub_host : VAR_STUB_HOST STRING_ARG",
|
|
|
|
|
"stub_addr : VAR_STUB_ADDR STRING_ARG",
|
|
|
|
|
"stub_first : VAR_STUB_FIRST STRING_ARG",
|
|
|
|
|
"stub_no_cache : VAR_STUB_NO_CACHE STRING_ARG",
|
|
|
|
|
"stub_ssl_upstream : VAR_STUB_SSL_UPSTREAM STRING_ARG",
|
|
|
|
|
"stub_prime : VAR_STUB_PRIME STRING_ARG",
|
|
|
|
|
"forward_name : VAR_NAME STRING_ARG",
|
|
|
|
|
"forward_host : VAR_FORWARD_HOST STRING_ARG",
|
|
|
|
|
"forward_addr : VAR_FORWARD_ADDR STRING_ARG",
|
|
|
|
|
"forward_first : VAR_FORWARD_FIRST STRING_ARG",
|
|
|
|
|
"forward_no_cache : VAR_FORWARD_NO_CACHE STRING_ARG",
|
|
|
|
|
"forward_ssl_upstream : VAR_FORWARD_SSL_UPSTREAM STRING_ARG",
|
|
|
|
|
"auth_name : VAR_NAME STRING_ARG",
|
|
|
|
|
"auth_zonefile : VAR_ZONEFILE STRING_ARG",
|
|
|
|
|
"auth_master : VAR_MASTER STRING_ARG",
|
|
|
|
|
"auth_url : VAR_URL STRING_ARG",
|
|
|
|
|
"auth_allow_notify : VAR_ALLOW_NOTIFY STRING_ARG",
|
|
|
|
|
"auth_for_downstream : VAR_FOR_DOWNSTREAM STRING_ARG",
|
|
|
|
|
"auth_for_upstream : VAR_FOR_UPSTREAM STRING_ARG",
|
|
|
|
|
"auth_fallback_enabled : VAR_FALLBACK_ENABLED STRING_ARG",
|
|
|
|
|
"view_name : VAR_NAME STRING_ARG",
|
|
|
|
|
"view_local_zone : VAR_LOCAL_ZONE STRING_ARG STRING_ARG",
|
|
|
|
|
"view_response_ip : VAR_RESPONSE_IP STRING_ARG STRING_ARG",
|
|
|
|
|
"view_response_ip_data : VAR_RESPONSE_IP_DATA STRING_ARG STRING_ARG",
|
|
|
|
|
"view_local_data : VAR_LOCAL_DATA STRING_ARG",
|
|
|
|
|
"view_local_data_ptr : VAR_LOCAL_DATA_PTR STRING_ARG",
|
|
|
|
|
"view_first : VAR_VIEW_FIRST STRING_ARG",
|
|
|
|
|
"rcstart : VAR_REMOTE_CONTROL",
|
|
|
|
|
"contents_rc : contents_rc content_rc",
|
|
|
|
|
"contents_rc :",
|
|
|
|
|
"content_rc : rc_control_enable",
|
|
|
|
|
"content_rc : rc_control_interface",
|
|
|
|
|
"content_rc : rc_control_port",
|
|
|
|
|
"content_rc : rc_server_key_file",
|
|
|
|
|
"content_rc : rc_server_cert_file",
|
|
|
|
|
"content_rc : rc_control_key_file",
|
|
|
|
|
"content_rc : rc_control_cert_file",
|
|
|
|
|
"content_rc : rc_control_use_cert",
|
|
|
|
|
"rc_control_enable : VAR_CONTROL_ENABLE STRING_ARG",
|
|
|
|
|
"rc_control_port : VAR_CONTROL_PORT STRING_ARG",
|
|
|
|
|
"rc_control_interface : VAR_CONTROL_INTERFACE STRING_ARG",
|
|
|
|
|
"rc_control_use_cert : VAR_CONTROL_USE_CERT STRING_ARG",
|
|
|
|
|
"rc_server_key_file : VAR_SERVER_KEY_FILE STRING_ARG",
|
|
|
|
|
"rc_server_cert_file : VAR_SERVER_CERT_FILE STRING_ARG",
|
|
|
|
|
"rc_control_key_file : VAR_CONTROL_KEY_FILE STRING_ARG",
|
|
|
|
|
"rc_control_cert_file : VAR_CONTROL_CERT_FILE STRING_ARG",
|
|
|
|
|
"dtstart : VAR_DNSTAP",
|
|
|
|
|
"contents_dt : contents_dt content_dt",
|
|
|
|
|
"contents_dt :",
|
|
|
|
|
"content_dt : dt_dnstap_enable",
|
|
|
|
|
"content_dt : dt_dnstap_socket_path",
|
|
|
|
|
"content_dt : dt_dnstap_ip",
|
|
|
|
|
"content_dt : dt_dnstap_tls",
|
|
|
|
|
"content_dt : dt_dnstap_tls_server_name",
|
|
|
|
|
"content_dt : dt_dnstap_tls_cert_bundle",
|
|
|
|
|
"content_dt : dt_dnstap_tls_client_key_file",
|
|
|
|
|
"content_dt : dt_dnstap_tls_client_cert_file",
|
|
|
|
|
"content_dt : dt_dnstap_send_identity",
|
|
|
|
|
"content_dt : dt_dnstap_send_version",
|
|
|
|
|
"content_dt : dt_dnstap_identity",
|
|
|
|
|
"content_dt : dt_dnstap_version",
|
|
|
|
|
"content_dt : dt_dnstap_log_resolver_query_messages",
|
|
|
|
|
"content_dt : dt_dnstap_log_resolver_response_messages",
|
|
|
|
|
"content_dt : dt_dnstap_log_client_query_messages",
|
|
|
|
|
"content_dt : dt_dnstap_log_client_response_messages",
|
|
|
|
|
"content_dt : dt_dnstap_log_forwarder_query_messages",
|
|
|
|
|
"content_dt : dt_dnstap_log_forwarder_response_messages",
|
|
|
|
|
"dt_dnstap_enable : VAR_DNSTAP_ENABLE STRING_ARG",
|
|
|
|
|
"dt_dnstap_socket_path : VAR_DNSTAP_SOCKET_PATH STRING_ARG",
|
|
|
|
|
"dt_dnstap_ip : VAR_DNSTAP_IP STRING_ARG",
|
|
|
|
|
"dt_dnstap_tls : VAR_DNSTAP_TLS STRING_ARG",
|
|
|
|
|
"dt_dnstap_tls_server_name : VAR_DNSTAP_TLS_SERVER_NAME STRING_ARG",
|
|
|
|
|
"dt_dnstap_tls_cert_bundle : VAR_DNSTAP_TLS_CERT_BUNDLE STRING_ARG",
|
|
|
|
|
"dt_dnstap_tls_client_key_file : VAR_DNSTAP_TLS_CLIENT_KEY_FILE STRING_ARG",
|
|
|
|
|
"dt_dnstap_tls_client_cert_file : VAR_DNSTAP_TLS_CLIENT_CERT_FILE STRING_ARG",
|
|
|
|
|
"dt_dnstap_send_identity : VAR_DNSTAP_SEND_IDENTITY STRING_ARG",
|
|
|
|
|
"dt_dnstap_send_version : VAR_DNSTAP_SEND_VERSION STRING_ARG",
|
|
|
|
|
"dt_dnstap_identity : VAR_DNSTAP_IDENTITY STRING_ARG",
|
|
|
|
|
"dt_dnstap_version : VAR_DNSTAP_VERSION STRING_ARG",
|
|
|
|
|
"dt_dnstap_log_resolver_query_messages : VAR_DNSTAP_LOG_RESOLVER_QUERY_MESSAGES STRING_ARG",
|
|
|
|
|
"dt_dnstap_log_resolver_response_messages : VAR_DNSTAP_LOG_RESOLVER_RESPONSE_MESSAGES STRING_ARG",
|
|
|
|
|
"dt_dnstap_log_client_query_messages : VAR_DNSTAP_LOG_CLIENT_QUERY_MESSAGES STRING_ARG",
|
|
|
|
|
"dt_dnstap_log_client_response_messages : VAR_DNSTAP_LOG_CLIENT_RESPONSE_MESSAGES STRING_ARG",
|
|
|
|
|
"dt_dnstap_log_forwarder_query_messages : VAR_DNSTAP_LOG_FORWARDER_QUERY_MESSAGES STRING_ARG",
|
|
|
|
|
"dt_dnstap_log_forwarder_response_messages : VAR_DNSTAP_LOG_FORWARDER_RESPONSE_MESSAGES STRING_ARG",
|
|
|
|
|
"pythonstart : VAR_PYTHON",
|
|
|
|
|
"contents_py : contents_py content_py",
|
|
|
|
|
"contents_py :",
|
|
|
|
|
"content_py : py_script",
|
|
|
|
|
"py_script : VAR_PYTHON_SCRIPT STRING_ARG",
|
|
|
|
|
"server_disable_dnssec_lame_check : VAR_DISABLE_DNSSEC_LAME_CHECK STRING_ARG",
|
|
|
|
|
"server_log_identity : VAR_LOG_IDENTITY STRING_ARG",
|
|
|
|
|
"server_response_ip : VAR_RESPONSE_IP STRING_ARG STRING_ARG",
|
|
|
|
|
"server_response_ip_data : VAR_RESPONSE_IP_DATA STRING_ARG STRING_ARG",
|
|
|
|
|
"dnscstart : VAR_DNSCRYPT",
|
|
|
|
|
"contents_dnsc : contents_dnsc content_dnsc",
|
|
|
|
|
"contents_dnsc :",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_enable",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_port",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_provider",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_secret_key",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_provider_cert",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_provider_cert_rotated",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_shared_secret_cache_size",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_shared_secret_cache_slabs",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_nonce_cache_size",
|
|
|
|
|
"content_dnsc : dnsc_dnscrypt_nonce_cache_slabs",
|
|
|
|
|
"dnsc_dnscrypt_enable : VAR_DNSCRYPT_ENABLE STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_port : VAR_DNSCRYPT_PORT STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_provider : VAR_DNSCRYPT_PROVIDER STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_provider_cert : VAR_DNSCRYPT_PROVIDER_CERT STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_provider_cert_rotated : VAR_DNSCRYPT_PROVIDER_CERT_ROTATED STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_secret_key : VAR_DNSCRYPT_SECRET_KEY STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_shared_secret_cache_size : VAR_DNSCRYPT_SHARED_SECRET_CACHE_SIZE STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_shared_secret_cache_slabs : VAR_DNSCRYPT_SHARED_SECRET_CACHE_SLABS STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_nonce_cache_size : VAR_DNSCRYPT_NONCE_CACHE_SIZE STRING_ARG",
|
|
|
|
|
"dnsc_dnscrypt_nonce_cache_slabs : VAR_DNSCRYPT_NONCE_CACHE_SLABS STRING_ARG",
|
|
|
|
|
"cachedbstart : VAR_CACHEDB",
|
|
|
|
|
"contents_cachedb : contents_cachedb content_cachedb",
|
|
|
|
|
"contents_cachedb :",
|
|
|
|
|
"content_cachedb : cachedb_backend_name",
|
|
|
|
|
"content_cachedb : cachedb_secret_seed",
|
|
|
|
|
"content_cachedb : redis_server_host",
|
|
|
|
|
"content_cachedb : redis_server_port",
|
|
|
|
|
"content_cachedb : redis_timeout",
|
2020-04-02 12:54:18 -04:00
|
|
|
"content_cachedb : redis_expire_records",
|
2020-04-02 12:34:03 -04:00
|
|
|
"cachedb_backend_name : VAR_CACHEDB_BACKEND STRING_ARG",
|
|
|
|
|
"cachedb_secret_seed : VAR_CACHEDB_SECRETSEED STRING_ARG",
|
|
|
|
|
"redis_server_host : VAR_CACHEDB_REDISHOST STRING_ARG",
|
|
|
|
|
"redis_server_port : VAR_CACHEDB_REDISPORT STRING_ARG",
|
|
|
|
|
"redis_timeout : VAR_CACHEDB_REDISTIMEOUT STRING_ARG",
|
2020-04-02 12:54:18 -04:00
|
|
|
"redis_expire_records : VAR_CACHEDB_REDISEXPIRERECORDS STRING_ARG",
|
2020-04-02 12:34:03 -04:00
|
|
|
"server_tcp_connection_limit : VAR_TCP_CONNECTION_LIMIT STRING_ARG STRING_ARG",
|
|
|
|
|
"ipsetstart : VAR_IPSET",
|
|
|
|
|
"contents_ipset : contents_ipset content_ipset",
|
|
|
|
|
"contents_ipset :",
|
|
|
|
|
"content_ipset : ipset_name_v4",
|
|
|
|
|
"content_ipset : ipset_name_v6",
|
|
|
|
|
"ipset_name_v4 : VAR_IPSET_NAME_V4 STRING_ARG",
|
|
|
|
|
"ipset_name_v6 : VAR_IPSET_NAME_V6 STRING_ARG",
|
2020-03-24 04:25:05 -04:00
|
|
|
|
|
|
|
|
};
|
2020-04-02 12:34:03 -04:00
|
|
|
#endif
|
2020-03-04 14:02:16 -05:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
int yydebug;
|
|
|
|
|
int yynerrs;
|
2016-01-14 03:28:46 -05:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
int yyerrflag;
|
|
|
|
|
int yychar;
|
|
|
|
|
YYSTYPE yyval;
|
|
|
|
|
YYSTYPE yylval;
|
2020-03-24 04:25:05 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
/* define the initial stack-sizes */
|
|
|
|
|
#ifdef YYSTACKSIZE
|
|
|
|
|
#undef YYMAXDEPTH
|
|
|
|
|
#define YYMAXDEPTH YYSTACKSIZE
|
|
|
|
|
#else
|
|
|
|
|
#ifdef YYMAXDEPTH
|
|
|
|
|
#define YYSTACKSIZE YYMAXDEPTH
|
|
|
|
|
#else
|
|
|
|
|
#define YYSTACKSIZE 10000
|
|
|
|
|
#define YYMAXDEPTH 10000
|
|
|
|
|
#endif
|
2020-03-04 14:02:16 -05:00
|
|
|
#endif
|
2020-03-24 04:25:05 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#define YYINITSTACKSIZE 200
|
2020-03-24 04:25:05 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
typedef struct {
|
|
|
|
|
unsigned stacksize;
|
|
|
|
|
YYINT *s_base;
|
|
|
|
|
YYINT *s_mark;
|
|
|
|
|
YYINT *s_last;
|
|
|
|
|
YYSTYPE *l_base;
|
|
|
|
|
YYSTYPE *l_mark;
|
|
|
|
|
} YYSTACKDATA;
|
|
|
|
|
/* variables for the parser stack */
|
|
|
|
|
static YYSTACKDATA yystack;
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3252 "./util/configparser.y"
|
2020-03-24 04:25:05 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
/* parse helper routines could be here */
|
2020-03-24 04:25:05 -04:00
|
|
|
static void
|
2020-04-02 12:34:03 -04:00
|
|
|
validate_respip_action(const char* action)
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
if(strcmp(action, "deny")!=0 &&
|
|
|
|
|
strcmp(action, "redirect")!=0 &&
|
|
|
|
|
strcmp(action, "inform")!=0 &&
|
|
|
|
|
strcmp(action, "inform_deny")!=0 &&
|
|
|
|
|
strcmp(action, "always_transparent")!=0 &&
|
|
|
|
|
strcmp(action, "always_refuse")!=0 &&
|
|
|
|
|
strcmp(action, "always_nxdomain")!=0)
|
|
|
|
|
{
|
|
|
|
|
yyerror("response-ip action: expected deny, redirect, "
|
|
|
|
|
"inform, inform_deny, always_transparent, "
|
|
|
|
|
"always_refuse or always_nxdomain");
|
|
|
|
|
}
|
2009-03-13 05:27:37 -04:00
|
|
|
}
|
|
|
|
|
|
2008-02-29 05:59:26 -05:00
|
|
|
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1818 "util/configparser.c"
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#if YYDEBUG
|
|
|
|
|
#include <stdio.h> /* needed for printf */
|
|
|
|
|
#endif
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#include <stdlib.h> /* needed for malloc, etc */
|
|
|
|
|
#include <string.h> /* needed for memset */
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
/* allocate initial stack or double stack size, up to YYMAXDEPTH */
|
|
|
|
|
static int yygrowstack(YYSTACKDATA *data)
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
int i;
|
|
|
|
|
unsigned newsize;
|
|
|
|
|
YYINT *newss;
|
|
|
|
|
YYSTYPE *newvs;
|
|
|
|
|
|
|
|
|
|
if ((newsize = data->stacksize) == 0)
|
|
|
|
|
newsize = YYINITSTACKSIZE;
|
|
|
|
|
else if (newsize >= YYMAXDEPTH)
|
|
|
|
|
return YYENOMEM;
|
|
|
|
|
else if ((newsize *= 2) > YYMAXDEPTH)
|
|
|
|
|
newsize = YYMAXDEPTH;
|
|
|
|
|
|
|
|
|
|
i = (int) (data->s_mark - data->s_base);
|
|
|
|
|
newss = (YYINT *)realloc(data->s_base, newsize * sizeof(*newss));
|
|
|
|
|
if (newss == 0)
|
|
|
|
|
return YYENOMEM;
|
|
|
|
|
|
|
|
|
|
data->s_base = newss;
|
|
|
|
|
data->s_mark = newss + i;
|
|
|
|
|
|
|
|
|
|
newvs = (YYSTYPE *)realloc(data->l_base, newsize * sizeof(*newvs));
|
|
|
|
|
if (newvs == 0)
|
|
|
|
|
return YYENOMEM;
|
|
|
|
|
|
|
|
|
|
data->l_base = newvs;
|
|
|
|
|
data->l_mark = newvs + i;
|
|
|
|
|
|
|
|
|
|
data->stacksize = newsize;
|
|
|
|
|
data->s_last = data->s_base + newsize - 1;
|
|
|
|
|
return 0;
|
2009-03-13 05:27:37 -04:00
|
|
|
}
|
|
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#if YYPURE || defined(YY_NO_LEAKS)
|
|
|
|
|
static void yyfreestack(YYSTACKDATA *data)
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
free(data->s_base);
|
|
|
|
|
free(data->l_base);
|
|
|
|
|
memset(data, 0, sizeof(*data));
|
2009-03-13 05:27:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
#else
|
|
|
|
|
#define yyfreestack(data) /* nothing */
|
2009-03-13 05:27:37 -04:00
|
|
|
#endif
|
2007-10-18 18:49:08 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#define YYABORT goto yyabort
|
|
|
|
|
#define YYREJECT goto yyabort
|
|
|
|
|
#define YYACCEPT goto yyaccept
|
|
|
|
|
#define YYERROR goto yyerrlab
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
int
|
|
|
|
|
YYPARSE_DECL()
|
2007-10-18 18:49:08 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
int yym, yyn, yystate;
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
const char *yys;
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
if ((yys = getenv("YYDEBUG")) != 0)
|
2008-02-29 05:59:26 -05:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
yyn = *yys;
|
|
|
|
|
if (yyn >= '0' && yyn <= '9')
|
|
|
|
|
yydebug = yyn - '0';
|
2008-02-29 05:59:26 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
#endif
|
2007-10-18 18:49:08 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yynerrs = 0;
|
|
|
|
|
yyerrflag = 0;
|
|
|
|
|
yychar = YYEMPTY;
|
|
|
|
|
yystate = 0;
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
#if YYPURE
|
|
|
|
|
memset(&yystack, 0, sizeof(yystack));
|
|
|
|
|
#endif
|
2007-10-18 18:49:08 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
if (yystack.s_base == NULL && yygrowstack(&yystack) == YYENOMEM) goto yyoverflow;
|
|
|
|
|
yystack.s_mark = yystack.s_base;
|
|
|
|
|
yystack.l_mark = yystack.l_base;
|
|
|
|
|
yystate = 0;
|
|
|
|
|
*yystack.s_mark = 0;
|
2020-03-24 04:25:05 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yyloop:
|
|
|
|
|
if ((yyn = yydefred[yystate]) != 0) goto yyreduce;
|
|
|
|
|
if (yychar < 0)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
if ((yychar = YYLEX) < 0) yychar = YYEOF;
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
yys = yyname[YYTRANSLATE(yychar)];
|
|
|
|
|
printf("%sdebug: state %d, reading %d (%s)\n",
|
|
|
|
|
YYPREFIX, yystate, yychar, yys);
|
2020-03-24 04:25:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
#endif
|
2020-03-24 04:25:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
if ((yyn = yysindex[yystate]) && (yyn += yychar) >= 0 &&
|
|
|
|
|
yyn <= YYTABLESIZE && yycheck[yyn] == yychar)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
printf("%sdebug: state %d, shifting to state %d\n",
|
|
|
|
|
YYPREFIX, yystate, yytable[yyn]);
|
|
|
|
|
#endif
|
|
|
|
|
if (yystack.s_mark >= yystack.s_last && yygrowstack(&yystack) == YYENOMEM)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
goto yyoverflow;
|
2020-03-24 04:25:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
yystate = yytable[yyn];
|
|
|
|
|
*++yystack.s_mark = yytable[yyn];
|
|
|
|
|
*++yystack.l_mark = yylval;
|
|
|
|
|
yychar = YYEMPTY;
|
|
|
|
|
if (yyerrflag > 0) --yyerrflag;
|
|
|
|
|
goto yyloop;
|
|
|
|
|
}
|
|
|
|
|
if ((yyn = yyrindex[yystate]) && (yyn += yychar) >= 0 &&
|
|
|
|
|
yyn <= YYTABLESIZE && yycheck[yyn] == yychar)
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
yyn = yytable[yyn];
|
|
|
|
|
goto yyreduce;
|
2009-03-13 05:27:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
if (yyerrflag) goto yyinrecovery;
|
2009-06-19 03:47:46 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
YYERROR_CALL("syntax error");
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
goto yyerrlab;
|
2020-03-24 04:25:05 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yyerrlab:
|
|
|
|
|
++yynerrs;
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yyinrecovery:
|
|
|
|
|
if (yyerrflag < 3)
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
yyerrflag = 3;
|
|
|
|
|
for (;;)
|
|
|
|
|
{
|
|
|
|
|
if ((yyn = yysindex[*yystack.s_mark]) && (yyn += YYERRCODE) >= 0 &&
|
|
|
|
|
yyn <= YYTABLESIZE && yycheck[yyn] == YYERRCODE)
|
|
|
|
|
{
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
printf("%sdebug: state %d, error recovery shifting\
|
|
|
|
|
to state %d\n", YYPREFIX, *yystack.s_mark, yytable[yyn]);
|
|
|
|
|
#endif
|
|
|
|
|
if (yystack.s_mark >= yystack.s_last && yygrowstack(&yystack) == YYENOMEM)
|
|
|
|
|
{
|
|
|
|
|
goto yyoverflow;
|
|
|
|
|
}
|
|
|
|
|
yystate = yytable[yyn];
|
|
|
|
|
*++yystack.s_mark = yytable[yyn];
|
|
|
|
|
*++yystack.l_mark = yylval;
|
|
|
|
|
goto yyloop;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
printf("%sdebug: error recovery discarding state %d\n",
|
|
|
|
|
YYPREFIX, *yystack.s_mark);
|
|
|
|
|
#endif
|
|
|
|
|
if (yystack.s_mark <= yystack.s_base) goto yyabort;
|
|
|
|
|
--yystack.s_mark;
|
|
|
|
|
--yystack.l_mark;
|
|
|
|
|
}
|
|
|
|
|
}
|
2009-03-13 05:27:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
else
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
if (yychar == YYEOF) goto yyabort;
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
{
|
|
|
|
|
yys = yyname[YYTRANSLATE(yychar)];
|
|
|
|
|
printf("%sdebug: state %d, error recovery discards token %d (%s)\n",
|
|
|
|
|
YYPREFIX, yystate, yychar, yys);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
yychar = YYEMPTY;
|
|
|
|
|
goto yyloop;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
yyreduce:
|
2020-04-02 12:34:03 -04:00
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
printf("%sdebug: state %d, reducing by rule %d (%s)\n",
|
|
|
|
|
YYPREFIX, yystate, yyn, yyrule[yyn]);
|
|
|
|
|
#endif
|
|
|
|
|
yym = yylen[yyn];
|
|
|
|
|
if (yym)
|
|
|
|
|
yyval = yystack.l_mark[1-yym];
|
|
|
|
|
else
|
|
|
|
|
memset(&yyval, 0, sizeof yyval);
|
|
|
|
|
switch (yyn)
|
2009-03-13 05:27:37 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
case 15:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 192 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2007-10-18 18:49:08 -04:00
|
|
|
OUTYY(("\nP(server:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 211:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 285 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2007-10-18 18:49:08 -04:00
