1 /* 2 * configparser.y -- yacc grammar for unbound configuration files 3 * 4 * Copyright (c) 2001-2006, NLnet Labs. All rights reserved. 5 * 6 * Copyright (c) 2007, NLnet Labs. All rights reserved. 7 * 8 * This software is open source. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * Redistributions of source code must retain the above copyright notice, 15 * this list of conditions and the following disclaimer. 16 * 17 * Redistributions in binary form must reproduce the above copyright notice, 18 * this list of conditions and the following disclaimer in the documentation 19 * and/or other materials provided with the distribution. 20 * 21 * Neither the name of the NLNET LABS nor the names of its contributors may 22 * be used to endorse or promote products derived from this software without 23 * specific prior written permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 29 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 31 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 32 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36 */ 37 38 %{ 39 #include "config.h" 40 41 #include <stdarg.h> 42 #include <stdio.h> 43 #include <string.h> 44 #include <stdlib.h> 45 #include <assert.h> 46 47 #include "util/configyyrename.h" 48 #include "util/config_file.h" 49 #include "util/net_help.h" 50 #include "sldns/str2wire.h" 51 52 int ub_c_lex(void); 53 void ub_c_error(const char *message); 54 55 static void validate_respip_action(const char* action); 56 static void validate_acl_action(const char* action); 57 58 /* these need to be global, otherwise they cannot be used inside yacc */ 59 extern struct config_parser_state* cfg_parser; 60 61 #if 0 62 #define OUTYY(s) printf s /* used ONLY when debugging */ 63 #else 64 #define OUTYY(s) 65 #endif 66 67 %} 68 %union { 69 char* str; 70 }; 71 72 %token SPACE LETTER NEWLINE COMMENT COLON ANY ZONESTR 73 %token <str> STRING_ARG 74 %token VAR_FORCE_TOPLEVEL 75 %token VAR_SERVER VAR_VERBOSITY VAR_NUM_THREADS VAR_PORT 76 %token VAR_OUTGOING_RANGE VAR_INTERFACE VAR_PREFER_IP4 77 %token VAR_DO_IP4 VAR_DO_IP6 VAR_DO_NAT64 VAR_PREFER_IP6 VAR_DO_UDP VAR_DO_TCP 78 %token VAR_TCP_MSS VAR_OUTGOING_TCP_MSS VAR_TCP_IDLE_TIMEOUT 79 %token VAR_EDNS_TCP_KEEPALIVE VAR_EDNS_TCP_KEEPALIVE_TIMEOUT 80 %token VAR_SOCK_QUEUE_TIMEOUT 81 %token VAR_CHROOT VAR_USERNAME VAR_DIRECTORY VAR_LOGFILE VAR_PIDFILE 82 %token VAR_MSG_CACHE_SIZE VAR_MSG_CACHE_SLABS VAR_NUM_QUERIES_PER_THREAD 83 %token VAR_RRSET_CACHE_SIZE VAR_RRSET_CACHE_SLABS VAR_OUTGOING_NUM_TCP 84 %token VAR_INFRA_HOST_TTL VAR_INFRA_LAME_TTL VAR_INFRA_CACHE_SLABS 85 %token VAR_INFRA_CACHE_NUMHOSTS VAR_INFRA_CACHE_LAME_SIZE VAR_NAME 86 %token VAR_STUB_ZONE VAR_STUB_HOST VAR_STUB_ADDR VAR_TARGET_FETCH_POLICY 87 %token VAR_HARDEN_SHORT_BUFSIZE VAR_HARDEN_LARGE_QUERIES 88 %token VAR_FORWARD_ZONE VAR_FORWARD_HOST VAR_FORWARD_ADDR 89 %token VAR_DO_NOT_QUERY_ADDRESS VAR_HIDE_IDENTITY VAR_HIDE_VERSION 90 %token VAR_IDENTITY VAR_VERSION VAR_HARDEN_GLUE VAR_MODULE_CONF 91 %token VAR_TRUST_ANCHOR_FILE VAR_TRUST_ANCHOR VAR_VAL_OVERRIDE_DATE 92 %token VAR_BOGUS_TTL VAR_VAL_CLEAN_ADDITIONAL VAR_VAL_PERMISSIVE_MODE 93 %token VAR_INCOMING_NUM_TCP VAR_MSG_BUFFER_SIZE VAR_KEY_CACHE_SIZE 94 %token VAR_KEY_CACHE_SLABS VAR_TRUSTED_KEYS_FILE 95 %token VAR_VAL_NSEC3_KEYSIZE_ITERATIONS VAR_USE_SYSLOG 96 %token VAR_OUTGOING_INTERFACE VAR_ROOT_HINTS VAR_DO_NOT_QUERY_LOCALHOST 97 %token VAR_CACHE_MAX_TTL VAR_HARDEN_DNSSEC_STRIPPED VAR_ACCESS_CONTROL 98 %token VAR_LOCAL_ZONE VAR_LOCAL_DATA VAR_INTERFACE_AUTOMATIC 99 %token VAR_STATISTICS_INTERVAL VAR_DO_DAEMONIZE VAR_USE_CAPS_FOR_ID 100 %token VAR_STATISTICS_CUMULATIVE VAR_OUTGOING_PORT_PERMIT 101 %token VAR_OUTGOING_PORT_AVOID VAR_DLV_ANCHOR_FILE VAR_DLV_ANCHOR 102 %token VAR_NEG_CACHE_SIZE VAR_HARDEN_REFERRAL_PATH VAR_PRIVATE_ADDRESS 103 %token VAR_PRIVATE_DOMAIN VAR_REMOTE_CONTROL VAR_CONTROL_ENABLE 104 %token VAR_CONTROL_INTERFACE VAR_CONTROL_PORT VAR_SERVER_KEY_FILE 105 %token VAR_SERVER_CERT_FILE VAR_CONTROL_KEY_FILE VAR_CONTROL_CERT_FILE 106 %token VAR_CONTROL_USE_CERT VAR_TCP_REUSE_TIMEOUT VAR_MAX_REUSE_TCP_QUERIES 107 %token VAR_EXTENDED_STATISTICS VAR_LOCAL_DATA_PTR VAR_JOSTLE_TIMEOUT 108 %token VAR_STUB_PRIME VAR_UNWANTED_REPLY_THRESHOLD VAR_LOG_TIME_ASCII 109 %token VAR_DOMAIN_INSECURE VAR_PYTHON VAR_PYTHON_SCRIPT VAR_VAL_SIG_SKEW_MIN 110 %token VAR_VAL_SIG_SKEW_MAX VAR_VAL_MAX_RESTART VAR_CACHE_MIN_TTL 111 %token VAR_VAL_LOG_LEVEL VAR_AUTO_TRUST_ANCHOR_FILE VAR_KEEP_MISSING 112 %token VAR_ADD_HOLDDOWN VAR_DEL_HOLDDOWN VAR_SO_RCVBUF VAR_EDNS_BUFFER_SIZE 113 %token VAR_PREFETCH VAR_PREFETCH_KEY VAR_SO_SNDBUF VAR_SO_REUSEPORT 114 %token VAR_HARDEN_BELOW_NXDOMAIN VAR_IGNORE_CD_FLAG VAR_LOG_QUERIES 115 %token VAR_LOG_REPLIES VAR_LOG_LOCAL_ACTIONS VAR_TCP_UPSTREAM 116 %token VAR_SSL_UPSTREAM VAR_TCP_AUTH_QUERY_TIMEOUT VAR_SSL_SERVICE_KEY 117 %token VAR_SSL_SERVICE_PEM VAR_SSL_PORT VAR_FORWARD_FIRST 118 %token VAR_STUB_SSL_UPSTREAM VAR_FORWARD_SSL_UPSTREAM VAR_TLS_CERT_BUNDLE 119 %token VAR_STUB_TCP_UPSTREAM VAR_FORWARD_TCP_UPSTREAM 120 %token VAR_HTTPS_PORT VAR_HTTP_ENDPOINT VAR_HTTP_MAX_STREAMS 121 %token VAR_HTTP_QUERY_BUFFER_SIZE VAR_HTTP_RESPONSE_BUFFER_SIZE 122 %token VAR_HTTP_NODELAY VAR_HTTP_NOTLS_DOWNSTREAM 123 %token VAR_STUB_FIRST VAR_MINIMAL_RESPONSES VAR_RRSET_ROUNDROBIN 124 %token VAR_MAX_UDP_SIZE VAR_DELAY_CLOSE VAR_UDP_CONNECT 125 %token VAR_UNBLOCK_LAN_ZONES VAR_INSECURE_LAN_ZONES 126 %token VAR_INFRA_CACHE_MIN_RTT VAR_INFRA_CACHE_MAX_RTT VAR_INFRA_KEEP_PROBING 127 %token VAR_DNS64_PREFIX VAR_DNS64_SYNTHALL VAR_DNS64_IGNORE_AAAA 128 %token VAR_NAT64_PREFIX 129 %token VAR_DNSTAP VAR_DNSTAP_ENABLE VAR_DNSTAP_SOCKET_PATH VAR_DNSTAP_IP 130 %token VAR_DNSTAP_TLS VAR_DNSTAP_TLS_SERVER_NAME VAR_DNSTAP_TLS_CERT_BUNDLE 131 %token VAR_DNSTAP_TLS_CLIENT_KEY_FILE VAR_DNSTAP_TLS_CLIENT_CERT_FILE 132 %token VAR_DNSTAP_SEND_IDENTITY VAR_DNSTAP_SEND_VERSION VAR_DNSTAP_BIDIRECTIONAL 133 %token VAR_DNSTAP_IDENTITY VAR_DNSTAP_VERSION 134 %token VAR_DNSTAP_LOG_RESOLVER_QUERY_MESSAGES 135 %token VAR_DNSTAP_LOG_RESOLVER_RESPONSE_MESSAGES 136 %token VAR_DNSTAP_LOG_CLIENT_QUERY_MESSAGES 137 %token VAR_DNSTAP_LOG_CLIENT_RESPONSE_MESSAGES 138 %token VAR_DNSTAP_LOG_FORWARDER_QUERY_MESSAGES 139 %token VAR_DNSTAP_LOG_FORWARDER_RESPONSE_MESSAGES 140 %token VAR_RESPONSE_IP_TAG VAR_RESPONSE_IP VAR_RESPONSE_IP_DATA 141 %token VAR_HARDEN_ALGO_DOWNGRADE VAR_IP_TRANSPARENT 142 %token VAR_IP_DSCP 143 %token VAR_DISABLE_DNSSEC_LAME_CHECK 144 %token VAR_IP_RATELIMIT VAR_IP_RATELIMIT_SLABS VAR_IP_RATELIMIT_SIZE 145 %token VAR_RATELIMIT VAR_RATELIMIT_SLABS VAR_RATELIMIT_SIZE 146 %token VAR_OUTBOUND_MSG_RETRY VAR_MAX_SENT_COUNT VAR_MAX_QUERY_RESTARTS 147 %token VAR_RATELIMIT_FOR_DOMAIN VAR_RATELIMIT_BELOW_DOMAIN 148 %token VAR_IP_RATELIMIT_FACTOR VAR_RATELIMIT_FACTOR 149 %token VAR_IP_RATELIMIT_BACKOFF VAR_RATELIMIT_BACKOFF 150 %token VAR_SEND_CLIENT_SUBNET VAR_CLIENT_SUBNET_ZONE 151 %token VAR_CLIENT_SUBNET_ALWAYS_FORWARD VAR_CLIENT_SUBNET_OPCODE 152 %token VAR_MAX_CLIENT_SUBNET_IPV4 VAR_MAX_CLIENT_SUBNET_IPV6 153 %token VAR_MIN_CLIENT_SUBNET_IPV4 VAR_MIN_CLIENT_SUBNET_IPV6 154 %token VAR_MAX_ECS_TREE_SIZE_IPV4 VAR_MAX_ECS_TREE_SIZE_IPV6 155 %token VAR_CAPS_WHITELIST VAR_CACHE_MAX_NEGATIVE_TTL VAR_PERMIT_SMALL_HOLDDOWN 156 %token VAR_QNAME_MINIMISATION VAR_QNAME_MINIMISATION_STRICT VAR_IP_FREEBIND 157 %token VAR_DEFINE_TAG VAR_LOCAL_ZONE_TAG VAR_ACCESS_CONTROL_TAG 158 %token VAR_LOCAL_ZONE_OVERRIDE VAR_ACCESS_CONTROL_TAG_ACTION 159 %token VAR_ACCESS_CONTROL_TAG_DATA VAR_VIEW VAR_ACCESS_CONTROL_VIEW 160 %token VAR_VIEW_FIRST