summaryrefslogtreecommitdiff
path: root/src (follow)
AgeCommit message (Collapse)AuthorFilesLines
2009-12-07upstream: add free_upstream_list ()Michael Adam2-0/+13
Michael
2009-12-07upstream: Add upstream list parameter to upstream_get()Michael Adam3-6/+3
to abstract it from the concrete list in the config struct. Now upstream.c does not use any reference to config any more. Michael
2009-12-07upstream: add upstream list parameter to upstream_add()Michael Adam3-8/+10
to abstract it from the concrete list in the config struct. Michael
2009-12-06move handling of upstream list to new module upstream.{c,h}Michael Adam7-198/+265
Michael
2009-12-06upstream: refactor assembly of upstream out of upstream_addMichael Adam1-10/+32
Michael
2009-12-06main/conf: add maxidletimeout to initialize_config_defaultsMichael Adam1-0/+1
But keep the resetting check after processing the conf file. Michael
2009-12-06main: fix tab -> spacesMichael Adam1-1/+1
Michael
2009-12-06conf: move setting of default stathost to initialize_config_defaults()Michael Adam1-6/+1
Michael
2009-12-06conf: fix tab->spacesMichael Adam1-1/+1
Michael
2009-12-06conf: allow set_string_arg to overwrite previous values (i.e. don't leak)Michael Adam1-0/+4
Michael
2009-12-06main: use safestrdup instead of strdup in process_cmdlineMichael Adam1-1/+1
Michael
2009-12-04Use capitalized name in error messagesMukund Sivaraman1-2/+2
2009-11-17acl: split initialization of the access_list out into a functionMichael Adam1-10/+20
2009-11-17Use NULL for pointersMukund Sivaraman2-2/+3
2009-11-16set_string_arg: Remove unneccesary check for determining the return code.Michael Adam1-1/+1
2009-11-17Remove excessive copyingMukund Sivaraman1-2/+3
2009-11-17Make position into an enumMukund Sivaraman1-4/+11
2009-11-17Use snprintf() with size of the portstr bufMukund Sivaraman1-2/+2
2009-11-16Fix format string warningsMathew Mrosko1-6/+8
C90 doesn't support z modifier in printf's, so cast values to (unsigned long) which should be the same size as size_t on both ILP32 and LP64.
2009-11-14Fix typo in log stringMukund Sivaraman1-1/+1
2009-11-14conf: refactor loading of config file out into load_config_file()Michael Adam3-18/+30
and make config_compile and config_parse static to conf.c Michael
2009-11-14main: add a config struct argument to process_cmdline.Michael Adam1-5/+5
Michael
2009-11-14main: put initialization of config defaults into a function of its ownMichael Adam1-9/+14
Michael
2009-11-14extract setup of the logging subsystem into a function of its own.Michael Adam3-17/+42
Signed-off-by: Michael Adam <obnox@samba.org>
2009-11-14main: move initialization of default config values closer togetherMichael Adam1-5/+4
Michael
2009-11-10daemon.c: fix #if NDEBUG --> #ifdef NDEBUGMichael Adam1-1/+1
Thanks to Mathew Mrosko for pointing that out.
2009-11-10intentation: convert a tab to spacesMichael Adam1-1/+1
Michael
2009-11-10conf: fix reverspath parsing: the string in the 2nd arg is actually the ↵Michael Adam1-2/+2
inner match this fixes bug #64, https://www.banu.com/bugzilla/show_bug.cgi?id=64 the quotes of the string were part of the revers path after parseing. Michael
2009-11-10conf: make the WS optional too, before the optional 2nd argument to reversepathMichael Adam1-1/+1
Michael
2009-11-10conf: fix ipv6 regex patterns, take threeMichael Adam1-0/+1
This extends the pattern by an alternative where there are no double colons. This is for instance the case for and IPv6 address of the form 1111:222:33:4:55:666:7777:888 Michael
2009-11-10Fix a segfault in insert_acl and checks against string-type aclsMichael Adam1-4/+0
The "address" member of struct acl_s is a union of a char * and the numeric ip. So freeing the string after appending it to the vector list is bad in two respects: 1. If the acl type was numeric, then this could (and would) lead to a segfault due to the numeric IP data interpreted as pointer to the string to be freed. 2. If the acl type was string, then the acl inserted into the list contained a reference to this address string that was freed. So in the worst case dereferencing this freed string could segfault, or at least this could lead to unexpectedly failing acl checks. Michael
2009-11-09conf: fix the IPV6 regex patterns, take twoMichael Adam1-17/+17
The patterns should not end with the end of line marker, since they might be part of a continuing pattern, say of the form ipv6address/mask (used for allow/deny) Michael
2009-11-09conf: fix the IPV6 regex patternsMichael Adam1-17/+17
These are not matched against the beginning of a line but somewhere in the middle (as in "listen <IPv6 address>"). Michael
2009-11-09Close listenfd upon errorsMukund Sivaraman1-0/+3
2009-11-09Fix validation of IPv6 addressesMukund Sivaraman1-4/+27
2009-11-09Add IPV6 support to listen_sock()Mukund Sivaraman1-14/+34
2009-10-25propagate reload of filter file to child procs by sending HUP signalsMichael Adam1-0/+3
2009-10-25Change child_kill_children() to take the signal as an argument.Michael Adam3-4/+4
2009-10-25child: handle SIGHUP in the child by reloading the filter fileMichael Adam1-1/+13
2009-10-25use new filter_reload() in child_main_loop()Michael Adam1-6/+1
2009-10-25filter: add function filter_reload()Michael Adam2-0/+13
2009-10-11Don't add "Via:" header when DisableViaHeader == Yes.Michael Adam1-0/+6
2009-10-11Add a boolean config option "DisableViaHeader".Michael Adam2-0/+17
2009-10-10acl: Fix "comparison between signed and unsigned" warning on 32bitMichael Adam1-4/+4
This reads the mask bits as an unsigned int instead of as signend. This is also what mask bits really are - there is no negative mask. :-) Michael
2009-10-10Use size_t not ssize_t for len argument. This is always >= 0.Michael Adam1-1/+1
2009-10-09Use ssize_t for len argumentMukund Sivaraman1-1/+1
2009-10-07add muks' and my (C) to the main.c boilerplate comment.Michael Adam1-0/+3
Michael
2009-10-07main: add muks and me to the license output (tinyproxy -l)Michael Adam1-0/+2
Michael
2009-10-02url variable modified in do_transparent_proxy() is not the url variable in ↵Mukund Sivaraman1-2/+6
the caller
2009-10-02Use safer string functionsMukund Sivaraman2-8/+15