|
|
|
struct config_stub* s;
|
|
|
|
|
OUTYY(("\nP(stub_zone:)\n"));
|
|
|
|
|
s = (struct config_stub*)calloc(1, sizeof(struct config_stub));
|
|
|
|
|
if(s) {
|
|
|
|
|
s->next = cfg_parser->cfg->stubs;
|
|
|
|
|
cfg_parser->cfg->stubs = s;
|
|
|
|
|
} else
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 221:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 302 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2007-10-18 18:49:08 -04:00
|
|
|
struct config_stub* s;
|
|
|
|
|
OUTYY(("\nP(forward_zone:)\n"));
|
|
|
|
|
s = (struct config_stub*)calloc(1, sizeof(struct config_stub));
|
|
|
|
|
if(s) {
|
|
|
|
|
s->next = cfg_parser->cfg->forwards;
|
|
|
|
|
cfg_parser->cfg->forwards = s;
|
|
|
|
|
} else
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 230:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 319 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2016-10-05 05:36:25 -04:00
|
|
|
struct config_view* s;
|
|
|
|
|
OUTYY(("\nP(view:)\n"));
|
|
|
|
|
s = (struct config_view*)calloc(1, sizeof(struct config_view));
|
|
|
|
|
if(s) {
|
|
|
|
|
s->next = cfg_parser->cfg->views;
|
|
|
|
|
if(s->next && !s->next->name)
|
|
|
|
|
yyerror("view without name");
|
|
|
|
|
cfg_parser->cfg->views = s;
|
|
|
|
|
} else
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 240:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 338 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-10-17 11:16:31 -04:00
|
|
|
struct config_auth* s;
|
|
|
|
|
OUTYY(("\nP(auth_zone:)\n"));
|
|
|
|
|
s = (struct config_auth*)calloc(1, sizeof(struct config_auth));
|
|
|
|
|
if(s) {
|
|
|
|
|
s->next = cfg_parser->cfg->auths;
|
|
|
|
|
cfg_parser->cfg->auths = s;
|
|
|
|
|
/* defaults for auth zone */
|
|
|
|
|
s->for_downstream = 1;
|
|
|
|
|
s->for_upstream = 1;
|
2018-01-30 05:35:20 -05:00
|
|
|
s->fallback_enabled = 0;
|
2019-04-05 11:39:10 -04:00
|
|
|
s->isrpz = 0;
|
|
|
|
|
} else
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 251:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 362 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2019-04-10 05:53:08 -04:00
|
|
|
uint8_t* bitlist;
|
2019-12-23 10:02:43 -05:00
|
|
|
size_t len = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_local_zone_tag:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
bitlist = config_parse_taglist(cfg_parser->cfg, yystack.l_mark[0].str,
|
2019-04-05 11:39:10 -04:00
|
|
|
&len);
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-04-05 11:39:10 -04:00
|
|
|
if(!bitlist) {
|
|
|
|
|
yyerror("could not parse tags, (define-tag them first)");
|
|
|
|
|
}
|
|
|
|
|
if(bitlist) {
|
|
|
|
|
cfg_parser->cfg->auths->rpz_taglist = bitlist;
|
|
|
|
|
cfg_parser->cfg->auths->rpz_taglistlen = len;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 252:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 381 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rpz_action_override:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "nxdomain")!=0 && strcmp(yystack.l_mark[0].str, "nodata")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "passthru")!=0 && strcmp(yystack.l_mark[0].str, "drop")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "cname")!=0 && strcmp(yystack.l_mark[0].str, "disabled")!=0) {
|
2019-05-16 16:30:42 -04:00
|
|
|
yyerror("rpz-action-override action: expected nxdomain, "
|
2019-12-23 10:02:43 -05:00
|
|
|
"nodata, passthru, drop, cname or disabled");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-16 16:30:42 -04:00
|
|
|
cfg_parser->cfg->auths->rpz_action_override = NULL;
|
|
|
|
|
}
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->auths->rpz_action_override = yystack.l_mark[0].str;
|
2019-05-16 16:30:42 -04:00
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 253:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 398 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rpz_cname_override:%s)\n", yystack.l_mark[0].str));
|
2019-05-16 16:30:42 -04:00
|
|
|
free(cfg_parser->cfg->auths->rpz_cname);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->auths->rpz_cname = yystack.l_mark[0].str;
|
2019-05-16 16:30:42 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 254:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 406 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rpz_log:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2019-05-16 16:30:42 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->auths->rpz_log = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-16 16:30:42 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 255:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 416 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rpz_log_name:%s)\n", yystack.l_mark[0].str));
|
2019-06-03 09:46:39 -04:00
|
|
|
free(cfg_parser->cfg->auths->rpz_log_name);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->auths->rpz_log_name = yystack.l_mark[0].str;
|
2019-06-03 09:46:39 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 256:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 424 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2019-04-05 11:39:10 -04:00
|
|
|
struct config_auth* s;
|
|
|
|
|
OUTYY(("\nP(rpz:)\n"));
|
|
|
|
|
s = (struct config_auth*)calloc(1, sizeof(struct config_auth));
|
|
|
|
|
if(s) {
|
|
|
|
|
s->next = cfg_parser->cfg->auths;
|
|
|
|
|
cfg_parser->cfg->auths = s;
|
|
|
|
|
/* defaults for RPZ auth zone */
|
|
|
|
|
s->for_downstream = 0;
|
|
|
|
|
s->for_upstream = 0;
|
|
|
|
|
s->fallback_enabled = 0;
|
|
|
|
|
s->isrpz = 1;
|
2017-10-17 11:16:31 -04:00
|
|
|
} else
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 269:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 447 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_num_threads:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->num_threads = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 270:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 456 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_verbosity:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->verbosity = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 271:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 465 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_statistics_interval:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "") == 0 || strcmp(yystack.l_mark[0].str, "0") == 0)
|
2008-02-05 05:23:44 -05:00
|
|
|
cfg_parser->cfg->stat_interval = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if(atoi(yystack.l_mark[0].str) == 0)
|
2008-02-05 05:23:44 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->stat_interval = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-02-05 05:23:44 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 272:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 476 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_statistics_cumulative:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-04-09 08:29:53 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->stat_cumulative = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-04-09 08:29:53 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 273:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 485 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_extended_statistics:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-09-16 05:08:45 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->stat_extended = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-09-16 05:08:45 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 274:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 494 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_shm_enable:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-02-23 07:05:05 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->shm_enable = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 275:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 503 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_shm_key:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "") == 0 || strcmp(yystack.l_mark[0].str, "0") == 0)
|
2017-02-23 07:05:05 -05:00
|
|
|
cfg_parser->cfg->shm_key = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if(atoi(yystack.l_mark[0].str) == 0)
|
2017-02-23 07:05:05 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->shm_key = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-02-23 07:05:05 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 276:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 514 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_port:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("port number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->port = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 277:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 523 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-21 08:08:17 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_send_client_subnet:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet, yystack.l_mark[0].str))
|
2017-03-21 08:08:17 -04:00
|
|
|
fatal_exit("out of memory adding client-subnet");
|
|
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-21 08:08:17 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 278:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 535 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-06-08 10:44:55 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_client_subnet_zone:%s)\n", yystack.l_mark[0].str));
|
2017-06-08 10:44:55 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet_zone,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[0].str))
|
2017-06-08 10:44:55 -04:00
|
|
|
fatal_exit("out of memory adding client-subnet-zone");
|
|
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-06-08 10:44:55 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 279:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 549 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-04-06 09:13:06 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_client_subnet_always_forward:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-04-06 09:13:06 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else
|
|
|
|
|
cfg_parser->cfg->client_subnet_always_forward =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
2017-04-06 09:13:06 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-04-06 09:13:06 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 280:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 564 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-21 08:08:17 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(client_subnet_opcode:%s)\n", yystack.l_mark[0].str));
|
2017-09-15 10:29:28 -04:00
|
|
|
OUTYY(("P(Deprecated option, ignoring)\n"));
|
2017-03-21 08:08:17 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-21 08:08:17 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 281:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 575 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-21 08:08:17 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(max_client_subnet_ipv4:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2017-03-21 08:08:17 -04:00
|
|
|
yyerror("IPv4 subnet length expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 32)
|
2017-03-21 08:08:17 -04:00
|
|
|
cfg_parser->cfg->max_client_subnet_ipv4 = 32;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2017-03-21 08:08:17 -04:00
|
|
|
cfg_parser->cfg->max_client_subnet_ipv4 = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->max_client_subnet_ipv4 = (uint8_t)atoi(yystack.l_mark[0].str);
|
2017-03-21 08:08:17 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-21 08:08:17 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 282:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 592 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-21 08:08:17 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(max_client_subnet_ipv6:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2017-03-21 08:08:17 -04:00
|
|
|
yyerror("Ipv6 subnet length expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 128)
|
2017-03-21 08:08:17 -04:00
|
|
|
cfg_parser->cfg->max_client_subnet_ipv6 = 128;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2017-03-21 08:08:17 -04:00
|
|
|
cfg_parser->cfg->max_client_subnet_ipv6 = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->max_client_subnet_ipv6 = (uint8_t)atoi(yystack.l_mark[0].str);
|
2017-03-21 08:08:17 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-21 08:08:17 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 283:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 609 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-10-25 04:53:50 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(min_client_subnet_ipv4:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-10-25 04:53:50 -04:00
|
|
|
yyerror("IPv4 subnet length expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 32)
|
2018-10-25 04:53:50 -04:00
|
|
|
cfg_parser->cfg->min_client_subnet_ipv4 = 32;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2018-10-25 04:53:50 -04:00
|
|
|
cfg_parser->cfg->min_client_subnet_ipv4 = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->min_client_subnet_ipv4 = (uint8_t)atoi(yystack.l_mark[0].str);
|
2018-10-25 04:53:50 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-10-25 04:53:50 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 284:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 626 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-10-25 04:53:50 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(min_client_subnet_ipv6:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-10-25 04:53:50 -04:00
|
|
|
yyerror("Ipv6 subnet length expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 128)
|
2018-10-25 04:53:50 -04:00
|
|
|
cfg_parser->cfg->min_client_subnet_ipv6 = 128;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2018-10-25 04:53:50 -04:00
|
|
|
cfg_parser->cfg->min_client_subnet_ipv6 = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->min_client_subnet_ipv6 = (uint8_t)atoi(yystack.l_mark[0].str);
|
2018-10-25 04:53:50 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-10-25 04:53:50 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 285:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 643 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-10-22 10:54:28 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(max_ecs_tree_size_ipv4:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-10-22 10:54:28 -04:00
|
|
|
yyerror("IPv4 ECS tree size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2018-10-22 10:54:28 -04:00
|
|
|
cfg_parser->cfg->max_ecs_tree_size_ipv4 = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->max_ecs_tree_size_ipv4 = (uint32_t)atoi(yystack.l_mark[0].str);
|
2018-10-22 10:54:28 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-10-22 10:54:28 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 286:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 658 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-10-22 10:54:28 -04:00
|
|
|
#ifdef CLIENT_SUBNET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(max_ecs_tree_size_ipv6:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-10-22 10:54:28 -04:00
|
|
|
yyerror("IPv6 ECS tree size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2018-10-22 10:54:28 -04:00
|
|
|
cfg_parser->cfg->max_ecs_tree_size_ipv6 = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->max_ecs_tree_size_ipv6 = (uint32_t)atoi(yystack.l_mark[0].str);
|
2018-10-22 10:54:28 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without edns subnet option, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-10-22 10:54:28 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 287:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 673 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_interface:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
if(cfg_parser->cfg->num_ifs == 0)
|
|
|
|
|
cfg_parser->cfg->ifs = calloc(1, sizeof(char*));
|
|
|
|
|
else cfg_parser->cfg->ifs = realloc(cfg_parser->cfg->ifs,
|
|
|
|
|
(cfg_parser->cfg->num_ifs+1)*sizeof(char*));
|
|
|
|
|
if(!cfg_parser->cfg->ifs)
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
else
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ifs[cfg_parser->cfg->num_ifs++] = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 288:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 686 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_outgoing_interface:%s)\n", yystack.l_mark[0].str));
|
2007-10-19 04:32:36 -04:00
|
|
|
if(cfg_parser->cfg->num_out_ifs == 0)
|
|
|
|
|
cfg_parser->cfg->out_ifs = calloc(1, sizeof(char*));
|
|
|
|
|
else cfg_parser->cfg->out_ifs = realloc(
|
|
|
|
|
cfg_parser->cfg->out_ifs,
|
|
|
|
|
(cfg_parser->cfg->num_out_ifs+1)*sizeof(char*));
|
|
|
|
|
if(!cfg_parser->cfg->out_ifs)
|
|
|
|
|
yyerror("out of memory");
|
|
|
|
|
else
|
|
|
|
|
cfg_parser->cfg->out_ifs[
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->num_out_ifs++] = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 289:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 701 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_outgoing_range:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->outgoing_num_ports = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-04-09 11:07:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 290:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 710 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_outgoing_port_permit:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_mark_ports(yystack.l_mark[0].str, 1,
|
2008-04-09 11:07:37 -04:00
|
|
|
cfg_parser->cfg->outgoing_avail_ports, 65536))
|
|
|
|
|
yyerror("port number or range (\"low-high\") expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2008-04-09 11:07:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 291:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 719 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_outgoing_port_avoid:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_mark_ports(yystack.l_mark[0].str, 0,
|
2020-03-04 14:02:16 -05:00
|
|
|
cfg_parser->cfg->outgoing_avail_ports, 65536))
|
|
|
|
|