VAR_SERVE_EXPIRED VAR_SERVE_EXPIRED_TTL 161 %token VAR_SERVE_EXPIRED_TTL_RESET VAR_SERVE_EXPIRED_REPLY_TTL 162 %token VAR_SERVE_EXPIRED_CLIENT_TIMEOUT VAR_EDE_SERVE_EXPIRED 163 %token VAR_SERVE_ORIGINAL_TTL VAR_FAKE_DSA 164 %token VAR_FAKE_SHA1 VAR_LOG_IDENTITY VAR_HIDE_TRUSTANCHOR 165 %token VAR_HIDE_HTTP_USER_AGENT VAR_HTTP_USER_AGENT 166 %token VAR_TRUST_ANCHOR_SIGNALING VAR_AGGRESSIVE_NSEC VAR_USE_SYSTEMD 167 %token VAR_SHM_ENABLE VAR_SHM_KEY VAR_ROOT_KEY_SENTINEL 168 %token VAR_DNSCRYPT VAR_DNSCRYPT_ENABLE VAR_DNSCRYPT_PORT VAR_DNSCRYPT_PROVIDER 169 %token VAR_DNSCRYPT_SECRET_KEY VAR_DNSCRYPT_PROVIDER_CERT 170 %token VAR_DNSCRYPT_PROVIDER_CERT_ROTATED 171 %token VAR_DNSCRYPT_SHARED_SECRET_CACHE_SIZE 172 %token VAR_DNSCRYPT_SHARED_SECRET_CACHE_SLABS 173 %token VAR_DNSCRYPT_NONCE_CACHE_SIZE 174 %token VAR_DNSCRYPT_NONCE_CACHE_SLABS 175 %token VAR_PAD_RESPONSES VAR_PAD_RESPONSES_BLOCK_SIZE 176 %token VAR_PAD_QUERIES VAR_PAD_QUERIES_BLOCK_SIZE 177 %token VAR_IPSECMOD_ENABLED VAR_IPSECMOD_HOOK VAR_IPSECMOD_IGNORE_BOGUS 178 %token VAR_IPSECMOD_MAX_TTL VAR_IPSECMOD_WHITELIST VAR_IPSECMOD_STRICT 179 %token VAR_CACHEDB VAR_CACHEDB_BACKEND VAR_CACHEDB_SECRETSEED 180 %token VAR_CACHEDB_REDISHOST VAR_CACHEDB_REDISPORT VAR_CACHEDB_REDISTIMEOUT 181 %token VAR_CACHEDB_REDISEXPIRERECORDS VAR_CACHEDB_REDISPATH VAR_CACHEDB_REDISPASSWORD 182 %token VAR_CACHEDB_REDISLOGICALDB 183 %token VAR_UDP_UPSTREAM_WITHOUT_DOWNSTREAM VAR_FOR_UPSTREAM 184 %token VAR_AUTH_ZONE VAR_ZONEFILE VAR_MASTER VAR_URL VAR_FOR_DOWNSTREAM 185 %token VAR_FALLBACK_ENABLED VAR_TLS_ADDITIONAL_PORT VAR_LOW_RTT VAR_LOW_RTT_PERMIL 186 %token VAR_FAST_SERVER_PERMIL VAR_FAST_SERVER_NUM 187 %token VAR_ALLOW_NOTIFY VAR_TLS_WIN_CERT VAR_TCP_CONNECTION_LIMIT 188 %token VAR_ANSWER_COOKIE VAR_COOKIE_SECRET VAR_IP_RATELIMIT_COOKIE 189 %token VAR_FORWARD_NO_CACHE VAR_STUB_NO_CACHE VAR_LOG_SERVFAIL VAR_DENY_ANY 190 %token VAR_UNKNOWN_SERVER_TIME_LIMIT VAR_LOG_TAG_QUERYREPLY 191 %token VAR_STREAM_WAIT_SIZE VAR_TLS_CIPHERS VAR_TLS_CIPHERSUITES VAR_TLS_USE_SNI 192 %token VAR_IPSET VAR_IPSET_NAME_V4 VAR_IPSET_NAME_V6 193 %token VAR_TLS_SESSION_TICKET_KEYS VAR_RPZ VAR_TAGS VAR_RPZ_ACTION_OVERRIDE 194 %token VAR_RPZ_CNAME_OVERRIDE VAR_RPZ_LOG VAR_RPZ_LOG_NAME 195 %token VAR_DYNLIB VAR_DYNLIB_FILE VAR_EDNS_CLIENT_STRING 196 %token VAR_EDNS_CLIENT_STRING_OPCODE VAR_NSID 197 %token VAR_ZONEMD_PERMISSIVE_MODE VAR_ZONEMD_CHECK VAR_ZONEMD_REJECT_ABSENCE 198 %token VAR_RPZ_SIGNAL_NXDOMAIN_RA VAR_INTERFACE_AUTOMATIC_PORTS VAR_EDE 199 %token VAR_INTERFACE_ACTION VAR_INTERFACE_VIEW VAR_INTERFACE_TAG 200 %token VAR_INTERFACE_TAG_ACTION VAR_INTERFACE_TAG_DATA 201 %token VAR_PROXY_PROTOCOL_PORT VAR_STATISTICS_INHIBIT_ZERO 202 %token VAR_HARDEN_UNKNOWN_ADDITIONAL VAR_DISABLE_EDNS_DO VAR_CACHEDB_NO_STORE 203 204 %% 205 toplevelvars: /* empty */ | toplevelvars toplevelvar ; 206 toplevelvar: serverstart contents_server | stubstart contents_stub | 207 forwardstart contents_forward | pythonstart contents_py | 208 rcstart contents_rc | dtstart contents_dt | viewstart contents_view | 209 dnscstart contents_dnsc | cachedbstart contents_cachedb | 210 ipsetstart contents_ipset | authstart contents_auth | 211 rpzstart contents_rpz | dynlibstart contents_dl | 212 force_toplevel 213 ; 214 force_toplevel: VAR_FORCE_TOPLEVEL 215 { 216 OUTYY(("\nP(force-toplevel)\n")); 217 cfg_parser->started_toplevel = 0; 218 } 219 ; 220 /* server: declaration */ 221 serverstart: VAR_SERVER 222 { 223 OUTYY(("\nP(server:)\n")); 224 cfg_parser->started_toplevel = 1; 225 } 226 ; 227 contents_server: contents_server content_server 228 | ; 229 content_server: server_num_threads | server_verbosity | server_port | 230 server_outgoing_range | server_do_ip4 | 231 server_do_ip6 | server_do_nat64 | server_prefer_ip4 | 232 server_prefer_ip6 | server_do_udp | server_do_tcp | 233 server_tcp_mss | server_outgoing_tcp_mss | server_tcp_idle_timeout | 234 server_tcp_keepalive | server_tcp_keepalive_timeout | 235 server_sock_queue_timeout | 236 server_interface | server_chroot | server_username | 237 server_directory | server_logfile | server_pidfile | 238 server_msg_cache_size | server_msg_cache_slabs | 239 server_num_queries_per_thread | server_rrset_cache_size | 240 server_rrset_cache_slabs | server_outgoing_num_tcp | 241 server_infra_host_ttl | server_infra_lame_ttl | 242 server_infra_cache_slabs | server_infra_cache_numhosts | 243 server_infra_cache_lame_size | server_target_fetch_policy | 244 server_harden_short_bufsize | server_harden_large_queries | 245 server_do_not_query_address | server_hide_identity | 246 server_hide_version | server_identity | server_version | 247 server_hide_http_user_agent | server_http_user_agent | 248 server_harden_glue | server_module_conf | server_trust_anchor_file | 249 server_trust_anchor | server_val_override_date | server_bogus_ttl | 250 server_val_clean_additional | server_val_permissive_mode | 251 server_incoming_num_tcp | server_msg_buffer_size | 252 server_key_cache_size | server_key_cache_slabs | 253 server_trusted_keys_file | server_val_nsec3_keysize_iterations | 254 server_use_syslog | server_outgoing_interface | server_root_hints | 255 server_do_not_query_localhost | server_cache_max_ttl | 256 server_harden_dnssec_stripped | server_access_control | 257 server_local_zone | server_local_data | server_interface_automatic | 258 server_statistics_interval | server_do_daemonize | 259 server_use_caps_for_id | server_statistics_cumulative | 260 server_outgoing_port_permit | server_outgoing_port_avoid | 261 server_dlv_anchor_file | server_dlv_anchor | server_neg_cache_size | 262 server_harden_referral_path | server_private_address | 263 server_private_domain | server_extended_statistics | 264 server_local_data_ptr | server_jostle_timeout | 265 server_unwanted_reply_threshold | server_log_time_ascii | 266 server_domain_insecure | server_val_sig_skew_min | 267 server_val_sig_skew_max | server_val_max_restart | 268 server_cache_min_ttl | server_val_log_level | 269 server_auto_trust_anchor_file | server_add_holddown | 270 server_del_holddown | server_keep_missing | server_so_rcvbuf | 271 server_edns_buffer_size | server_prefetch | server_prefetch_key | 272 server_so_sndbuf | server_harden_below_nxdomain | server_ignore_cd_flag | 273 server_log_queries | server_log_replies | server_tcp_upstream | server_ssl_upstream | 274 server_log_local_actions | 275 server_ssl_service_key | server_ssl_service_pem | server_ssl_port | 276 server_https_port | server_http_endpoint | server_http_max_streams | 277 server_http_query_buffer_size | server_http_response_buffer_size | 278 server_http_nodelay | server_http_notls_downstream | 279 server_minimal_responses | server_rrset_roundrobin | server_max_udp_size | 280 server_so_reuseport | server_delay_close | server_udp_connect | 281 server_unblock_lan_zones | server_insecure_lan_zones | 282 server_dns64_prefix | server_dns64_synthall | server_dns64_ignore_aaaa | 283 server_nat64_prefix | 284 server_infra_cache_min_rtt | server_infra_cache_max_rtt | server_harden_algo_downgrade | 285 server_ip_transparent | server_ip_ratelimit | server_ratelimit | 286 server_ip_dscp | server_infra_keep_probing | 287 server_ip_ratelimit_slabs | server_ratelimit_slabs | 288 server_ip_ratelimit_size | server_ratelimit_size | 289 server_ratelimit_for_domain | 290 server_ratelimit_below_domain | server_ratelimit_factor | 291 server_ip_ratelimit_factor | server_ratelimit_backoff | 292 server_ip_ratelimit_backoff | server_outbound_msg_retry | 293 server_max_sent_count | server_max_query_restarts | 294 server_send_client_subnet | server_client_subnet_zone | 295 server_client_subnet_always_forward | server_client_subnet_opcode | 296 server_max_client_subnet_ipv4 | server_max_client_subnet_ipv6 | 297 server_min_client_subnet_ipv4 | server_min_client_subnet_ipv6 | 298 server_max_ecs_tree_size_ipv4 | server_max_ecs_tree_size_ipv6 | 299 server_caps_whitelist | server_cache_max_negative_ttl | 300 server_permit_small_holddown | server_qname_minimisation | 301 server_ip_freebind | server_define_tag | server_local_zone_tag | 302 server_disable_dnssec_lame_check | server_access_control_tag | 303 server_local_zone_override | server_access_control_tag_action | 304 server_access_control_tag_data | server_access_control_view | 305 server_interface_action | server_interface_view | server_interface_tag | 306 server_interface_tag_action | server_interface_tag_data | 307 server_qname_minimisation_strict | 308 server_pad_responses | server_pad_responses_block_size | 309 server_pad_queries | server_pad_queries_block_size | 310 server_serve_expired | 311 server_serve_expired_ttl | server_serve_expired_ttl_reset | 312 server_serve_expired_reply_ttl | server_serve_expired_client_timeout | 313 server_ede_serve_expired | server_serve_original_ttl | server_fake_dsa | 314 server_log_identity | server_use_systemd | 315 server_response_ip_tag | server_response_ip | server_response_ip_data | 316 server_shm_enable | server_shm_key | server_fake_sha1 | 317 server_hide_trustanchor | server_trust_anchor_signaling | 318 server_root_key_sentinel | 319 server_ipsecmod_enabled | server_ipsecmod_hook | 320 server_ipsecmod_ignore_bogus | server_ipsecmod_max_ttl | 321 server_ipsecmod_whitelist | server_ipsecmod_strict | 322 server_udp_upstream_without_downstream | server_aggressive_nsec | 323 server_tls_cert_bundle | server_tls_additional_port | server_low_rtt | 324 server_fast_server_permil | server_fast_server_num | server_tls_win_cert | 325 server_tcp_connection_limit | server_log_servfail | server_deny_any | 326 server_unknown_server_time_limit | server_log_tag_queryreply | 327 server_stream_wait_size | server_tls_ciphers | 328 server_tls_ciphersuites | server_tls_session_ticket_keys | 329 server_answer_cookie | server_cookie_secret | server_ip_ratelimit_cookie | 330 server_tls_use_sni | server_edns_client_string | 331 server_edns_client_string_opcode | server_nsid | 332 server_zonemd_permissive_mode | server_max_reuse_tcp_queries | 333 server_tcp_reuse_timeout | server_tcp_auth_query_timeout | 334 server_interface_automatic_ports | server_ede | 335 server_proxy_protocol_port | server_statistics_inhibit_zero | 336 server_harden_unknown_additional | server_disable_edns_do 337 ; 338 stubstart: VAR_STUB_ZONE 339 { 340 struct config_stub* s; 341 OUTYY(("\nP(stub_zone:)\n")); 342 cfg_parser->started_toplevel = 1; 343 s = (struct config_stub*)calloc(1, sizeof(struct config_stub)); 344 if(s) { 345 s->next = cfg_parser->cfg->stubs; 346 cfg_parser->cfg->stubs = s; 347 } else { 348 yyerror("out of memory"); 349 } 350 } 351 ; 352 contents_stub: contents_stub content_stub 353 | ; 354 content_stub: stub_name | stub_host | stub_addr | stub_prime | stub_first | 355 stub_no_cache | stub_ssl_upstream | stub_tcp_upstream 356 ; 357 forwardstart: VAR_FORWARD_ZONE 358 { 359 struct config_stub* s; 360 OUTYY(("\nP(forward_zone:)\n")); 361 cfg_parser->started_toplevel = 1; 362 s = (struct config_stub*)calloc(1, sizeof(struct config_stub)); 363 if(s) { 364 s->next = cfg_parser->cfg->forwards; 365 cfg_parser->cfg->forwards = s; 366 } else { 367 yyerror("out of memory"); 368 } 369 } 370 ; 371 contents_forward: contents_forward content_forward 372 | ; 373 content_forward: forward_name | forward_host | forward_addr | forward_first | 374 forward_no_cache | forward_ssl_upstream | forward_tcp_upstream 375 ; 376 viewstart: VAR_VIEW 377 { 378 struct config_view* s; 379 OUTYY(("\nP(view:)\n")); 380 cfg_parser->started_toplevel = 1; 381 s = (struct config_view*)calloc(1, sizeof(struct config_view)); 382 if(s) { 383 s->next = cfg_parser->cfg->views; 384 if(s->next && !s->next->name) 385 yyerror("view without name"); 386 cfg_parser->cfg->views = s; 387 } else { 388 yyerror("out of memory"); 389 } 390 } 391 ; 392 contents_view: contents_view content_view 393 | ; 394 content_view: view_name | view_local_zone | view_local_data | view_first | 395 view_response_ip | view_response_ip_data | view_local_data_ptr 396 ; 397 authstart: VAR_AUTH_ZONE 398 { 399 struct config_auth* s; 400 OUTYY(("\nP(auth_zone:)\n")); 401 cfg_parser->started_toplevel = 1; 402 s = (struct config_auth*)calloc(1, sizeof(struct config_auth)); 403 if(s) { 404 s->next = cfg_parser->cfg->auths; 405 cfg_parser->cfg->auths = s; 406 /* defaults for auth zone */ 407 s->for_downstream = 1; 408 s->for_upstream = 1; 409 s->fallback_enabled = 0; 410 s->zonemd_check = 0; 411 s->zonemd_reject_absence = 0; 412 s->isrpz = 0; 413 } else { 414 yyerror("out of memory"); 415 } 416 } 417 ; 418 contents_auth: contents_auth content_auth 419 | ; 420 content_auth: auth_name | auth_zonefile | auth_master | auth_url | 421 auth_for_downstream | auth_for_upstream | auth_fallback_enabled | 422 auth_allow_notify | auth_zonemd_check | auth_zonemd_reject_absence 423 ; 424 425 rpz_tag: VAR_TAGS STRING_ARG 426 { 427 uint8_t* bitlist; 428 size_t len = 0; 429 OUTYY(("P(server_local_zone_tag:%s)\n", $2)); 430 bitlist = config_parse_taglist(cfg_parser->cfg, $2, 431 &len); 432 free($2); 433 if(!bitlist) { 434 yyerror("could not parse tags, (define-tag them first)"); 435 } 436 if(bitlist) { 437 cfg_parser->cfg->auths->rpz_taglist = bitlist; 438 cfg_parser->cfg->auths->rpz_taglistlen = len; 439 440 } 441 } 442 ; 443 444 rpz_action_override: VAR_RPZ_ACTION_OVERRIDE STRING_ARG 445 { 446 OUTYY(("P(rpz_action_override:%s)\n", $2)); 447 if(strcmp($2, "nxdomain")!=0 && strcmp($2, "nodata")!=0 && 448 strcmp($2, "passthru")!=0 && strcmp($2, "drop")!=0 && 449 strcmp($2, "cname")!=0 && strcmp($2, "disabled")!=0) { 450 yyerror("rpz-action-override action: expected nxdomain, " 451 "nodata, passthru, drop, cname or disabled"); 452 free($2); 453 cfg_parser->cfg->auths->rpz_action_override = NULL; 454 } 455 else { 456 cfg_parser->cfg->auths->rpz_action_override = $2; 457 } 458 } 459 ; 460 461 rpz_cname_override: VAR_RPZ_CNAME_OVERRIDE STRING_ARG 462 { 463 OUTYY(("P(rpz_cname_override:%s)\n", $2)); 464 free(cfg_parser->cfg->auths->rpz_cname); 465 cfg_parser->cfg->auths->rpz_cname = $2; 466 } 467 ; 468 469 rpz_log: VAR_RPZ_LOG STRING_ARG 470 { 471 OUTYY(("P(rpz_log:%s)\n", $2)); 472 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 473 yyerror("expected yes or no."); 474 else cfg_parser->cfg->auths->rpz_log = (strcmp($2, "yes")==0); 475 free($2); 476 } 477 ; 478 479 rpz_log_name: VAR_RPZ_LOG_NAME STRING_ARG 480 { 481 OUTYY(("P(rpz_log_name:%s)\n", $2)); 482 free(cfg_parser->cfg->auths->rpz_log_name); 483 cfg_parser->cfg->auths->rpz_log_name = $2; 484 } 485 ; 486 rpz_signal_nxdomain_ra: VAR_RPZ_SIGNAL_NXDOMAIN_RA STRING_ARG 487 { 488 OUTYY(("P(rpz_signal_nxdomain_ra:%s)\n", $2)); 489 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 490 yyerror("expected yes or no."); 491 else cfg_parser->cfg->auths->rpz_signal_nxdomain_ra = (strcmp($2, "yes")==0); 492 free($2); 493 } 494 ; 495 496 rpzstart: VAR_RPZ 497 { 498 struct config_auth* s; 499 OUTYY(("\nP(rpz:)\n")); 500 cfg_parser->started_toplevel = 1; 501 s = (struct config_auth*)calloc(1, sizeof(struct config_auth)); 502 if(s) { 503 s->next = cfg_parser->cfg->auths; 504 cfg_parser->cfg->auths = s; 505 /* defaults for RPZ auth zone */ 506 s->for_downstream = 0; 507 s->for_upstream = 0; 508 s->fallback_enabled = 0; 509 s->isrpz = 1; 510 } else { 511 yyerror("out of memory"); 512 } 513 } 514 ; 515 contents_rpz: contents_rpz content_rpz 516 | ; 517 content_rpz: auth_name | auth_zonefile | rpz_tag | auth_master | auth_url | 518 auth_allow_notify | rpz_action_override | rpz_cname_override | 519 rpz_log | rpz_log_name | rpz_signal_nxdomain_ra | auth_for_downstream 520 ; 521 server_num_threads: VAR_NUM_THREADS STRING_ARG 522 { 523 OUTYY(("P(server_num_threads:%s)\n", $2)); 524 if(atoi($2) == 0 && strcmp($2, "0") != 0) 525 yyerror("number expected"); 526 else cfg_parser->cfg->num_threads = atoi($2); 527 free($2); 528 } 529 ; 530 server_verbosity: VAR_VERBOSITY STRING_ARG 531 { 532 OUTYY(("P(server_verbosity:%s)\n", $2)); 533 if(atoi($2) == 0 && strcmp($2, "0") != 0) 534 yyerror("number expected"); 535 else cfg_parser->cfg->verbosity = atoi($2); 536 free($2); 537 } 538 ; 539 server_statistics_interval: VAR_STATISTICS_INTERVAL STRING_ARG 540 { 541 OUTYY(("P(server_statistics_interval:%s)\n", $2)); 542 if(strcmp($2, "") == 0 || strcmp($2, "0") == 0) 543 cfg_parser->cfg->stat_interval = 0; 544 else if(atoi($2) == 0) 545 yyerror("number expected"); 546 else cfg_parser->cfg->stat_interval = atoi($2); 547 free($2); 548 } 549 ; 550 server_statistics_cumulative: VAR_STATISTICS_CUMULATIVE STRING_ARG 551 { 552 OUTYY(("P(server_statistics_cumulative:%s)\n", $2)); 553 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 554 yyerror("expected yes or no."); 555 else cfg_parser->cfg->stat_cumulative = (strcmp($2, "yes")==0); 556 free($2); 557 } 558 ; 559 server_extended_statistics: VAR_EXTENDED_STATISTICS STRING_ARG 560 { 561 OUTYY(("P(server_extended_statistics:%s)\n", $2)); 562 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 563 yyerror("expected yes or no."); 564 else cfg_parser->cfg->stat_extended = (strcmp($2, "yes")==0); 565 free($2); 566 } 567 ; 568 server_statistics_inhibit_zero: VAR_STATISTICS_INHIBIT_ZERO STRING_ARG 569 { 570 OUTYY(("P(server_statistics_inhibit_zero:%s)\n", $2)); 571 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 572 yyerror("expected yes or no."); 573 else cfg_parser->cfg->stat_inhibit_zero = (strcmp($2, "yes")==0); 574 free($2); 575 } 576 ; 577 server_shm_enable: VAR_SHM_ENABLE STRING_ARG 578 { 579 OUTYY(("P(server_shm_enable:%s)\n", $2)); 580 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 581 yyerror("expected yes or no."); 582 else cfg_parser->cfg->shm_enable = (strcmp($2, "yes")==0); 583 free($2); 584 } 585 ; 586 server_shm_key: VAR_SHM_KEY STRING_ARG 587 { 588 OUTYY(("P(server_shm_key:%s)\n", $2)); 589 if(strcmp($2, "") == 0 || strcmp($2, "0") == 0) 590 cfg_parser->cfg->shm_key = 0; 591 else if(atoi($2) == 0) 592 yyerror("number expected"); 593 else cfg_parser->cfg->shm_key = atoi($2); 594 free($2); 595 } 596 ; 597 server_port: VAR_PORT STRING_ARG 598 { 599 OUTYY(("P(server_port:%s)\n", $2)); 600 if(atoi($2) == 0) 601 yyerror("port number expected"); 602 else cfg_parser->cfg->port = atoi($2); 603 free($2); 604 } 605 ; 606 server_send_client_subnet: VAR_SEND_CLIENT_SUBNET STRING_ARG 607 { 608 #ifdef CLIENT_SUBNET 609 OUTYY(("P(server_send_client_subnet:%s)\n", $2)); 610 if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet, $2)) 611 fatal_exit("out of memory adding client-subnet"); 612 #else 613 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 614 free($2); 615 #endif 616 } 617 ; 618 server_client_subnet_zone: VAR_CLIENT_SUBNET_ZONE STRING_ARG 619 { 620 #ifdef CLIENT_SUBNET 621 OUTYY(("P(server_client_subnet_zone:%s)\n", $2)); 622 if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet_zone, 623 $2)) 624 fatal_exit("out of memory adding client-subnet-zone"); 625 #else 626 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 627 free($2); 628 #endif 629 } 630 ; 631 server_client_subnet_always_forward: 632 VAR_CLIENT_SUBNET_ALWAYS_FORWARD STRING_ARG 633 { 634 #ifdef CLIENT_SUBNET 635 OUTYY(("P(server_client_subnet_always_forward:%s)\n", $2)); 636 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 637 yyerror("expected yes or no."); 638 else 639 cfg_parser->cfg->client_subnet_always_forward = 640 (strcmp($2, "yes")==0); 641 #else 642 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 643 #endif 644 free($2); 645 } 646 ; 647 server_client_subnet_opcode: VAR_CLIENT_SUBNET_OPCODE STRING_ARG 648 { 649 #ifdef CLIENT_SUBNET 650 OUTYY(("P(client_subnet_opcode:%s)\n", $2)); 651 OUTYY(("P(Deprecated option, ignoring)\n")); 652 #else 653 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 654 #endif 655 free($2); 656 } 657 ; 658 server_max_client_subnet_ipv4: VAR_MAX_CLIENT_SUBNET_IPV4 STRING_ARG 659 { 660 #ifdef CLIENT_SUBNET 661 OUTYY(("P(max_client_subnet_ipv4:%s)\n", $2)); 662 if(atoi($2) == 0 && strcmp($2, "0") != 0) 663 yyerror("IPv4 subnet length expected"); 664 else if (atoi($2) > 32) 665 cfg_parser->cfg->max_client_subnet_ipv4 = 32; 666 else if (atoi($2) < 0) 667 cfg_parser->cfg->max_client_subnet_ipv4 = 0; 668 else cfg_parser->cfg->max_client_subnet_ipv4 = (uint8_t)atoi($2); 669 #else 670 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 671 #endif 672 free($2); 673 } 674 ; 675 server_max_client_subnet_ipv6: VAR_MAX_CLIENT_SUBNET_IPV6 STRING_ARG 676 { 677 #ifdef CLIENT_SUBNET 678 OUTYY(("P(max_client_subnet_ipv6:%s)\n", $2)); 679 if(atoi($2) == 0 && strcmp($2, "0") != 0) 680 yyerror("Ipv6 subnet length expected"); 681 else if (atoi($2) > 128) 682 cfg_parser->cfg->max_client_subnet_ipv6 = 128; 683 else if (atoi($2) < 0) 684 cfg_parser->cfg->max_client_subnet_ipv6 = 0; 685 else cfg_parser->cfg->max_client_subnet_ipv6 = (uint8_t)atoi($2); 686 #else 687 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 688 #endif 689 free($2); 690 } 691 ; 692 server_min_client_subnet_ipv4: VAR_MIN_CLIENT_SUBNET_IPV4 STRING_ARG 693 { 694 #ifdef CLIENT_SUBNET 695 OUTYY(("P(min_client_subnet_ipv4:%s)\n", $2)); 696 if(atoi($2) == 0 && strcmp($2, "0") != 0) 697 yyerror("IPv4 subnet length expected"); 698 else if (atoi($2) > 32) 699 cfg_parser->cfg->min_client_subnet_ipv4 = 32; 700 else if (atoi($2) < 0) 701 cfg_parser->cfg->min_client_subnet_ipv4 = 0; 702 else cfg_parser->cfg->min_client_subnet_ipv4 = (uint8_t)atoi($2); 703 #else 704 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 705 #endif 706 free($2); 707 } 708 ; 709 server_min_client_subnet_ipv6: VAR_MIN_CLIENT_SUBNET_IPV6 STRING_ARG 710 { 711 #ifdef CLIENT_SUBNET 712 OUTYY(("P(min_client_subnet_ipv6:%s)\n", $2)); 713 if(atoi($2) == 0 && strcmp($2, "0") != 0) 714 yyerror("Ipv6 subnet length expected"); 715 else if (atoi($2) > 128) 716 cfg_parser->cfg->min_client_subnet_ipv6 = 128; 717 else if (atoi($2) < 0) 718 cfg_parser->cfg->min_client_subnet_ipv6 = 0; 719 else cfg_parser->cfg->min_client_subnet_ipv6 = (uint8_t)atoi($2); 720 #else 721 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 722 #endif 723 free($2); 724 } 725 ; 726 server_max_ecs_tree_size_ipv4: VAR_MAX_ECS_TREE_SIZE_IPV4 STRING_ARG 727 { 728 #ifdef CLIENT_SUBNET 729 OUTYY(("P(max_ecs_tree_size_ipv4:%s)\n", $2)); 730 if(atoi($2) == 0 && strcmp($2, "0") != 0) 731 yyerror("IPv4 ECS tree size expected"); 732 else if (atoi($2) < 0) 733 cfg_parser->cfg->max_ecs_tree_size_ipv4 = 0; 734 else cfg_parser->cfg->max_ecs_tree_size_ipv4 = (uint32_t)atoi($2); 735 #else 736 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 737 #endif 738 free($2); 739 } 740 ; 741 server_max_ecs_tree_size_ipv6: VAR_MAX_ECS_TREE_SIZE_IPV6 STRING_ARG 742 { 743 #ifdef CLIENT_SUBNET 744 