yyerror("port number or range (\"low-high\") expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 292:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 728 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_outgoing_num_tcp:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->outgoing_num_tcp = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 293:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 737 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_incoming_num_tcp:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->incoming_num_tcp = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-01-15 04:45:30 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 294:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 746 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_interface_automatic:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->if_automatic = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 295:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 755 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_ip4:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->do_ip4 = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 296:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 764 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_ip6:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->do_ip6 = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 297:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 773 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_udp:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->do_udp = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 298:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 782 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_tcp:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2020-02-25 03:55:59 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->do_tcp = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2020-02-25 03:55:59 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 299:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 791 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_prefer_ip4:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-07-04 10:49:49 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->prefer_ip4 = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-07-04 10:49:49 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 300:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 800 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_prefer_ip6:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->prefer_ip6 = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-01-05 05:03:59 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 301:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 809 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tcp_mss:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->tcp_mss = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-01-05 05:03:59 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 302:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 818 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_outgoing_tcp_mss:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->outgoing_tcp_mss = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2020-03-04 14:02:16 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 303:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 827 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tcp_idle_timeout:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-07-31 03:23:58 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 120000)
|
2018-07-31 03:23:58 -04:00
|
|
|
cfg_parser->cfg->tcp_idle_timeout = 120000;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 1)
|
2018-07-31 03:23:58 -04:00
|
|
|
cfg_parser->cfg->tcp_idle_timeout = 1;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->tcp_idle_timeout = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-07-31 03:23:58 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 304:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 840 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tcp_keepalive:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-07-31 03:23:58 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->do_tcp_keepalive = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-07-31 03:23:58 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 305:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 849 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tcp_keepalive_timeout:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-07-31 03:23:58 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 6553500)
|
2018-07-31 03:23:58 -04:00
|
|
|
cfg_parser->cfg->tcp_keepalive_timeout = 6553500;
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 1)
|
2018-07-31 03:23:58 -04:00
|
|
|
cfg_parser->cfg->tcp_keepalive_timeout = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->tcp_keepalive_timeout = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-07-31 03:23:58 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 306:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 862 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tcp_upstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2011-08-22 09:58:40 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->tcp_upstream = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2011-08-22 09:58:40 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 307:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 871 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_udp_upstream_without_downstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-09-18 04:42:24 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->udp_upstream_without_downstream = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-09-18 04:42:24 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 308:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 880 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ssl_upstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2011-10-31 10:48:48 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ssl_upstream = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2011-10-31 10:48:48 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 309:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 889 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ssl_service_key:%s)\n", yystack.l_mark[0].str));
|
2011-10-31 10:48:48 -04:00
|
|
|
free(cfg_parser->cfg->ssl_service_key);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ssl_service_key = yystack.l_mark[0].str;
|
2011-10-31 10:48:48 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 310:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 896 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ssl_service_pem:%s)\n", yystack.l_mark[0].str));
|
2011-10-31 10:48:48 -04:00
|
|
|
free(cfg_parser->cfg->ssl_service_pem);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ssl_service_pem = yystack.l_mark[0].str;
|
2011-10-31 10:48:48 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 311:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 903 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ssl_port:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2011-11-08 05:56:42 -05:00
|
|
|
yyerror("port number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ssl_port = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2011-11-08 05:56:42 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 312:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 912 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tls_cert_bundle:%s)\n", yystack.l_mark[0].str));
|
2018-02-13 05:35:09 -05:00
|
|
|
free(cfg_parser->cfg->tls_cert_bundle);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->tls_cert_bundle = yystack.l_mark[0].str;
|
2018-02-13 05:35:09 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 313:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 919 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tls_win_cert:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-05-28 10:15:06 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->tls_win_cert = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-05-28 10:15:06 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 314:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 928 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tls_additional_port:%s)\n", yystack.l_mark[0].str));
|
2018-06-12 04:45:57 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->tls_additional_port,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[0].str))
|
2018-03-15 10:23:51 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 315:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 936 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tls_ciphers:%s)\n", yystack.l_mark[0].str));
|
2019-01-23 03:46:33 -05:00
|
|
|
free(cfg_parser->cfg->tls_ciphers);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->tls_ciphers = yystack.l_mark[0].str;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 316:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 943 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tls_ciphersuites:%s)\n", yystack.l_mark[0].str));
|
2019-01-23 03:46:33 -05:00
|
|
|
free(cfg_parser->cfg->tls_ciphersuites);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->tls_ciphersuites = yystack.l_mark[0].str;
|
2019-01-23 03:46:33 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 317:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 950 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tls_session_ticket_keys:%s)\n", yystack.l_mark[0].str));
|
2019-01-23 05:41:03 -05:00
|
|
|
if(!cfg_strlist_append(&cfg_parser->cfg->tls_session_ticket_keys,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[0].str))
|
2019-01-23 04:35:52 -05:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 318:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 958 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_use_systemd:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-01-03 08:43:29 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->use_systemd = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-01-03 08:43:29 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 319:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 967 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_daemonize:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-02-20 02:26:03 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->do_daemonize = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-02-20 02:26:03 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 320:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 976 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_use_syslog:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->use_syslog = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
2009-03-11 07:53:47 -04:00
|
|
|
#if !defined(HAVE_SYSLOG_H) && !defined(UB_ON_WINDOWS)
|
2020-04-02 12:34:03 -04:00
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("no syslog services are available. "
|
|
|
|
|
"(reconfigure and compile to add)");
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 321:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 990 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_time_ascii:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2009-02-06 07:51:45 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->log_time_ascii = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-02-06 07:51:45 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 322:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 999 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_queries:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2011-06-16 09:15:57 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->log_queries = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2011-06-16 09:15:57 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 323:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1008 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_replies:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-01-05 06:39:54 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->log_replies = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-01-05 06:39:54 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 324:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1017 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_tag_queryreply:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-11-30 04:45:37 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->log_tag_queryreply = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-11-30 04:45:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 325:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1026 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_servfail:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-08-17 11:22:05 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->log_servfail = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-08-17 11:22:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 326:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1035 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_local_actions:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-08-21 03:10:49 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->log_local_actions = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-08-21 03:10:49 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 327:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1044 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_chroot:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->chrootdir);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->chrootdir = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 328:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1051 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_username:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->username);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->username = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 329:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1058 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_directory:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->directory);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->directory = yystack.l_mark[0].str;
|
2016-06-09 18:59:07 -04:00
|
|
|
/* change there right away for includes relative to this */
|
2020-04-02 12:34:03 -04:00
|
|
|
if(yystack.l_mark[0].str[0]) {
|
2016-06-10 09:37:14 -04:00
|
|
|
char* d;
|
|
|
|
|
#ifdef UB_ON_WINDOWS
|
|
|
|
|
w_config_adjust_directory(cfg_parser->cfg);
|
|
|
|
|
#endif
|
|
|
|
|
d = cfg_parser->cfg->directory;
|
2016-06-09 19:16:45 -04:00
|
|
|
/* adjust directory if we have already chroot,
|
|
|
|
|
* like, we reread after sighup */
|
|
|
|
|
if(cfg_parser->chroot && cfg_parser->chroot[0] &&
|
|
|
|
|
strncmp(d, cfg_parser->chroot, strlen(
|
|
|
|
|
cfg_parser->chroot)) == 0)
|
|
|
|
|
d += strlen(cfg_parser->chroot);
|
2017-01-03 08:46:00 -05:00
|
|
|
if(d[0]) {
|
|
|
|
|
if(chdir(d))
|
2016-06-09 18:59:07 -04:00
|
|
|
log_err("cannot chdir to directory: %s (%s)",
|
2016-06-09 19:16:45 -04:00
|
|
|
d, strerror(errno));
|
2017-01-03 08:46:00 -05:00
|
|
|
}
|
2016-06-09 18:59:07 -04:00
|
|
|
}
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 330:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1084 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_logfile:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->logfile);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->logfile = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
cfg_parser->cfg->use_syslog = 0;
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 331:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1092 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_pidfile:%s)\n", yystack.l_mark[0].str));
|
2020-03-04 14:02:16 -05:00
|
|
|
free(cfg_parser->cfg->pidfile);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->pidfile = yystack.l_mark[0].str;
|
2007-10-19 10:02:53 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 332:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1099 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_root_hints:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->root_hints, yystack.l_mark[0].str))
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("out of memory");
|
2008-08-13 10:30:35 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 333:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1106 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_dlv_anchor_file:%s)\n", yystack.l_mark[0].str));
|
2020-03-04 14:02:16 -05:00
|
|
|
free(cfg_parser->cfg->dlv_anchor_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dlv_anchor_file = yystack.l_mark[0].str;
|
2008-08-21 10:58:39 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 334:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1113 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_dlv_anchor:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->dlv_anchor_list, yystack.l_mark[0].str))
|
2009-08-12 11:26:47 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 335:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1120 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_auto_trust_anchor_file:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
auto_trust_anchor_file_list, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 336:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1128 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_trust_anchor_file:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
trust_anchor_file_list, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 337:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1136 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_trusted_keys_file:%s)\n", yystack.l_mark[0].str));
|
2020-03-04 14:02:16 -05:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
trusted_keys_file_list, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 338:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1144 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_trust_anchor:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->trust_anchor_list, yystack.l_mark[0].str))
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("out of memory");
|
2017-04-26 08:58:13 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 339:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1151 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_trust_anchor_signaling:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-04-24 05:03:49 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else
|
2020-03-04 14:02:16 -05:00
|
|
|
cfg_parser->cfg->trust_anchor_signaling =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-04-24 05:03:49 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 340:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1162 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_root_key_sentinel:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else
|
|
|
|
|