OUTYY(("P(max_ecs_tree_size_ipv6:%s)\n", $2)); 745 if(atoi($2) == 0 && strcmp($2, "0") != 0) 746 yyerror("IPv6 ECS tree size expected"); 747 else if (atoi($2) < 0) 748 cfg_parser->cfg->max_ecs_tree_size_ipv6 = 0; 749 else cfg_parser->cfg->max_ecs_tree_size_ipv6 = (uint32_t)atoi($2); 750 #else 751 OUTYY(("P(Compiled without edns subnet option, ignoring)\n")); 752 #endif 753 free($2); 754 } 755 ; 756 server_interface: VAR_INTERFACE STRING_ARG 757 { 758 OUTYY(("P(server_interface:%s)\n", $2)); 759 if(cfg_parser->cfg->num_ifs == 0) 760 cfg_parser->cfg->ifs = calloc(1, sizeof(char*)); 761 else cfg_parser->cfg->ifs = realloc(cfg_parser->cfg->ifs, 762 (cfg_parser->cfg->num_ifs+1)*sizeof(char*)); 763 if(!cfg_parser->cfg->ifs) 764 yyerror("out of memory"); 765 else 766 cfg_parser->cfg->ifs[cfg_parser->cfg->num_ifs++] = $2; 767 } 768 ; 769 server_outgoing_interface: VAR_OUTGOING_INTERFACE STRING_ARG 770 { 771 OUTYY(("P(server_outgoing_interface:%s)\n", $2)); 772 if(cfg_parser->cfg->num_out_ifs == 0) 773 cfg_parser->cfg->out_ifs = calloc(1, sizeof(char*)); 774 else cfg_parser->cfg->out_ifs = realloc( 775 cfg_parser->cfg->out_ifs, 776 (cfg_parser->cfg->num_out_ifs+1)*sizeof(char*)); 777 if(!cfg_parser->cfg->out_ifs) 778 yyerror("out of memory"); 779 else 780 cfg_parser->cfg->out_ifs[ 781 cfg_parser->cfg->num_out_ifs++] = $2; 782 } 783 ; 784 server_outgoing_range: VAR_OUTGOING_RANGE STRING_ARG 785 { 786 OUTYY(("P(server_outgoing_range:%s)\n", $2)); 787 if(atoi($2) == 0) 788 yyerror("number expected"); 789 else cfg_parser->cfg->outgoing_num_ports = atoi($2); 790 free($2); 791 } 792 ; 793 server_outgoing_port_permit: VAR_OUTGOING_PORT_PERMIT STRING_ARG 794 { 795 OUTYY(("P(server_outgoing_port_permit:%s)\n", $2)); 796 if(!cfg_mark_ports($2, 1, 797 cfg_parser->cfg->outgoing_avail_ports, 65536)) 798 yyerror("port number or range (\"low-high\") expected"); 799 free($2); 800 } 801 ; 802 server_outgoing_port_avoid: VAR_OUTGOING_PORT_AVOID STRING_ARG 803 { 804 OUTYY(("P(server_outgoing_port_avoid:%s)\n", $2)); 805 if(!cfg_mark_ports($2, 0, 806 cfg_parser->cfg->outgoing_avail_ports, 65536)) 807 yyerror("port number or range (\"low-high\") expected"); 808 free($2); 809 } 810 ; 811 server_outgoing_num_tcp: VAR_OUTGOING_NUM_TCP STRING_ARG 812 { 813 OUTYY(("P(server_outgoing_num_tcp:%s)\n", $2)); 814 if(atoi($2) == 0 && strcmp($2, "0") != 0) 815 yyerror("number expected"); 816 else cfg_parser->cfg->outgoing_num_tcp = atoi($2); 817 free($2); 818 } 819 ; 820 server_incoming_num_tcp: VAR_INCOMING_NUM_TCP STRING_ARG 821 { 822 OUTYY(("P(server_incoming_num_tcp:%s)\n", $2)); 823 if(atoi($2) == 0 && strcmp($2, "0") != 0) 824 yyerror("number expected"); 825 else cfg_parser->cfg->incoming_num_tcp = atoi($2); 826 free($2); 827 } 828 ; 829 server_interface_automatic: VAR_INTERFACE_AUTOMATIC STRING_ARG 830 { 831 OUTYY(("P(server_interface_automatic:%s)\n", $2)); 832 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 833 yyerror("expected yes or no."); 834 else cfg_parser->cfg->if_automatic = (strcmp($2, "yes")==0); 835 free($2); 836 } 837 ; 838 server_interface_automatic_ports: VAR_INTERFACE_AUTOMATIC_PORTS STRING_ARG 839 { 840 OUTYY(("P(server_interface_automatic_ports:%s)\n", $2)); 841 free(cfg_parser->cfg->if_automatic_ports); 842 cfg_parser->cfg->if_automatic_ports = $2; 843 } 844 ; 845 server_do_ip4: VAR_DO_IP4 STRING_ARG 846 { 847 OUTYY(("P(server_do_ip4:%s)\n", $2)); 848 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 849 yyerror("expected yes or no."); 850 else cfg_parser->cfg->do_ip4 = (strcmp($2, "yes")==0); 851 free($2); 852 } 853 ; 854 server_do_ip6: VAR_DO_IP6 STRING_ARG 855 { 856 OUTYY(("P(server_do_ip6:%s)\n", $2)); 857 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 858 yyerror("expected yes or no."); 859 else cfg_parser->cfg->do_ip6 = (strcmp($2, "yes")==0); 860 free($2); 861 } 862 ; 863 server_do_nat64: VAR_DO_NAT64 STRING_ARG 864 { 865 OUTYY(("P(server_do_nat64:%s)\n", $2)); 866 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 867 yyerror("expected yes or no."); 868 else cfg_parser->cfg->do_nat64 = (strcmp($2, "yes")==0); 869 free($2); 870 } 871 ; 872 server_do_udp: VAR_DO_UDP STRING_ARG 873 { 874 OUTYY(("P(server_do_udp:%s)\n", $2)); 875 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 876 yyerror("expected yes or no."); 877 else cfg_parser->cfg->do_udp = (strcmp($2, "yes")==0); 878 free($2); 879 } 880 ; 881 server_do_tcp: VAR_DO_TCP STRING_ARG 882 { 883 OUTYY(("P(server_do_tcp:%s)\n", $2)); 884 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 885 yyerror("expected yes or no."); 886 else cfg_parser->cfg->do_tcp = (strcmp($2, "yes")==0); 887 free($2); 888 } 889 ; 890 server_prefer_ip4: VAR_PREFER_IP4 STRING_ARG 891 { 892 OUTYY(("P(server_prefer_ip4:%s)\n", $2)); 893 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 894 yyerror("expected yes or no."); 895 else cfg_parser->cfg->prefer_ip4 = (strcmp($2, "yes")==0); 896 free($2); 897 } 898 ; 899 server_prefer_ip6: VAR_PREFER_IP6 STRING_ARG 900 { 901 OUTYY(("P(server_prefer_ip6:%s)\n", $2)); 902 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 903 yyerror("expected yes or no."); 904 else cfg_parser->cfg->prefer_ip6 = (strcmp($2, "yes")==0); 905 free($2); 906 } 907 ; 908 server_tcp_mss: VAR_TCP_MSS STRING_ARG 909 { 910 OUTYY(("P(server_tcp_mss:%s)\n", $2)); 911 if(atoi($2) == 0 && strcmp($2, "0") != 0) 912 yyerror("number expected"); 913 else cfg_parser->cfg->tcp_mss = atoi($2); 914 free($2); 915 } 916 ; 917 server_outgoing_tcp_mss: VAR_OUTGOING_TCP_MSS STRING_ARG 918 { 919 OUTYY(("P(server_outgoing_tcp_mss:%s)\n", $2)); 920 if(atoi($2) == 0 && strcmp($2, "0") != 0) 921 yyerror("number expected"); 922 else cfg_parser->cfg->outgoing_tcp_mss = atoi($2); 923 free($2); 924 } 925 ; 926 server_tcp_idle_timeout: VAR_TCP_IDLE_TIMEOUT STRING_ARG 927 { 928 OUTYY(("P(server_tcp_idle_timeout:%s)\n", $2)); 929 if(atoi($2) == 0 && strcmp($2, "0") != 0) 930 yyerror("number expected"); 931 else if (atoi($2) > 120000) 932 cfg_parser->cfg->tcp_idle_timeout = 120000; 933 else if (atoi($2) < 1) 934 cfg_parser->cfg->tcp_idle_timeout = 1; 935 else cfg_parser->cfg->tcp_idle_timeout = atoi($2); 936 free($2); 937 } 938 ; 939 server_max_reuse_tcp_queries: VAR_MAX_REUSE_TCP_QUERIES STRING_ARG 940 { 941 OUTYY(("P(server_max_reuse_tcp_queries:%s)\n", $2)); 942 if(atoi($2) == 0 && strcmp($2, "0") != 0) 943 yyerror("number expected"); 944 else if (atoi($2) < 1) 945 cfg_parser->cfg->max_reuse_tcp_queries = 0; 946 else cfg_parser->cfg->max_reuse_tcp_queries = atoi($2); 947 free($2); 948 } 949 ; 950 server_tcp_reuse_timeout: VAR_TCP_REUSE_TIMEOUT STRING_ARG 951 { 952 OUTYY(("P(server_tcp_reuse_timeout:%s)\n", $2)); 953 if(atoi($2) == 0 && strcmp($2, "0") != 0) 954 yyerror("number expected"); 955 else if (atoi($2) < 1) 956 cfg_parser->cfg->tcp_reuse_timeout = 0; 957 else cfg_parser->cfg->tcp_reuse_timeout = atoi($2); 958 free($2); 959 } 960 ; 961 server_tcp_auth_query_timeout: VAR_TCP_AUTH_QUERY_TIMEOUT STRING_ARG 962 { 963 OUTYY(("P(server_tcp_auth_query_timeout:%s)\n", $2)); 964 if(atoi($2) == 0 && strcmp($2, "0") != 0) 965 yyerror("number expected"); 966 else if (atoi($2) < 1) 967 cfg_parser->cfg->tcp_auth_query_timeout = 0; 968 else cfg_parser->cfg->tcp_auth_query_timeout = atoi($2); 969 free($2); 970 } 971 ; 972 server_tcp_keepalive: VAR_EDNS_TCP_KEEPALIVE STRING_ARG 973 { 974 OUTYY(("P(server_tcp_keepalive:%s)\n", $2)); 975 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 976 yyerror("expected yes or no."); 977 else cfg_parser->cfg->do_tcp_keepalive = (strcmp($2, "yes")==0); 978 free($2); 979 } 980 ; 981 server_tcp_keepalive_timeout: VAR_EDNS_TCP_KEEPALIVE_TIMEOUT STRING_ARG 982 { 983 OUTYY(("P(server_tcp_keepalive_timeout:%s)\n", $2)); 984 if(atoi($2) == 0 && strcmp($2, "0") != 0) 985 yyerror("number expected"); 986 else if (atoi($2) > 6553500) 987 cfg_parser->cfg->tcp_keepalive_timeout = 6553500; 988 else if (atoi($2) < 1) 989 cfg_parser->cfg->tcp_keepalive_timeout = 0; 990 else cfg_parser->cfg->tcp_keepalive_timeout = atoi($2); 991 free($2); 992 } 993 ; 994 server_sock_queue_timeout: VAR_SOCK_QUEUE_TIMEOUT STRING_ARG 995 { 996 OUTYY(("P(server_sock_queue_timeout:%s)\n", $2)); 997 if(atoi($2) == 0 && strcmp($2, "0") != 0) 998 yyerror("number expected"); 999 else if (atoi($2) > 6553500) 1000 cfg_parser->cfg->sock_queue_timeout = 6553500; 1001 else if (atoi($2) < 1) 1002 cfg_parser->cfg->sock_queue_timeout = 0; 1003 else cfg_parser->cfg->sock_queue_timeout = atoi($2); 1004 free($2); 1005 } 1006 ; 1007 server_tcp_upstream: VAR_TCP_UPSTREAM STRING_ARG 1008 { 1009 OUTYY(("P(server_tcp_upstream:%s)\n", $2)); 1010 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1011 yyerror("expected yes or no."); 1012 else cfg_parser->cfg->tcp_upstream = (strcmp($2, "yes")==0); 1013 free($2); 1014 } 1015 ; 1016 server_udp_upstream_without_downstream: VAR_UDP_UPSTREAM_WITHOUT_DOWNSTREAM STRING_ARG 1017 { 1018 OUTYY(("P(server_udp_upstream_without_downstream:%s)\n", $2)); 1019 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1020 yyerror("expected yes or no."); 1021 else cfg_parser->cfg->udp_upstream_without_downstream = (strcmp($2, "yes")==0); 1022 free($2); 1023 } 1024 ; 1025 server_ssl_upstream: VAR_SSL_UPSTREAM STRING_ARG 1026 { 1027 OUTYY(("P(server_ssl_upstream:%s)\n", $2)); 1028 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1029 yyerror("expected yes or no."); 1030 else cfg_parser->cfg->ssl_upstream = (strcmp($2, "yes")==0); 1031 free($2); 1032 } 1033 ; 1034 server_ssl_service_key: VAR_SSL_SERVICE_KEY STRING_ARG 1035 { 1036 OUTYY(("P(server_ssl_service_key:%s)\n", $2)); 1037 free(cfg_parser->cfg->ssl_service_key); 1038 cfg_parser->cfg->ssl_service_key = $2; 1039 } 1040 ; 1041 server_ssl_service_pem: VAR_SSL_SERVICE_PEM STRING_ARG 1042 { 1043 OUTYY(("P(server_ssl_service_pem:%s)\n", $2)); 1044 free(cfg_parser->cfg->ssl_service_pem); 1045 cfg_parser->cfg->ssl_service_pem = $2; 1046 } 1047 ; 1048 server_ssl_port: VAR_SSL_PORT STRING_ARG 1049 { 1050 OUTYY(("P(server_ssl_port:%s)\n", $2)); 1051 if(atoi($2) == 0) 1052 yyerror("port number expected"); 1053 else cfg_parser->cfg->ssl_port = atoi($2); 1054 free($2); 1055 } 1056 ; 1057 server_tls_cert_bundle: VAR_TLS_CERT_BUNDLE STRING_ARG 1058 { 1059 OUTYY(("P(server_tls_cert_bundle:%s)\n", $2)); 1060 free(cfg_parser->cfg->tls_cert_bundle); 1061 cfg_parser->cfg->tls_cert_bundle = $2; 1062 } 1063 ; 1064 server_tls_win_cert: VAR_TLS_WIN_CERT STRING_ARG 1065 { 1066 OUTYY(("P(server_tls_win_cert:%s)\n", $2)); 1067 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1068 yyerror("expected yes or no."); 1069 else cfg_parser->cfg->tls_win_cert = (strcmp($2, "yes")==0); 1070 free($2); 1071 } 1072 ; 1073 server_tls_additional_port: VAR_TLS_ADDITIONAL_PORT STRING_ARG 1074 { 1075 OUTYY(("P(server_tls_additional_port:%s)\n", $2)); 1076 if(!cfg_strlist_insert(&cfg_parser->cfg->tls_additional_port, 1077 $2)) 1078 yyerror("out of memory"); 1079 } 1080 ; 1081 server_tls_ciphers: VAR_TLS_CIPHERS STRING_ARG 1082 { 1083 OUTYY(("P(server_tls_ciphers:%s)\n", $2)); 1084 free(cfg_parser->cfg->tls_ciphers); 1085 cfg_parser->cfg->tls_ciphers = $2; 1086 } 1087 ; 1088 server_tls_ciphersuites: VAR_TLS_CIPHERSUITES STRING_ARG 1089 { 1090 OUTYY(("P(server_tls_ciphersuites:%s)\n", $2)); 1091 free(cfg_parser->cfg->tls_ciphersuites); 1092 cfg_parser->cfg->tls_ciphersuites = $2; 1093 } 1094 ; 1095 server_tls_session_ticket_keys: VAR_TLS_SESSION_TICKET_KEYS STRING_ARG 1096 { 1097 OUTYY(("P(server_tls_session_ticket_keys:%s)\n", $2)); 1098 if(!cfg_strlist_append(&cfg_parser->cfg->tls_session_ticket_keys, 1099 $2)) 1100 yyerror("out of memory"); 1101 } 1102 ; 1103 server_tls_use_sni: VAR_TLS_USE_SNI STRING_ARG 1104 { 1105 OUTYY(("P(server_tls_use_sni:%s)\n", $2)); 1106 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1107 yyerror("expected yes or no."); 1108 else cfg_parser->cfg->tls_use_sni = (strcmp($2, "yes")==0); 1109 free($2); 1110 } 1111 ; 1112 server_https_port: VAR_HTTPS_PORT STRING_ARG 1113 { 1114 OUTYY(("P(server_https_port:%s)\n", $2)); 1115 if(atoi($2) == 0) 1116 yyerror("port number expected"); 1117 else cfg_parser->cfg->https_port = atoi($2); 1118 free($2); 1119 }; 1120 server_http_endpoint: VAR_HTTP_ENDPOINT STRING_ARG 1121 { 1122 OUTYY(("P(server_http_endpoint:%s)\n", $2)); 1123 free(cfg_parser->cfg->http_endpoint); 1124 if($2 && $2[0] != '/') { 1125 cfg_parser->cfg->http_endpoint = malloc(strlen($2)+2); 1126 if(!cfg_parser->cfg->http_endpoint) 1127 yyerror("out of memory"); 1128 cfg_parser->cfg->http_endpoint[0] = '/'; 1129 memmove(cfg_parser->cfg->http_endpoint+1, $2, 1130 strlen($2)+1); 1131 free($2); 1132 } else { 1133 cfg_parser->cfg->http_endpoint = $2; 1134 } 1135 }; 1136 server_http_max_streams: VAR_HTTP_MAX_STREAMS STRING_ARG 1137 { 1138 OUTYY(("P(server_http_max_streams:%s)\n", $2)); 1139 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1140 yyerror("number expected"); 1141 else cfg_parser->cfg->http_max_streams = atoi($2); 1142 free($2); 1143 }; 1144 server_http_query_buffer_size: VAR_HTTP_QUERY_BUFFER_SIZE STRING_ARG 1145 { 1146 OUTYY(("P(server_http_query_buffer_size:%s)\n", $2)); 1147 if(!cfg_parse_memsize($2, 1148 &cfg_parser->cfg->http_query_buffer_size)) 1149 yyerror("memory size expected"); 1150 free($2); 1151 }; 1152 server_http_response_buffer_size: VAR_HTTP_RESPONSE_BUFFER_SIZE STRING_ARG 1153 { 1154 OUTYY(("P(server_http_response_buffer_size:%s)\n", $2)); 1155 if(!cfg_parse_memsize($2, 1156 &cfg_parser->cfg->http_response_buffer_size)) 1157 yyerror("memory size expected"); 1158 free($2); 1159 }; 1160 server_http_nodelay: VAR_HTTP_NODELAY STRING_ARG 1161 { 1162 OUTYY(("P(server_http_nodelay:%s)\n", $2)); 1163 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1164 yyerror("expected yes or no."); 1165 else cfg_parser->cfg->http_nodelay = (strcmp($2, "yes")==0); 1166 free($2); 1167 }; 1168 server_http_notls_downstream: VAR_HTTP_NOTLS_DOWNSTREAM STRING_ARG 1169 { 1170 OUTYY(("P(server_http_notls_downstream:%s)\n", $2)); 1171 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1172 yyerror("expected yes or no."); 1173 else cfg_parser->cfg->http_notls_downstream = (strcmp($2, "yes")==0); 1174 free($2); 1175 }; 1176 server_use_systemd: VAR_USE_SYSTEMD STRING_ARG 1177 { 1178 OUTYY(("P(server_use_systemd:%s)\n", $2)); 1179 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1180 yyerror("expected yes or no."); 1181 else cfg_parser->cfg->use_systemd = (strcmp($2, "yes")==0); 1182 free($2); 1183 } 1184 ; 1185 server_do_daemonize: VAR_DO_DAEMONIZE STRING_ARG 1186 { 1187 OUTYY(("P(server_do_daemonize:%s)\n", $2)); 1188 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1189 yyerror("expected yes or no."); 1190 else cfg_parser->cfg->do_daemonize = (strcmp($2, "yes")==0); 1191 free($2); 1192 } 1193 ; 1194 server_use_syslog: VAR_USE_SYSLOG STRING_ARG 1195 { 1196 OUTYY(("P(server_use_syslog:%s)\n", $2)); 1197 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1198 yyerror("expected yes or no."); 1199 else cfg_parser->cfg->use_syslog = (strcmp($2, "yes")==0); 1200 #if !defined(HAVE_SYSLOG_H) && !defined(UB_ON_WINDOWS) 1201 