cfg_parser->cfg->root_key_sentinel =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-03-18 10:02:46 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 341:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1173 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_domain_insecure:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->domain_insecure, yystack.l_mark[0].str))
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("out of memory");
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 342:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1180 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_hide_identity:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->hide_identity = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 343:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1189 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_hide_version:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-03-16 05:17:58 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->hide_version = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-16 05:17:58 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 344:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1198 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_hide_trustanchor:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->hide_trustanchor = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 345:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1207 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_identity:%s)\n", yystack.l_mark[0].str));
|
2020-03-04 14:02:16 -05:00
|
|
|
free(cfg_parser->cfg->identity);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->identity = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 346:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1214 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_version:%s)\n", yystack.l_mark[0].str));
|
2020-03-04 14:02:16 -05:00
|
|
|
free(cfg_parser->cfg->version);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->version = yystack.l_mark[0].str;
|
2009-09-25 04:54:50 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 347:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1221 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_so_rcvbuf:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->so_rcvbuf))
|
2010-11-15 09:30:34 -05:00
|
|
|
yyerror("buffer size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2010-11-15 09:30:34 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 348:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1229 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_so_sndbuf:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->so_sndbuf))
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("buffer size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2020-03-04 14:02:16 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 349:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1237 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_so_reuseport:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-01-24 06:43:38 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->so_reuseport =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-01-24 06:43:38 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 350:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1247 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_transparent:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2015-03-19 05:50:35 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->ip_transparent =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-03-19 05:50:35 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 351:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1257 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_freebind:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-03-15 05:35:48 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->ip_freebind =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-03-15 05:35:48 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 352:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1267 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_dscp:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 63)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("value too large (max 63)");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 0)
|
2020-03-04 14:02:16 -05:00
|
|
|
yyerror("value too small (min 0)");
|
|
|
|
|
else
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ip_dscp = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2020-03-04 14:02:16 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 353:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1281 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_stream_wait_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->stream_wait_size))
|
2019-01-21 11:20:14 -05:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-01-21 11:20:14 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 354:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1289 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_edns_buffer_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2009-10-29 06:37:44 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 12)
|
2009-10-29 06:37:44 -04:00
|
|
|
yyerror("edns buffer size too small");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) > 65535)
|
2009-10-29 06:37:44 -04:00
|
|
|
cfg_parser->cfg->edns_buffer_size = 65535;
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->edns_buffer_size = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-10-29 06:37:44 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 355:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1302 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_msg_buffer_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else if (atoi(yystack.l_mark[0].str) < 4096)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("message buffer size too small (use 4096)");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->msg_buffer_size = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 356:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1313 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_msg_cache_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->msg_cache_size))
|
2008-01-11 08:20:22 -05:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 357:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1321 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_msg_cache_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->msg_cache_slabs = atoi(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->msg_cache_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 358:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1334 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_num_queries_per_thread:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->num_queries_per_thread = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 359:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1343 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_jostle_timeout:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2008-10-06 05:28:50 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->jostle_time = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-10-06 05:28:50 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 360:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1352 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_delay_close:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2014-01-28 09:35:55 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->delay_close = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-01-28 09:35:55 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 361:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1361 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_unblock_lan_zones:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-05-20 06:38:32 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->unblock_lan_zones =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-05-20 06:38:32 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 362:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1371 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_insecure_lan_zones:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-02-09 08:25:59 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->insecure_lan_zones =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-02-09 08:25:59 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 363:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1381 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_rrset_cache_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->rrset_cache_size))
|
2008-01-11 08:20:22 -05:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 364:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1389 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_rrset_cache_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->rrset_cache_slabs = atoi(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->rrset_cache_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 365:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1402 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_infra_host_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->host_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 366:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1411 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_infra_lame_ttl:%s)\n", yystack.l_mark[0].str));
|
2011-10-27 04:33:02 -04:00
|
|
|
verbose(VERB_DETAIL, "ignored infra-lame-ttl: %s (option "
|
2020-04-02 12:34:03 -04:00
|
|
|
"removed, use infra-host-ttl)", yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 367:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1419 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_infra_cache_numhosts:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->infra_cache_numhosts = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 368:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1428 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_infra_cache_lame_size:%s)\n", yystack.l_mark[0].str));
|
2011-10-27 04:33:02 -04:00
|
|
|
verbose(VERB_DETAIL, "ignored infra-cache-lame-size: %s "
|
2020-04-02 12:34:03 -04:00
|
|
|
"(option removed, use infra-cache-numhosts)", yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 369:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1436 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_infra_cache_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->infra_cache_slabs = atoi(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->infra_cache_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 370:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1449 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_infra_cache_min_rtt:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2015-02-02 03:46:22 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->infra_cache_min_rtt = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-02-02 03:46:22 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 371:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1458 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_target_fetch_policy:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->target_fetch_policy);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->target_fetch_policy = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 372:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1465 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_short_bufsize:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_short_bufsize =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 373:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1475 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_large_queries:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_large_queries =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 374:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1485 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_glue:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_glue =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 375:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1495 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_dnssec_stripped:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-11-01 11:32:27 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_dnssec_stripped =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-11-01 11:32:27 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 376:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1505 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_below_nxdomain:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2010-11-18 03:49:15 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_below_nxdomain =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2010-11-18 03:49:15 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 377:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1515 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_referral_path:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-08-29 10:46:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_referral_path =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-08-29 10:46:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 378:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1525 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_harden_algo_downgrade:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2015-03-09 09:30:37 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->harden_algo_downgrade =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-03-09 09:30:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 379:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1535 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_use_caps_for_id:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-02-27 04:39:27 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->use_caps_bits_for_id =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-02-27 04:39:27 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 380:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1545 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_caps_whitelist:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->caps_whitelist, yystack.l_mark[0].str))
|
2015-05-01 08:36:16 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 381:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1552 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_private_address:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->private_address, yystack.l_mark[0].str))
|
2008-09-03 10:40:09 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 382:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1559 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_private_domain:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->private_domain, yystack.l_mark[0].str))
|
2008-09-03 10:40:09 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 383:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1566 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_prefetch:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2010-01-07 09:38:18 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->prefetch = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2010-01-07 09:38:18 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 384:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1575 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_prefetch_key:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2010-01-13 08:33:18 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->prefetch_key = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2010-01-13 08:33:18 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 385:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1584 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_deny_any:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-10-25 04:07:37 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->deny_any = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-10-25 04:07:37 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 386:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1593 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_unwanted_reply_threshold:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2008-10-22 10:36:46 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->unwanted_threshold = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-10-22 10:36:46 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 387:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1602 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_not_query_address:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->donotqueryaddrs, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 388:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1609 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_do_not_query_localhost:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-22 02:25:46 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->donotquery_localhost =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-22 02:25:46 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 389:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1619 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_access_control:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "deny")!=0 && strcmp(yystack.l_mark[0].str, "refuse")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "deny_non_local")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "refuse_non_local")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "allow_setrd")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "allow")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "allow_snoop")!=0) {
|
2013-11-12 05:08:54 -05:00
|
|
|
yyerror("expected deny, refuse, deny_non_local, "
|
2018-05-30 05:33:21 -04:00
|
|
|
"refuse_non_local, allow, allow_setrd or "
|
|
|
|
|
"allow_snoop in access control action");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-11-19 10:32:55 -05:00
|
|
|
} else {
|
2020-04-02 12:34:03 -04:00
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->acls, yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2007-11-20 09:48:33 -05:00
|
|
|
fatal_exit("out of memory adding acl");
|
2007-11-19 10:32:55 -05:00
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 390:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1639 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_module_conf:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->module_conf);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->module_conf = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 391:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1646 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_override_date:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(*yystack.l_mark[0].str == '\0' || strcmp(yystack.l_mark[0].str, "0") == 0) {