if(strcmp($2, "yes") == 0) 1202 yyerror("no syslog services are available. " 1203 "(reconfigure and compile to add)"); 1204 #endif 1205 free($2); 1206 } 1207 ; 1208 server_log_time_ascii: VAR_LOG_TIME_ASCII STRING_ARG 1209 { 1210 OUTYY(("P(server_log_time_ascii:%s)\n", $2)); 1211 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1212 yyerror("expected yes or no."); 1213 else cfg_parser->cfg->log_time_ascii = (strcmp($2, "yes")==0); 1214 free($2); 1215 } 1216 ; 1217 server_log_queries: VAR_LOG_QUERIES STRING_ARG 1218 { 1219 OUTYY(("P(server_log_queries:%s)\n", $2)); 1220 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1221 yyerror("expected yes or no."); 1222 else cfg_parser->cfg->log_queries = (strcmp($2, "yes")==0); 1223 free($2); 1224 } 1225 ; 1226 server_log_replies: VAR_LOG_REPLIES STRING_ARG 1227 { 1228 OUTYY(("P(server_log_replies:%s)\n", $2)); 1229 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1230 yyerror("expected yes or no."); 1231 else cfg_parser->cfg->log_replies = (strcmp($2, "yes")==0); 1232 free($2); 1233 } 1234 ; 1235 server_log_tag_queryreply: VAR_LOG_TAG_QUERYREPLY STRING_ARG 1236 { 1237 OUTYY(("P(server_log_tag_queryreply:%s)\n", $2)); 1238 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1239 yyerror("expected yes or no."); 1240 else cfg_parser->cfg->log_tag_queryreply = (strcmp($2, "yes")==0); 1241 free($2); 1242 } 1243 ; 1244 server_log_servfail: VAR_LOG_SERVFAIL STRING_ARG 1245 { 1246 OUTYY(("P(server_log_servfail:%s)\n", $2)); 1247 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1248 yyerror("expected yes or no."); 1249 else cfg_parser->cfg->log_servfail = (strcmp($2, "yes")==0); 1250 free($2); 1251 } 1252 ; 1253 server_log_local_actions: VAR_LOG_LOCAL_ACTIONS STRING_ARG 1254 { 1255 OUTYY(("P(server_log_local_actions:%s)\n", $2)); 1256 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1257 yyerror("expected yes or no."); 1258 else cfg_parser->cfg->log_local_actions = (strcmp($2, "yes")==0); 1259 free($2); 1260 } 1261 ; 1262 server_chroot: VAR_CHROOT STRING_ARG 1263 { 1264 OUTYY(("P(server_chroot:%s)\n", $2)); 1265 free(cfg_parser->cfg->chrootdir); 1266 cfg_parser->cfg->chrootdir = $2; 1267 } 1268 ; 1269 server_username: VAR_USERNAME STRING_ARG 1270 { 1271 OUTYY(("P(server_username:%s)\n", $2)); 1272 free(cfg_parser->cfg->username); 1273 cfg_parser->cfg->username = $2; 1274 } 1275 ; 1276 server_directory: VAR_DIRECTORY STRING_ARG 1277 { 1278 OUTYY(("P(server_directory:%s)\n", $2)); 1279 free(cfg_parser->cfg->directory); 1280 cfg_parser->cfg->directory = $2; 1281 /* change there right away for includes relative to this */ 1282 if($2[0]) { 1283 char* d; 1284 #ifdef UB_ON_WINDOWS 1285 w_config_adjust_directory(cfg_parser->cfg); 1286 #endif 1287 d = cfg_parser->cfg->directory; 1288 /* adjust directory if we have already chroot, 1289 * like, we reread after sighup */ 1290 if(cfg_parser->chroot && cfg_parser->chroot[0] && 1291 strncmp(d, cfg_parser->chroot, strlen( 1292 cfg_parser->chroot)) == 0) 1293 d += strlen(cfg_parser->chroot); 1294 if(d[0]) { 1295 if(chdir(d)) 1296 log_err("cannot chdir to directory: %s (%s)", 1297 d, strerror(errno)); 1298 } 1299 } 1300 } 1301 ; 1302 server_logfile: VAR_LOGFILE STRING_ARG 1303 { 1304 OUTYY(("P(server_logfile:%s)\n", $2)); 1305 free(cfg_parser->cfg->logfile); 1306 cfg_parser->cfg->logfile = $2; 1307 cfg_parser->cfg->use_syslog = 0; 1308 } 1309 ; 1310 server_pidfile: VAR_PIDFILE STRING_ARG 1311 { 1312 OUTYY(("P(server_pidfile:%s)\n", $2)); 1313 free(cfg_parser->cfg->pidfile); 1314 cfg_parser->cfg->pidfile = $2; 1315 } 1316 ; 1317 server_root_hints: VAR_ROOT_HINTS STRING_ARG 1318 { 1319 OUTYY(("P(server_root_hints:%s)\n", $2)); 1320 if(!cfg_strlist_insert(&cfg_parser->cfg->root_hints, $2)) 1321 yyerror("out of memory"); 1322 } 1323 ; 1324 server_dlv_anchor_file: VAR_DLV_ANCHOR_FILE STRING_ARG 1325 { 1326 OUTYY(("P(server_dlv_anchor_file:%s)\n", $2)); 1327 log_warn("option dlv-anchor-file ignored: DLV is decommissioned"); 1328 free($2); 1329 } 1330 ; 1331 server_dlv_anchor: VAR_DLV_ANCHOR STRING_ARG 1332 { 1333 OUTYY(("P(server_dlv_anchor:%s)\n", $2)); 1334 log_warn("option dlv-anchor ignored: DLV is decommissioned"); 1335 free($2); 1336 } 1337 ; 1338 server_auto_trust_anchor_file: VAR_AUTO_TRUST_ANCHOR_FILE STRING_ARG 1339 { 1340 OUTYY(("P(server_auto_trust_anchor_file:%s)\n", $2)); 1341 if(!cfg_strlist_insert(&cfg_parser->cfg-> 1342 auto_trust_anchor_file_list, $2)) 1343 yyerror("out of memory"); 1344 } 1345 ; 1346 server_trust_anchor_file: VAR_TRUST_ANCHOR_FILE STRING_ARG 1347 { 1348 OUTYY(("P(server_trust_anchor_file:%s)\n", $2)); 1349 if(!cfg_strlist_insert(&cfg_parser->cfg-> 1350 trust_anchor_file_list, $2)) 1351 yyerror("out of memory"); 1352 } 1353 ; 1354 server_trusted_keys_file: VAR_TRUSTED_KEYS_FILE STRING_ARG 1355 { 1356 OUTYY(("P(server_trusted_keys_file:%s)\n", $2)); 1357 if(!cfg_strlist_insert(&cfg_parser->cfg-> 1358 trusted_keys_file_list, $2)) 1359 yyerror("out of memory"); 1360 } 1361 ; 1362 server_trust_anchor: VAR_TRUST_ANCHOR STRING_ARG 1363 { 1364 OUTYY(("P(server_trust_anchor:%s)\n", $2)); 1365 if(!cfg_strlist_insert(&cfg_parser->cfg->trust_anchor_list, $2)) 1366 yyerror("out of memory"); 1367 } 1368 ; 1369 server_trust_anchor_signaling: VAR_TRUST_ANCHOR_SIGNALING STRING_ARG 1370 { 1371 OUTYY(("P(server_trust_anchor_signaling:%s)\n", $2)); 1372 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1373 yyerror("expected yes or no."); 1374 else 1375 cfg_parser->cfg->trust_anchor_signaling = 1376 (strcmp($2, "yes")==0); 1377 free($2); 1378 } 1379 ; 1380 server_root_key_sentinel: VAR_ROOT_KEY_SENTINEL STRING_ARG 1381 { 1382 OUTYY(("P(server_root_key_sentinel:%s)\n", $2)); 1383 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1384 yyerror("expected yes or no."); 1385 else 1386 cfg_parser->cfg->root_key_sentinel = 1387 (strcmp($2, "yes")==0); 1388 free($2); 1389 } 1390 ; 1391 server_domain_insecure: VAR_DOMAIN_INSECURE STRING_ARG 1392 { 1393 OUTYY(("P(server_domain_insecure:%s)\n", $2)); 1394 if(!cfg_strlist_insert(&cfg_parser->cfg->domain_insecure, $2)) 1395 yyerror("out of memory"); 1396 } 1397 ; 1398 server_hide_identity: VAR_HIDE_IDENTITY STRING_ARG 1399 { 1400 OUTYY(("P(server_hide_identity:%s)\n", $2)); 1401 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1402 yyerror("expected yes or no."); 1403 else cfg_parser->cfg->hide_identity = (strcmp($2, "yes")==0); 1404 free($2); 1405 } 1406 ; 1407 server_hide_version: VAR_HIDE_VERSION STRING_ARG 1408 { 1409 OUTYY(("P(server_hide_version:%s)\n", $2)); 1410 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1411 yyerror("expected yes or no."); 1412 else cfg_parser->cfg->hide_version = (strcmp($2, "yes")==0); 1413 free($2); 1414 } 1415 ; 1416 server_hide_trustanchor: VAR_HIDE_TRUSTANCHOR STRING_ARG 1417 { 1418 OUTYY(("P(server_hide_trustanchor:%s)\n", $2)); 1419 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1420 yyerror("expected yes or no."); 1421 else cfg_parser->cfg->hide_trustanchor = (strcmp($2, "yes")==0); 1422 free($2); 1423 } 1424 ; 1425 server_hide_http_user_agent: VAR_HIDE_HTTP_USER_AGENT STRING_ARG 1426 { 1427 OUTYY(("P(server_hide_user_agent:%s)\n", $2)); 1428 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1429 yyerror("expected yes or no."); 1430 else cfg_parser->cfg->hide_http_user_agent = (strcmp($2, "yes")==0); 1431 free($2); 1432 } 1433 ; 1434 server_identity: VAR_IDENTITY STRING_ARG 1435 { 1436 OUTYY(("P(server_identity:%s)\n", $2)); 1437 free(cfg_parser->cfg->identity); 1438 cfg_parser->cfg->identity = $2; 1439 } 1440 ; 1441 server_version: VAR_VERSION STRING_ARG 1442 { 1443 OUTYY(("P(server_version:%s)\n", $2)); 1444 free(cfg_parser->cfg->version); 1445 cfg_parser->cfg->version = $2; 1446 } 1447 ; 1448 server_http_user_agent: VAR_HTTP_USER_AGENT STRING_ARG 1449 { 1450 OUTYY(("P(server_http_user_agent:%s)\n", $2)); 1451 free(cfg_parser->cfg->http_user_agent); 1452 cfg_parser->cfg->http_user_agent = $2; 1453 } 1454 ; 1455 server_nsid: VAR_NSID STRING_ARG 1456 { 1457 OUTYY(("P(server_nsid:%s)\n", $2)); 1458 free(cfg_parser->cfg->nsid_cfg_str); 1459 cfg_parser->cfg->nsid_cfg_str = $2; 1460 free(cfg_parser->cfg->nsid); 1461 cfg_parser->cfg->nsid = NULL; 1462 cfg_parser->cfg->nsid_len = 0; 1463 if (*$2 == 0) 1464 ; /* pass; empty string is not setting nsid */ 1465 else if (!