|
2007-10-18 18:49:08 -04:00
|
|
|
cfg_parser->cfg->val_date_override = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
} else if(strlen(yystack.l_mark[0].str) == 14) {
|
2007-10-18 18:49:08 -04:00
|
|
|
cfg_parser->cfg->val_date_override =
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_convert_timeval(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!cfg_parser->cfg->val_date_override)
|
|
|
|
|
yyerror("bad date/time specification");
|
|
|
|
|
} else {
|
2020-04-02 12:34:03 -04:00
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->val_date_override = atoi(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 392:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1664 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_sig_skew_min:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(*yystack.l_mark[0].str == '\0' || strcmp(yystack.l_mark[0].str, "0") == 0) {
|
2009-04-06 10:09:33 -04:00
|
|
|
cfg_parser->cfg->val_sig_skew_min = 0;
|
|
|
|
|
} else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->val_sig_skew_min = atoi(yystack.l_mark[0].str);
|
2009-04-06 10:09:33 -04:00
|
|
|
if(!cfg_parser->cfg->val_sig_skew_min)
|
|
|
|
|
yyerror("number expected");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2009-04-06 10:09:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 393:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1677 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_sig_skew_max:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(*yystack.l_mark[0].str == '\0' || strcmp(yystack.l_mark[0].str, "0") == 0) {
|
2009-04-06 10:09:33 -04:00
|
|
|
cfg_parser->cfg->val_sig_skew_max = 0;
|
|
|
|
|
} else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->val_sig_skew_max = atoi(yystack.l_mark[0].str);
|
2009-04-06 10:09:33 -04:00
|
|
|
if(!cfg_parser->cfg->val_sig_skew_max)
|
|
|
|
|
yyerror("number expected");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2009-04-06 10:09:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 394:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1690 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_cache_max_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2007-10-31 03:46:30 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->max_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-31 03:46:30 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 395:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1699 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_cache_max_negative_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2015-05-29 10:51:36 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->max_negative_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-05-29 10:51:36 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 396:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1708 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_cache_min_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2009-04-14 06:10:11 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->min_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-04-14 06:10:11 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 397:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1717 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_bogus_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->bogus_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 398:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1726 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_clean_additional:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->val_clean_additional =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 399:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1736 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_permissive_mode:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->val_permissive_mode =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 400:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1746 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_aggressive_nsec:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-02-08 08:16:36 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else
|
|
|
|
|
cfg_parser->cfg->aggressive_nsec =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-02-08 08:16:36 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 401:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1757 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ignore_cd_flag:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2011-05-10 07:20:14 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ignore_cd = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2011-05-10 07:20:14 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 402:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1766 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_serve_expired:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-10-24 08:43:20 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->serve_expired = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-10-24 08:43:20 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 403:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1775 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_serve_expired_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-08-28 10:21:56 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->serve_expired_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-08-28 10:21:56 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 404:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1784 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_serve_expired_ttl_reset:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-08-28 10:21:56 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->serve_expired_ttl_reset = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-08-28 10:21:56 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 405:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1793 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_serve_expired_reply_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2020-02-05 08:20:27 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->serve_expired_reply_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2020-02-05 08:20:27 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 406:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1802 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_serve_expired_client_timeout:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2020-02-05 08:20:27 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->serve_expired_client_timeout = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2020-02-05 08:20:27 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 407:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1811 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_fake_dsa:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-08-28 10:21:56 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-02-12 05:15:24 -05:00
|
|
|
#if defined(HAVE_SSL) || defined(HAVE_NETTLE)
|
2020-04-02 12:34:03 -04:00
|
|
|
else fake_dsa = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
2016-10-26 03:38:00 -04:00
|
|
|
if(fake_dsa)
|
|
|
|
|
log_warn("test option fake_dsa is enabled");
|
2016-12-21 05:29:19 -05:00
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2016-10-26 03:38:00 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 408:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1824 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_fake_sha1:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-03-09 08:18:08 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-02-12 05:15:24 -05:00
|
|
|
#if defined(HAVE_SSL) || defined(HAVE_NETTLE)
|
2020-04-02 12:34:03 -04:00
|
|
|
else fake_sha1 = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
2017-03-09 08:18:08 -05:00
|
|
|
if(fake_sha1)
|
|
|
|
|
log_warn("test option fake_sha1 is enabled");
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-09 08:18:08 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 409:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1837 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_log_level:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2009-07-20 10:22:29 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->val_log_level = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-07-20 10:22:29 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 410:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1846 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_val_nsec3_keysize_iterations:%s)\n", yystack.l_mark[0].str));
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->val_nsec3_key_iterations);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->val_nsec3_key_iterations = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 411:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1853 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_add_holddown:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2009-08-25 04:46:33 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->add_holddown = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-08-25 04:46:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 412:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1862 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_del_holddown:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2009-08-25 04:46:33 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->del_holddown = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-08-25 04:46:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 413:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1871 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_keep_missing:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2009-08-25 04:46:33 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->keep_missing = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2009-08-25 04:46:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 414:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1880 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_permit_small_holddown:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2015-07-30 07:52:12 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->permit_small_holddown =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-07-30 07:52:12 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 415:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1889 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_key_cache_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->key_cache_size))
|
2008-01-11 08:20:22 -05:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 416:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1897 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_key_cache_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->key_cache_slabs = atoi(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->key_cache_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 417:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1910 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_neg_cache_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->neg_cache_size))
|
2008-08-27 09:02:22 -04:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2008-08-27 09:02:22 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 418:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1918 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_local_zone:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "static")!=0 && strcmp(yystack.l_mark[0].str, "deny")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "refuse")!=0 && strcmp(yystack.l_mark[0].str, "redirect")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "transparent")!=0 && strcmp(yystack.l_mark[0].str, "nodefault")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "typetransparent")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "always_transparent")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "always_refuse")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "always_nxdomain")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "noview")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "inform")!=0 && strcmp(yystack.l_mark[0].str, "inform_deny")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "inform_redirect") != 0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "ipset") != 0) {
|
2007-11-20 09:48:33 -05:00
|
|
|
yyerror("local-zone type: expected static, deny, "
|
2010-12-02 07:39:33 -05:00
|
|
|
"refuse, redirect, transparent, "
|
2016-06-24 15:08:58 -04:00
|
|
|
"typetransparent, inform, inform_deny, "
|
2019-02-04 04:51:27 -05:00
|
|
|
"inform_redirect, always_transparent, "
|
|
|
|
|
"always_refuse, always_nxdomain, noview "
|
2019-05-03 05:45:34 -04:00
|
|
|
", nodefault or ipset");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
} else if(strcmp(yystack.l_mark[0].str, "nodefault")==0) {
|
2007-11-20 09:48:33 -05:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
local_zones_nodefault, yystack.l_mark[-1].str))
|
2007-11-20 09:48:33 -05:00
|
|
|
fatal_exit("out of memory adding local-zone");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-03 05:45:34 -04:00
|
|
|
#ifdef USE_IPSET
|
2020-04-02 12:34:03 -04:00
|
|
|
} else if(strcmp(yystack.l_mark[0].str, "ipset")==0) {
|
2019-05-03 05:45:34 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
local_zones_ipset, yystack.l_mark[-1].str))
|
2019-05-03 05:45:34 -04:00
|
|
|
fatal_exit("out of memory adding local-zone");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-03 05:45:34 -04:00
|
|
|
#endif
|
2007-11-20 09:48:33 -05:00
|
|
|
} else {
|
|
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->local_zones,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2007-11-20 09:48:33 -05:00
|
|
|
fatal_exit("out of memory adding local-zone");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 419:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1959 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_local_data:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->local_data, yystack.l_mark[0].str))
|
2007-11-20 09:48:33 -05:00
|
|
|
fatal_exit("out of memory adding local-data");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 420:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1966 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2008-09-30 11:04:32 -04:00
|
|
|
char* ptr;
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_local_data_ptr:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
ptr = cfg_ptr_reverse(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-09-30 11:04:32 -04:00
|
|
|
if(ptr) {
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->
|
|
|
|
|
local_data, ptr))
|
|
|
|
|
fatal_exit("out of memory adding local-data");
|
|
|
|
|
} else {
|
|
|
|
|
yyerror("local-data-ptr could not be reversed");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 421:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1981 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_minimal_responses:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2012-04-10 05:16:39 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->minimal_responses =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2012-04-10 05:16:39 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 422:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 1991 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_rrset_roundrobin:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2012-04-10 05:16:39 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->rrset_roundrobin =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2012-04-10 05:16:39 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 423:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2001 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_unknown_server_time_limit:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
cfg_parser->cfg->unknown_server_time_limit = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-10-25 05:21:41 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 424:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2008 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_max_udp_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
cfg_parser->cfg->max_udp_size = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2013-04-25 07:55:46 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 425:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2015 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dns64_prefix:%s)\n", yystack.l_mark[0].str));
|
2014-07-31 03:15:33 -04:00
|
|
|
free(cfg_parser->cfg->dns64_prefix);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dns64_prefix = yystack.l_mark[0].str;
|
2014-07-31 03:15:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 426:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2022 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_dns64_synthall:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-07-31 03:15:33 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dns64_synthall = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-07-31 03:15:33 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 427:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2031 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dns64_ignore_aaaa:%s)\n", yystack.l_mark[0].str));
|
2018-06-29 08:58:52 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->dns64_ignore_aaaa,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[0].str))
|
2018-06-29 08:58:52 -04:00
|
|
|
fatal_exit("out of memory adding dns64-ignore-aaaa");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 428:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2039 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
char* p, *s = yystack.l_mark[0].str;
|
|
|
|
|
OUTYY(("P(server_define_tag:%s)\n", yystack.l_mark[0].str));
|
2016-04-21 05:49:02 -04:00
|
|
|
while((p=strsep(&s, " \t\n")) != NULL) {
|
|
|
|
|
if(*p) {
|
|
|
|
|
if(!config_add_tag(cfg_parser->cfg, p))
|
|
|
|
|
yyerror("could not define-tag, "
|
|
|
|
|
"out of memory");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2016-04-21 05:49:02 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 429:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2053 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2016-04-21 05:49:02 -04:00
|
|
|
size_t len = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, yystack.l_mark[0].str,
|
2016-04-21 05:49:02 -04:00
|
|
|
&len);
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
OUTYY(("P(server_local_zone_tag:%s)\n", yystack.l_mark[-1].str));
|
2018-12-10 04:27:49 -05:00
|
|
|
if(!bitlist) {
|
2016-04-21 05:49:02 -04:00
|
|
|
yyerror("could not parse tags, (define-tag them first)");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
2018-12-10 04:27:49 -05:00
|
|
|
}
|
2016-04-21 05:49:02 -04:00
|
|
|
if(bitlist) {
|
|
|
|
|
if(!cfg_strbytelist_insert(
|
|
|
|
|
&cfg_parser->cfg->local_zone_tags,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, bitlist, len)) {
|
2016-04-21 05:49:02 -04:00
|
|
|
yyerror("out of memory");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
2016-04-21 05:49:02 -04:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 430:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2074 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2016-06-06 04:33:59 -04:00
|
|
|
size_t len = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, yystack.l_mark[0].str,
|
2016-06-06 04:33:59 -04:00
|
|
|
&len);
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
OUTYY(("P(server_access_control_tag:%s)\n", yystack.l_mark[-1].str));
|
2018-12-10 04:27:49 -05:00
|
|
|
if(!bitlist) {
|
2016-06-06 04:33:59 -04:00
|
|
|
yyerror("could not parse tags, (define-tag them first)");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
2018-12-10 04:27:49 -05:00
|
|
|
}
|
2016-06-06 04:33:59 -04:00
|
|
|
if(bitlist) {
|
|
|
|
|
if(!cfg_strbytelist_insert(
|
|
|
|
|
&cfg_parser->cfg->acl_tags,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, bitlist, len)) {
|
2016-06-06 04:33:59 -04:00
|
|
|
yyerror("out of memory");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
2016-06-06 04:33:59 -04:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 431:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2095 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_access_control_tag_action:%s %s %s)\n", yystack.l_mark[-2].str, yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
2016-06-06 09:47:24 -04:00
|
|
|
if(!cfg_str3list_insert(&cfg_parser->cfg->acl_tag_actions,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-2].str, yystack.l_mark[-1].str, yystack.l_mark[0].str)) {
|
2016-06-06 09:47:24 -04:00
|
|
|
yyerror("out of memory");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-2].str);
|
|
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-06-06 09:47:24 -04:00
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 432:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2107 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_access_control_tag_data:%s %s %s)\n", yystack.l_mark[-2].str, yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
2016-06-06 09:47:24 -04:00
|
|
|
if(!cfg_str3list_insert(&cfg_parser->cfg->acl_tag_datas,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-2].str, yystack.l_mark[-1].str, yystack.l_mark[0].str)) {
|
2016-06-06 09:47:24 -04:00
|
|
|
yyerror("out of memory");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-2].str);
|
|
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-06-06 09:47:24 -04:00
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 433:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2119 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_local_zone_override:%s %s %s)\n", yystack.l_mark[-2].str, yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
2016-06-06 06:00:25 -04:00
|
|
|
if(!cfg_str3list_insert(&cfg_parser->cfg->local_zone_overrides,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-2].str, yystack.l_mark[-1].str, yystack.l_mark[0].str)) {
|
2016-06-06 06:00:25 -04:00
|
|
|
yyerror("out of memory");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-2].str);
|
|
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-06-06 06:00:25 -04:00
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 434:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2131 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_access_control_view:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
2016-10-05 05:36:25 -04:00
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->acl_view,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, yystack.l_mark[0].str)) {
|
2016-10-05 05:36:25 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 435:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2140 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-07 09:58:51 -05:00
|
|
|
size_t len = 0;
|
2020-04-02 12:34:03 -04:00
|
|
|
uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, yystack.l_mark[0].str,
|
2017-03-07 09:58:51 -05:00
|
|
|
&len);
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
OUTYY(("P(response_ip_tag:%s)\n", yystack.l_mark[-1].str));
|
2018-12-10 04:27:49 -05:00
|
|
|
if(!bitlist) {
|
2017-03-07 09:58:51 -05:00
|
|
|
yyerror("could not parse tags, (define-tag them first)");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
2018-12-10 04:27:49 -05:00
|
|
|
}
|
2017-03-07 09:58:51 -05:00
|
|
|
if(bitlist) {
|
|
|
|
|
if(!cfg_strbytelist_insert(
|
|
|
|
|
&cfg_parser->cfg->respip_tags,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, bitlist, len)) {
|
2017-03-07 09:58:51 -05:00
|
|
|
yyerror("out of memory");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
2017-03-07 09:58:51 -05:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 436:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2161 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_ratelimit:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2017-01-05 08:57:12 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ip_ratelimit = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 437:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2171 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ratelimit:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2015-04-10 05:59:57 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ratelimit = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-04-10 05:59:57 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 438:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2180 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_ratelimit_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->ip_ratelimit_size))
|
2017-01-05 08:57:12 -05:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-01-05 08:57:12 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 439:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2188 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ratelimit_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->ratelimit_size))
|
2015-04-10 05:59:57 -04:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2015-04-10 05:59:57 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 440:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2196 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_ratelimit_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2017-01-05 08:57:12 -05:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ip_ratelimit_slabs = atoi(yystack.l_mark[0].str);
|
2017-01-05 08:57:12 -05:00
|
|
|
if(!is_pow2(cfg_parser->cfg->ip_ratelimit_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-01-05 08:57:12 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 441:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2209 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ratelimit_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2015-04-10 05:59:57 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ratelimit_slabs = atoi(yystack.l_mark[0].str);
|
2015-04-10 05:59:57 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->ratelimit_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2015-04-10 05:59:57 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 442:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2222 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ratelimit_for_domain:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0) {
|
2015-04-10 05:59:57 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-04-10 05:59:57 -04:00
|
|
|
} else {
|
|
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
ratelimit_for_domain, yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2015-04-10 05:59:57 -04:00
|
|
|
fatal_exit("out of memory adding "
|
|
|
|
|
"ratelimit-for-domain");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 443:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2237 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ratelimit_below_domain:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0) {
|
2015-04-10 05:59:57 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-04-10 05:59:57 -04:00
|
|
|
} else {
|
|
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->
|
2020-04-02 12:34:03 -04:00
|
|
|
ratelimit_below_domain, yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2015-04-10 05:59:57 -04:00
|
|
|
fatal_exit("out of memory adding "
|
|
|
|
|
"ratelimit-below-domain");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 444:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2252 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ip_ratelimit_factor:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2017-01-05 08:57:12 -05:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ip_ratelimit_factor = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 445:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2261 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_ratelimit_factor:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2015-04-16 10:18:50 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ratelimit_factor = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-04-16 10:18:50 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 446:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2270 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-10-08 12:33:04 -04:00
|
|
|
OUTYY(("P(low-rtt option is deprecated, use fast-server-num instead)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 447:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2276 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_fast_server_num:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) <= 0)
|
2018-04-09 09:27:28 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->fast_server_num = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 448:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2285 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_fast_server_permil:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2018-04-09 09:27:28 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->fast_server_permil = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-04-09 09:27:28 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 449:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2294 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_qname_minimisation:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2015-11-30 11:10:26 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->qname_minimisation =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-11-30 11:10:26 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 450:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2304 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_qname_minimisation_strict:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-10-11 07:32:50 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->qname_minimisation_strict =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-10-11 07:32:50 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 451:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2314 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_pad_responses:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
|
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->pad_responses =
|
|
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 452:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2324 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_pad_responses_block_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
|
|
|
|
yyerror("number expected");
|
|
|
|
|
else cfg_parser->cfg->pad_responses_block_size = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 453:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2333 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_pad_queries:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
|
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->pad_queries =
|
|
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 454:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2343 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_pad_queries_block_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
|
|
|
|
yyerror("number expected");
|
|
|
|
|
else cfg_parser->cfg->pad_queries_block_size = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 455:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2352 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-05-16 09:21:10 -04:00
|
|
|
#ifdef USE_IPSECMOD
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_ipsecmod_enabled:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-05-16 09:21:10 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ipsecmod_enabled = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
2017-05-16 09:21:10 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without IPsec module, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 456:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2365 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-05-16 09:21:10 -04:00
|
|
|
#ifdef USE_IPSECMOD
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_ipsecmod_ignore_bogus:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-05-16 09:21:10 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ipsecmod_ignore_bogus = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
2017-05-16 09:21:10 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without IPsec module, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 457:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2378 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-05-16 09:21:10 -04:00
|
|
|
#ifdef USE_IPSECMOD
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_ipsecmod_hook:%s)\n", yystack.l_mark[0].str));
|
2017-05-16 09:21:10 -04:00
|
|
|
free(cfg_parser->cfg->ipsecmod_hook);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ipsecmod_hook = yystack.l_mark[0].str;
|
2017-05-16 09:21:10 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without IPsec module, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 458:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2390 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-05-16 09:21:10 -04:00
|
|
|
#ifdef USE_IPSECMOD
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_ipsecmod_max_ttl:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0 && strcmp(yystack.l_mark[0].str, "0") != 0)
|
2017-05-16 09:21:10 -04:00
|
|
|
yyerror("number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ipsecmod_max_ttl = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without IPsec module, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 459:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2404 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-05-16 09:21:10 -04:00
|
|
|
#ifdef USE_IPSECMOD
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_ipsecmod_whitelist:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->ipsecmod_whitelist, yystack.l_mark[0].str))
|
2017-05-16 09:21:10 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without IPsec module, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 460:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2416 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-05-16 09:21:10 -04:00
|
|
|
#ifdef USE_IPSECMOD
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(server_ipsecmod_strict:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-05-16 09:21:10 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->ipsecmod_strict = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without IPsec module, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-05-16 09:21:10 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 461:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2430 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(name:%s)\n", yystack.l_mark[0].str));
|
2011-03-01 07:59:27 -05:00
|
|
|
if(cfg_parser->cfg->stubs->name)
|
|
|
|
|
yyerror("stub name override, there must be one name "
|
|
|
|
|
"for one stub-zone");
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->stubs->name);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->stubs->name = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 462:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2440 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(stub-host:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->hosts, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 463:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2447 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(stub-addr:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->addrs, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 464:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2454 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(stub-first:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2012-03-01 08:16:40 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->stubs->isfirst=(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2012-03-01 08:16:40 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 465:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2463 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(stub-no-cache:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-08-09 08:44:40 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->stubs->no_cache=(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-08-09 08:44:40 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 466:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2472 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(stub-ssl-upstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-11-04 08:07:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->stubs->ssl_upstream =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-11-04 08:07:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 467:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2482 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(stub-prime:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-10-22 08:01:40 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->stubs->isprime =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-10-22 08:01:40 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 468:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2492 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(name:%s)\n", yystack.l_mark[0].str));
|
2011-03-01 07:59:27 -05:00
|
|
|
if(cfg_parser->cfg->forwards->name)
|
|
|
|
|
yyerror("forward name override, there must be one "
|
|
|
|
|
"name for one forward-zone");
|
2007-10-18 18:49:08 -04:00
|
|
|
free(cfg_parser->cfg->forwards->name);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->forwards->name = yystack.l_mark[0].str;
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 469:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2502 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(forward-host:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->hosts, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 470:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2509 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(forward-addr:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->addrs, yystack.l_mark[0].str))
|
2007-10-18 18:49:08 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 471:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2516 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(forward-first:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2012-03-01 08:16:40 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->forwards->isfirst=(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2012-03-01 08:16:40 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 472:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2525 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(forward-no-cache:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-08-09 08:44:40 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->forwards->no_cache=(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-08-09 08:44:40 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 473:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2534 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(forward-ssl-upstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-11-04 08:07:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->forwards->ssl_upstream =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-11-04 08:07:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 474:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2544 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(name:%s)\n", yystack.l_mark[0].str));
|
2017-10-17 11:16:31 -04:00
|
|
|
if(cfg_parser->cfg->auths->name)
|
|
|
|
|
yyerror("auth name override, there must be one name "
|
|
|
|
|
"for one auth-zone");
|
|
|
|
|
free(cfg_parser->cfg->auths->name);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->auths->name = yystack.l_mark[0].str;
|
2017-10-17 11:16:31 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 475:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2554 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(zonefile:%s)\n", yystack.l_mark[0].str));
|
2017-10-17 11:16:31 -04:00
|
|
|
free(cfg_parser->cfg->auths->zonefile);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->auths->zonefile = yystack.l_mark[0].str;
|
2017-10-17 11:16:31 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 476:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2561 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(master:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->masters, yystack.l_mark[0].str))
|
2017-10-17 11:16:31 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 477:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2568 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(url:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->urls, yystack.l_mark[0].str))
|
2017-10-17 11:16:31 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 478:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2575 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(allow-notify:%s)\n", yystack.l_mark[0].str));
|
2018-04-17 09:23:35 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->allow_notify,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[0].str))
|
2018-04-17 09:23:35 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 479:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2583 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(for-downstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-10-17 11:16:31 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->auths->for_downstream =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-10-17 11:16:31 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 480:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2593 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(for-upstream:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-10-17 11:16:31 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->auths->for_upstream =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-10-17 11:16:31 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 481:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2603 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(fallback-enabled:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2018-01-30 05:35:20 -05:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->auths->fallback_enabled =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2018-01-30 05:35:20 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 482:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2613 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(name:%s)\n", yystack.l_mark[0].str));
|
2016-10-05 05:36:25 -04:00
|
|
|
if(cfg_parser->cfg->views->name)
|
|
|
|
|
yyerror("view name override, there must be one "
|
|
|
|
|
"name for one view");
|
|
|
|
|
free(cfg_parser->cfg->views->name);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->views->name = yystack.l_mark[0].str;
|
2016-10-05 05:36:25 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 483:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2623 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(view_local_zone:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "static")!=0 && strcmp(yystack.l_mark[0].str, "deny")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "refuse")!=0 && strcmp(yystack.l_mark[0].str, "redirect")!=0 &&
|
|
|
|
|
strcmp(yystack.l_mark[0].str, "transparent")!=0 && strcmp(yystack.l_mark[0].str, "nodefault")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "typetransparent")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "always_transparent")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "always_refuse")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "always_nxdomain")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "noview")!=0
|
|
|
|
|
&& strcmp(yystack.l_mark[0].str, "inform")!=0 && strcmp(yystack.l_mark[0].str, "inform_deny")!=0) {
|
2016-10-05 05:36:25 -04:00
|
|
|
yyerror("local-zone type: expected static, deny, "
|
|
|
|
|
"refuse, redirect, transparent, "
|
|
|
|
|
"typetransparent, inform, inform_deny, "
|
|
|
|
|
"always_transparent, always_refuse, "
|
2018-02-19 08:30:38 -05:00
|
|
|
"always_nxdomain, noview or nodefault");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[-1].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
|
|
|
|
} else if(strcmp(yystack.l_mark[0].str, "nodefault")==0) {
|
2016-10-05 05:36:25 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
|
2020-04-02 12:34:03 -04:00
|
|
|
local_zones_nodefault, yystack.l_mark[-1].str))
|
2016-10-05 05:36:25 -04:00
|
|
|
fatal_exit("out of memory adding local-zone");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-03 05:45:34 -04:00
|
|
|
#ifdef USE_IPSET
|
2020-04-02 12:34:03 -04:00
|
|
|
} else if(strcmp(yystack.l_mark[0].str, "ipset")==0) {
|
2019-05-03 05:45:34 -04:00
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
|
2020-04-02 12:34:03 -04:00
|
|
|
local_zones_ipset, yystack.l_mark[-1].str))
|
2019-05-03 05:45:34 -04:00
|
|
|
fatal_exit("out of memory adding local-zone");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-03 05:45:34 -04:00
|
|
|
#endif
|
2016-10-05 05:36:25 -04:00
|
|
|
} else {
|
|
|
|
|
if(!cfg_str2list_insert(
|
|
|
|
|
&cfg_parser->cfg->views->local_zones,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2016-10-05 05:36:25 -04:00
|
|
|
fatal_exit("out of memory adding local-zone");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 484:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2662 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(view_response_ip:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
validate_respip_action(yystack.l_mark[0].str);
|
2017-03-07 09:58:51 -05:00
|
|
|
if(!cfg_str2list_insert(
|
2020-04-02 12:34:03 -04:00
|
|
|
&cfg_parser->cfg->views->respip_actions, yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2017-03-07 09:58:51 -05:00
|
|
|
fatal_exit("out of memory adding per-view "
|
|
|
|
|
"response-ip action");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 485:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2672 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(view_response_ip_data:%s)\n", yystack.l_mark[-1].str));
|
2017-03-07 09:58:51 -05:00
|
|
|
if(!cfg_str2list_insert(
|
2020-04-02 12:34:03 -04:00
|
|
|
&cfg_parser->cfg->views->respip_data, yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2017-03-07 09:58:51 -05:00
|
|
|
fatal_exit("out of memory adding response-ip-data");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 486:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2680 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(view_local_data:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->views->local_data, yystack.l_mark[0].str)) {
|
2016-10-05 05:36:25 -04:00
|
|
|
fatal_exit("out of memory adding local-data");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 487:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2688 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-17 04:01:40 -04:00
|
|
|
char* ptr;
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(view_local_data_ptr:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
ptr = cfg_ptr_reverse(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-17 04:01:40 -04:00
|
|
|
if(ptr) {
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
|
|
|
|
|
local_data, ptr))
|
|
|
|
|
fatal_exit("out of memory adding local-data");
|
|
|
|
|
} else {
|
|
|
|
|
yyerror("local-data-ptr could not be reversed");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 488:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2703 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(view-first:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-10-05 05:36:25 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->views->isfirst=(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-10-05 05:36:25 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 489:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2712 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2008-09-10 11:23:01 -04:00
|
|
|
OUTYY(("\nP(remote-control:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 500:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2723 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(control_enable:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2008-09-10 11:23:01 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->remote_control_enable =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-09-10 11:23:01 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 501:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2733 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(control_port:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2008-09-10 11:23:01 -04:00
|
|
|
yyerror("control port number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->control_port = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2008-09-10 11:23:01 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 502:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2742 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(control_interface:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_append(&cfg_parser->cfg->control_ifs, yystack.l_mark[0].str))
|
2008-09-10 11:23:01 -04:00
|
|
|
yyerror("out of memory");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 503:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2749 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(control_use_cert:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
cfg_parser->cfg->control_use_cert = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2015-01-06 09:12:59 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 504:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2756 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rc_server_key_file:%s)\n", yystack.l_mark[0].str));
|
2008-09-10 11:23:01 -04:00
|
|
|
free(cfg_parser->cfg->server_key_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->server_key_file = yystack.l_mark[0].str;
|
2008-09-10 11:23:01 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 505:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2763 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rc_server_cert_file:%s)\n", yystack.l_mark[0].str));
|
2008-09-10 11:23:01 -04:00
|
|
|
free(cfg_parser->cfg->server_cert_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->server_cert_file = yystack.l_mark[0].str;
|
2008-09-10 11:23:01 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 506:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2770 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rc_control_key_file:%s)\n", yystack.l_mark[0].str));
|
2008-09-10 11:23:01 -04:00
|
|
|
free(cfg_parser->cfg->control_key_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->control_key_file = yystack.l_mark[0].str;
|
2008-09-10 11:23:01 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 507:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2777 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(rc_control_cert_file:%s)\n", yystack.l_mark[0].str));
|
2008-09-10 11:23:01 -04:00
|
|
|
free(cfg_parser->cfg->control_cert_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->control_cert_file = yystack.l_mark[0].str;
|
2008-09-10 11:23:01 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 508:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2784 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2014-08-05 03:57:52 -04:00
|
|
|
OUTYY(("\nP(dnstap:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 529:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2804 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_enable:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dnstap = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 530:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2813 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_socket_path:%s)\n", yystack.l_mark[0].str));
|
2014-08-05 03:57:52 -04:00
|
|
|
free(cfg_parser->cfg->dnstap_socket_path);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_socket_path = yystack.l_mark[0].str;
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 531:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2820 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_ip:%s)\n", yystack.l_mark[0].str));
|
2020-02-14 03:40:37 -05:00
|
|
|
free(cfg_parser->cfg->dnstap_ip);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_ip = yystack.l_mark[0].str;
|
2020-02-14 03:40:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 532:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2827 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_tls:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2020-02-14 03:40:37 -05:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dnstap_tls = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2020-02-14 03:40:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 533:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2836 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_tls_server_name:%s)\n", yystack.l_mark[0].str));
|
2020-02-14 03:40:37 -05:00
|
|
|
free(cfg_parser->cfg->dnstap_tls_server_name);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_tls_server_name = yystack.l_mark[0].str;
|
2020-02-14 03:40:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 534:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2843 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_tls_cert_bundle:%s)\n", yystack.l_mark[0].str));
|
2020-02-14 03:40:37 -05:00
|
|
|
free(cfg_parser->cfg->dnstap_tls_cert_bundle);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_tls_cert_bundle = yystack.l_mark[0].str;
|
2020-02-14 03:40:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 535:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2850 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_tls_client_key_file:%s)\n", yystack.l_mark[0].str));
|
2020-02-14 03:40:37 -05:00
|
|
|
free(cfg_parser->cfg->dnstap_tls_client_key_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_tls_client_key_file = yystack.l_mark[0].str;
|
2020-02-14 03:40:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 536:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2857 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_tls_client_cert_file:%s)\n", yystack.l_mark[0].str));
|
2020-02-14 03:40:37 -05:00
|
|
|
free(cfg_parser->cfg->dnstap_tls_client_cert_file);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_tls_client_cert_file = yystack.l_mark[0].str;
|
2020-02-14 03:40:37 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 537:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2864 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_send_identity:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dnstap_send_identity = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 538:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2873 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_send_version:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dnstap_send_version = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 539:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2882 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_identity:%s)\n", yystack.l_mark[0].str));
|
2014-08-05 03:57:52 -04:00
|
|
|
free(cfg_parser->cfg->dnstap_identity);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_identity = yystack.l_mark[0].str;
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 540:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2889 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_version:%s)\n", yystack.l_mark[0].str));
|
2014-08-05 03:57:52 -04:00
|
|
|
free(cfg_parser->cfg->dnstap_version);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnstap_version = yystack.l_mark[0].str;
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 541:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2896 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_log_resolver_query_messages:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->dnstap_log_resolver_query_messages =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 542:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2906 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_log_resolver_response_messages:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->dnstap_log_resolver_response_messages =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 543:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2916 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_log_client_query_messages:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->dnstap_log_client_query_messages =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 544:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2926 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_log_client_response_messages:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->dnstap_log_client_response_messages =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 545:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2936 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_log_forwarder_query_messages:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->dnstap_log_forwarder_query_messages =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 546:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2946 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dt_dnstap_log_forwarder_response_messages:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2014-08-05 03:57:52 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->dnstap_log_forwarder_response_messages =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2014-08-05 03:57:52 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 547:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2956 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2009-03-25 10:47:47 -04:00
|
|
|
OUTYY(("\nP(python:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 551:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2965 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(python-script:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_append_ex(&cfg_parser->cfg->python_script, yystack.l_mark[0].str))
|
2017-01-22 05:58:28 -05:00
|
|
|
yyerror("out of memory");
|
2009-03-25 10:47:47 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 552:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2971 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(disable_dnssec_lame_check:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if (strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2016-05-24 08:17:42 -04:00
|
|
|
yyerror("expected yes or no.");
|
|
|
|
|
else cfg_parser->cfg->disable_dnssec_lame_check =
|
2020-04-02 12:34:03 -04:00
|
|
|
(strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2016-05-24 08:17:42 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 553:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2981 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_log_identity:%s)\n", yystack.l_mark[0].str));
|
2016-11-03 04:51:40 -04:00
|
|
|
free(cfg_parser->cfg->log_identity);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->log_identity = yystack.l_mark[0].str;
|
2016-11-03 04:51:40 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 554:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2988 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_response_ip:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
validate_respip_action(yystack.l_mark[0].str);
|
2017-03-07 09:58:51 -05:00
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->respip_actions,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2017-03-07 09:58:51 -05:00
|
|
|
fatal_exit("out of memory adding response-ip");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 555:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 2997 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_response_ip_data:%s)\n", yystack.l_mark[-1].str));
|
2018-12-10 04:27:49 -05:00
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->respip_data,
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2018-12-10 04:27:49 -05:00
|
|
|
fatal_exit("out of memory adding response-ip-data");
|
2017-03-07 09:58:51 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 556:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3005 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-03-20 11:09:06 -04:00
|
|
|
OUTYY(("\nP(dnscrypt:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 569:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3021 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnsc_dnscrypt_enable:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2017-03-20 11:09:06 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dnscrypt = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-20 11:09:06 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 570:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3031 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnsc_dnscrypt_port:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2017-03-20 11:09:06 -04:00
|
|
|
yyerror("port number expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->dnscrypt_port = atoi(yystack.l_mark[0].str);
|
|
|
|
|
free(yystack.l_mark[0].str);
|
2017-03-20 11:09:06 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 571:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3040 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnsc_dnscrypt_provider:%s)\n", yystack.l_mark[0].str));
|
2017-03-20 11:09:06 -04:00
|
|
|
free(cfg_parser->cfg->dnscrypt_provider);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnscrypt_provider = yystack.l_mark[0].str;
|
2017-03-20 11:09:06 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 572:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3047 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnsc_dnscrypt_provider_cert:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(cfg_strlist_find(cfg_parser->cfg->dnscrypt_provider_cert, yystack.l_mark[0].str))
|
|
|
|
|
log_warn("dnscrypt-provider-cert %s is a duplicate", yystack.l_mark[0].str);
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert, yystack.l_mark[0].str))
|
2017-03-20 11:09:06 -04:00
|
|
|
fatal_exit("out of memory adding dnscrypt-provider-cert");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 573:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3056 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnsc_dnscrypt_provider_cert_rotated:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert_rotated, yystack.l_mark[0].str))
|
2017-10-17 03:34:49 -04:00
|
|
|
fatal_exit("out of memory adding dnscrypt-provider-cert-rotated");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 574:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3063 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnsc_dnscrypt_secret_key:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(cfg_strlist_find(cfg_parser->cfg->dnscrypt_secret_key, yystack.l_mark[0].str))
|
|
|
|
|
log_warn("dnscrypt-secret-key: %s is a duplicate", yystack.l_mark[0].str);
|
|
|
|
|
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_secret_key, yystack.l_mark[0].str))
|
2017-03-20 11:09:06 -04:00
|
|
|
fatal_exit("out of memory adding dnscrypt-secret-key");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 575:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3072 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnscrypt_shared_secret_cache_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->dnscrypt_shared_secret_cache_size))
|
2017-08-31 07:59:38 -04:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-08-31 07:59:38 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 576:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3080 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnscrypt_shared_secret_cache_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2017-08-31 07:59:38 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnscrypt_shared_secret_cache_slabs = atoi(yystack.l_mark[0].str);
|
2017-08-31 07:59:38 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->dnscrypt_shared_secret_cache_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-08-31 07:59:38 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 577:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3093 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnscrypt_nonce_cache_size:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(!cfg_parse_memsize(yystack.l_mark[0].str, &cfg_parser->cfg->dnscrypt_nonce_cache_size))
|
2017-09-18 04:55:08 -04:00
|
|
|
yyerror("memory size expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-09-18 04:55:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 578:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3101 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(dnscrypt_nonce_cache_slabs:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2017-09-18 04:55:08 -04:00
|
|
|
yyerror("number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->dnscrypt_nonce_cache_slabs = atoi(yystack.l_mark[0].str);
|
2017-09-18 04:55:08 -04:00
|
|
|
if(!is_pow2(cfg_parser->cfg->dnscrypt_nonce_cache_slabs))
|
|
|
|
|
yyerror("must be a power of 2");
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-09-18 04:55:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
|
|
|
|
case 579:
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 3114 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-07-17 04:21:19 -04:00
|
|
|
OUTYY(("\nP(cachedb:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 588:
|
|
|
|
|
#line 3125 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-07-17 04:21:19 -04:00
|
|
|
#ifdef USE_CACHEDB
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(backend:%s)\n", yystack.l_mark[0].str));
|
2017-07-17 04:21:19 -04:00
|
|
|
free(cfg_parser->cfg->cachedb_backend);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->cachedb_backend = yystack.l_mark[0].str;
|
2017-07-17 04:21:19 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without cachedb, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-07-17 04:21:19 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 589:
|
|
|
|
|
#line 3137 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2017-08-08 05:09:45 -04:00
|
|
|
#ifdef USE_CACHEDB
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(secret-seed:%s)\n", yystack.l_mark[0].str));
|
2017-08-08 05:09:45 -04:00
|
|
|
free(cfg_parser->cfg->cachedb_secret);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->cachedb_secret = yystack.l_mark[0].str;
|
2017-08-08 05:09:45 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without cachedb, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2017-08-08 05:09:45 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 590:
|
|
|
|
|
#line 3149 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-03-15 08:33:51 -04:00
|
|
|
#if defined(USE_CACHEDB) && defined(USE_REDIS)
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(redis_server_host:%s)\n", yystack.l_mark[0].str));
|
2018-03-15 08:33:51 -04:00
|
|
|
free(cfg_parser->cfg->redis_server_host);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->redis_server_host = yystack.l_mark[0].str;
|
2018-03-15 08:33:51 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without cachedb or redis, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-03-15 08:33:51 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 591:
|
|
|
|
|
#line 3161 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-03-15 08:33:51 -04:00
|
|
|
#if defined(USE_CACHEDB) && defined(USE_REDIS)
|
|
|
|
|
int port;
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(redis_server_port:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
port = atoi(yystack.l_mark[0].str);
|
2018-03-15 08:33:51 -04:00
|
|
|
if(port == 0 || port < 0 || port > 65535)
|
|
|
|
|
yyerror("valid redis server port number expected");
|
|
|
|
|
else cfg_parser->cfg->redis_server_port = port;
|
|
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without cachedb or redis, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-03-15 08:33:51 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 592:
|
|
|
|
|
#line 3176 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2018-03-15 08:33:51 -04:00
|
|
|
#if defined(USE_CACHEDB) && defined(USE_REDIS)
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(redis_timeout:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(atoi(yystack.l_mark[0].str) == 0)
|
2018-03-15 08:33:51 -04:00
|
|
|
yyerror("redis timeout value expected");
|
2020-04-02 12:34:03 -04:00
|
|
|
else cfg_parser->cfg->redis_timeout = atoi(yystack.l_mark[0].str);
|
2018-03-15 08:33:51 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without cachedb or redis, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2018-03-15 08:33:51 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 593:
|
|
|
|
|
#line 3189 "./util/configparser.y"
|
|
|
|
|
{
|
2020-03-31 06:47:13 -04:00
|
|
|
#if defined(USE_CACHEDB) && defined(USE_REDIS)
|
2020-04-02 12:54:18 -04:00
|
|
|
OUTYY(("P(redis_expire_records:%s)\n", yystack.l_mark[0].str));
|
|
|
|
|
if(strcmp(yystack.l_mark[0].str, "yes") != 0 && strcmp(yystack.l_mark[0].str, "no") != 0)
|
2020-03-31 06:47:13 -04:00
|
|
|
yyerror("expected yes or no.");
|
2020-04-02 12:54:18 -04:00
|
|
|
else cfg_parser->cfg->redis_expire_records = (strcmp(yystack.l_mark[0].str, "yes")==0);
|
2020-03-31 06:47:13 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without cachedb or redis, ignoring)\n"));
|
|
|
|
|
#endif
|
2020-04-02 12:54:18 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2020-03-31 06:47:13 -04:00
|
|
|
}
|
2020-04-02 12:54:18 -04:00
|
|
|
break;
|
|
|
|
|
case 594:
|
|
|
|
|
#line 3202 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
|
|
|
|
OUTYY(("P(server_tcp_connection_limit:%s %s)\n", yystack.l_mark[-1].str, yystack.l_mark[0].str));
|
|
|
|
|
if (atoi(yystack.l_mark[0].str) < 0)
|
2018-08-07 08:02:10 -04:00
|
|
|
yyerror("positive number expected");
|
|
|
|
|
else {
|
2020-04-02 12:34:03 -04:00
|
|
|
if(!cfg_str2list_insert(&cfg_parser->cfg->tcp_connection_limits, yystack.l_mark[-1].str, yystack.l_mark[0].str))
|
2018-08-07 08:02:10 -04:00
|
|
|
fatal_exit("out of memory adding tcp connection limit");
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 595:
|
|
|
|
|
#line 3213 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2019-05-02 07:43:30 -04:00
|
|
|
OUTYY(("\nP(ipset:)\n"));
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 600:
|
|
|
|
|
#line 3222 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2019-05-02 07:43:30 -04:00
|
|
|
#ifdef USE_IPSET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(name-v4:%s)\n", yystack.l_mark[0].str));
|
2019-05-02 07:43:30 -04:00
|
|
|
if(cfg_parser->cfg->ipset_name_v4)
|
|
|
|
|
yyerror("ipset name v4 override, there must be one "
|
|
|
|
|
"name for ip v4");
|
|
|
|
|
free(cfg_parser->cfg->ipset_name_v4);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ipset_name_v4 = yystack.l_mark[0].str;
|
2019-05-02 07:43:30 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without ipset, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-02 07:43:30 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
case 601:
|
|
|
|
|
#line 3237 "./util/configparser.y"
|
2020-04-02 12:34:03 -04:00
|
|
|
{
|
2019-05-02 07:43:30 -04:00
|
|
|
#ifdef USE_IPSET
|
2020-04-02 12:34:03 -04:00
|
|
|
OUTYY(("P(name-v6:%s)\n", yystack.l_mark[0].str));
|
2019-05-02 07:43:30 -04:00
|
|
|
if(cfg_parser->cfg->ipset_name_v6)
|
|
|
|
|
yyerror("ipset name v6 override, there must be one "
|
|
|
|
|
"name for ip v6");
|
|
|
|
|
free(cfg_parser->cfg->ipset_name_v6);
|
2020-04-02 12:34:03 -04:00
|
|
|
cfg_parser->cfg->ipset_name_v6 = yystack.l_mark[0].str;
|
2019-05-02 07:43:30 -04:00
|
|
|
#else
|
|
|
|
|
OUTYY(("P(Compiled without ipset, ignoring)\n"));
|
2020-04-02 12:34:03 -04:00
|
|
|
free(yystack.l_mark[0].str);
|
2019-05-02 07:43:30 -04:00
|
|
|
#endif
|
|
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
break;
|
2020-04-02 12:54:18 -04:00
|
|
|
#line 5199 "util/configparser.c"
|
2007-10-18 18:49:08 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
yystack.s_mark -= yym;
|
|
|
|
|
yystate = *yystack.s_mark;
|
|
|
|
|
yystack.l_mark -= yym;
|
|
|
|
|
yym = yylhs[yyn];
|
|
|
|
|
if (yystate == 0 && yym == 0)
|
2007-10-18 18:49:08 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
printf("%sdebug: after reduction, shifting from state 0 to\
|
|
|
|
|
state %d\n", YYPREFIX, YYFINAL);
|
2009-03-11 07:53:47 -04:00
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
yystate = YYFINAL;
|
|
|
|
|
*++yystack.s_mark = YYFINAL;
|
|
|
|
|
*++yystack.l_mark = yyval;
|
|
|
|
|
if (yychar < 0)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
if ((yychar = YYLEX) < 0) yychar = YYEOF;
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
yys = yyname[YYTRANSLATE(yychar)];
|
|
|
|
|
printf("%sdebug: state %d, reading %d (%s)\n",
|
|
|
|
|
YYPREFIX, YYFINAL, yychar, yys);
|
2020-03-24 04:25:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
#endif
|
2020-03-24 04:25:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
if (yychar == YYEOF) goto yyaccept;
|
|
|
|
|
goto yyloop;
|
2008-02-29 05:59:26 -05:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
if ((yyn = yygindex[yym]) && (yyn += yystate) >= 0 &&
|
|
|
|
|
yyn <= YYTABLESIZE && yycheck[yyn] == yystate)
|
|
|
|
|
yystate = yytable[yyn];
|
|
|
|
|
else
|
|
|
|
|
yystate = yydgoto[yym];
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
if (yydebug)
|
|
|
|
|
printf("%sdebug: after reduction, shifting from state %d \
|
|
|
|
|
to state %d\n", YYPREFIX, *yystack.s_mark, yystate);
|
2009-03-13 05:27:37 -04:00
|
|
|
#endif
|
2020-04-02 12:34:03 -04:00
|
|
|
if (yystack.s_mark >= yystack.s_last && yygrowstack(&yystack) == YYENOMEM)
|
2020-03-24 04:25:05 -04:00
|
|
|
{
|
2020-04-02 12:34:03 -04:00
|
|
|
goto yyoverflow;
|
2020-03-24 04:25:05 -04:00
|
|
|
}
|
2020-04-02 12:34:03 -04:00
|
|
|
*++yystack.s_mark = (YYINT) yystate;
|
|
|
|
|
*++yystack.l_mark = yyval;
|
|
|
|
|
goto yyloop;
|
2009-03-13 05:27:37 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yyoverflow:
|
|
|
|
|
YYERROR_CALL("yacc stack overflow");
|
2019-05-02 07:43:30 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yyabort:
|
|
|
|
|
yyfreestack(&yystack);
|
|
|
|
|
return (1);
|
2019-05-03 05:45:34 -04:00
|
|
|
|
2020-04-02 12:34:03 -04:00
|
|
|
yyaccept:
|
|
|
|
|
yyfreestack(&yystack);
|
|
|
|
|
return (0);
|
|
|
|
|
}
|