(cfg_parser->cfg->nsid = cfg_parse_nsid( 1466 $2, &cfg_parser->cfg->nsid_len))) 1467 yyerror("the NSID must be either a hex string or an " 1468 "ascii character string prepended with ascii_."); 1469 } 1470 ; 1471 server_so_rcvbuf: VAR_SO_RCVBUF STRING_ARG 1472 { 1473 OUTYY(("P(server_so_rcvbuf:%s)\n", $2)); 1474 if(!cfg_parse_memsize($2, &cfg_parser->cfg->so_rcvbuf)) 1475 yyerror("buffer size expected"); 1476 free($2); 1477 } 1478 ; 1479 server_so_sndbuf: VAR_SO_SNDBUF STRING_ARG 1480 { 1481 OUTYY(("P(server_so_sndbuf:%s)\n", $2)); 1482 if(!cfg_parse_memsize($2, &cfg_parser->cfg->so_sndbuf)) 1483 yyerror("buffer size expected"); 1484 free($2); 1485 } 1486 ; 1487 server_so_reuseport: VAR_SO_REUSEPORT STRING_ARG 1488 { 1489 OUTYY(("P(server_so_reuseport:%s)\n", $2)); 1490 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1491 yyerror("expected yes or no."); 1492 else cfg_parser->cfg->so_reuseport = 1493 (strcmp($2, "yes")==0); 1494 free($2); 1495 } 1496 ; 1497 server_ip_transparent: VAR_IP_TRANSPARENT STRING_ARG 1498 { 1499 OUTYY(("P(server_ip_transparent:%s)\n", $2)); 1500 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1501 yyerror("expected yes or no."); 1502 else cfg_parser->cfg->ip_transparent = 1503 (strcmp($2, "yes")==0); 1504 free($2); 1505 } 1506 ; 1507 server_ip_freebind: VAR_IP_FREEBIND STRING_ARG 1508 { 1509 OUTYY(("P(server_ip_freebind:%s)\n", $2)); 1510 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1511 yyerror("expected yes or no."); 1512 else cfg_parser->cfg->ip_freebind = 1513 (strcmp($2, "yes")==0); 1514 free($2); 1515 } 1516 ; 1517 server_ip_dscp: VAR_IP_DSCP STRING_ARG 1518 { 1519 OUTYY(("P(server_ip_dscp:%s)\n", $2)); 1520 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1521 yyerror("number expected"); 1522 else if (atoi($2) > 63) 1523 yyerror("value too large (max 63)"); 1524 else if (atoi($2) < 0) 1525 yyerror("value too small (min 0)"); 1526 else 1527 cfg_parser->cfg->ip_dscp = atoi($2); 1528 free($2); 1529 } 1530 ; 1531 server_stream_wait_size: VAR_STREAM_WAIT_SIZE STRING_ARG 1532 { 1533 OUTYY(("P(server_stream_wait_size:%s)\n", $2)); 1534 if(!cfg_parse_memsize($2, &cfg_parser->cfg->stream_wait_size)) 1535 yyerror("memory size expected"); 1536 free($2); 1537 } 1538 ; 1539 server_edns_buffer_size: VAR_EDNS_BUFFER_SIZE STRING_ARG 1540 { 1541 OUTYY(("P(server_edns_buffer_size:%s)\n", $2)); 1542 if(atoi($2) == 0) 1543 yyerror("number expected"); 1544 else if (atoi($2) < 12) 1545 yyerror("edns buffer size too small"); 1546 else if (atoi($2) > 65535) 1547 cfg_parser->cfg->edns_buffer_size = 65535; 1548 else cfg_parser->cfg->edns_buffer_size = atoi($2); 1549 free($2); 1550 } 1551 ; 1552 server_msg_buffer_size: VAR_MSG_BUFFER_SIZE STRING_ARG 1553 { 1554 OUTYY(("P(server_msg_buffer_size:%s)\n", $2)); 1555 if(atoi($2) == 0) 1556 yyerror("number expected"); 1557 else if (atoi($2) < 4096) 1558 yyerror("message buffer size too small (use 4096)"); 1559 else cfg_parser->cfg->msg_buffer_size = atoi($2); 1560 free($2); 1561 } 1562 ; 1563 server_msg_cache_size: VAR_MSG_CACHE_SIZE STRING_ARG 1564 { 1565 OUTYY(("P(server_msg_cache_size:%s)\n", $2)); 1566 if(!cfg_parse_memsize($2, &cfg_parser->cfg->msg_cache_size)) 1567 yyerror("memory size expected"); 1568 free($2); 1569 } 1570 ; 1571 server_msg_cache_slabs: VAR_MSG_CACHE_SLABS STRING_ARG 1572 { 1573 OUTYY(("P(server_msg_cache_slabs:%s)\n", $2)); 1574 if(atoi($2) == 0) { 1575 yyerror("number expected"); 1576 } else { 1577 cfg_parser->cfg->msg_cache_slabs = atoi($2); 1578 if(!is_pow2(cfg_parser->cfg->msg_cache_slabs)) 1579 yyerror("must be a power of 2"); 1580 } 1581 free($2); 1582 } 1583 ; 1584 server_num_queries_per_thread: VAR_NUM_QUERIES_PER_THREAD STRING_ARG 1585 { 1586 OUTYY(("P(server_num_queries_per_thread:%s)\n", $2)); 1587 if(atoi($2) == 0) 1588 yyerror("number expected"); 1589 else cfg_parser->cfg->num_queries_per_thread = atoi($2); 1590 free($2); 1591 } 1592 ; 1593 server_jostle_timeout: VAR_JOSTLE_TIMEOUT STRING_ARG 1594 { 1595 OUTYY(("P(server_jostle_timeout:%s)\n", $2)); 1596 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1597 yyerror("number expected"); 1598 else cfg_parser->cfg->jostle_time = atoi($2); 1599 free($2); 1600 } 1601 ; 1602 server_delay_close: VAR_DELAY_CLOSE STRING_ARG 1603 { 1604 OUTYY(("P(server_delay_close:%s)\n", $2)); 1605 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1606 yyerror("number expected"); 1607 else cfg_parser->cfg->delay_close = atoi($2); 1608 free($2); 1609 } 1610 ; 1611 server_udp_connect: VAR_UDP_CONNECT STRING_ARG 1612 { 1613 OUTYY(("P(server_udp_connect:%s)\n", $2)); 1614 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1615 yyerror("expected yes or no."); 1616 else cfg_parser->cfg->udp_connect = (strcmp($2, "yes")==0); 1617 free($2); 1618 } 1619 ; 1620 server_unblock_lan_zones: VAR_UNBLOCK_LAN_ZONES STRING_ARG 1621 { 1622 OUTYY(("P(server_unblock_lan_zones:%s)\n", $2)); 1623 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1624 yyerror("expected yes or no."); 1625 else cfg_parser->cfg->unblock_lan_zones = 1626 (strcmp($2, "yes")==0); 1627 free($2); 1628 } 1629 ; 1630 server_insecure_lan_zones: VAR_INSECURE_LAN_ZONES STRING_ARG 1631 { 1632 OUTYY(("P(server_insecure_lan_zones:%s)\n", $2)); 1633 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1634 yyerror("expected yes or no."); 1635 else cfg_parser->cfg->insecure_lan_zones = 1636 (strcmp($2, "yes")==0); 1637 free($2); 1638 } 1639 ; 1640 server_rrset_cache_size: VAR_RRSET_CACHE_SIZE STRING_ARG 1641 { 1642 OUTYY(("P(server_rrset_cache_size:%s)\n", $2)); 1643 if(!cfg_parse_memsize($2, &cfg_parser->cfg->rrset_cache_size)) 1644 yyerror("memory size expected"); 1645 free($2); 1646 } 1647 ; 1648 server_rrset_cache_slabs: VAR_RRSET_CACHE_SLABS STRING_ARG 1649 { 1650 OUTYY(("P(server_rrset_cache_slabs:%s)\n", $2)); 1651 if(atoi($2) == 0) { 1652 yyerror("number expected"); 1653 } else { 1654 cfg_parser->cfg->rrset_cache_slabs = atoi($2); 1655 if(!is_pow2(cfg_parser->cfg->rrset_cache_slabs)) 1656 yyerror("must be a power of 2"); 1657 } 1658 free($2); 1659 } 1660 ; 1661 server_infra_host_ttl: VAR_INFRA_HOST_TTL STRING_ARG 1662 { 1663 OUTYY(("P(server_infra_host_ttl:%s)\n", $2)); 1664 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1665 yyerror("number expected"); 1666 else cfg_parser->cfg->host_ttl = atoi($2); 1667 free($2); 1668 } 1669 ; 1670 server_infra_lame_ttl: VAR_INFRA_LAME_TTL STRING_ARG 1671 { 1672 OUTYY(("P(server_infra_lame_ttl:%s)\n", $2)); 1673 verbose(VERB_DETAIL, "ignored infra-lame-ttl: %s (option " 1674 "removed, use infra-host-ttl)", $2); 1675 free($2); 1676 } 1677 ; 1678 server_infra_cache_numhosts: VAR_INFRA_CACHE_NUMHOSTS STRING_ARG 1679 { 1680 OUTYY(("P(server_infra_cache_numhosts:%s)\n", $2)); 1681 if(atoi($2) == 0) 1682 yyerror("number expected"); 1683 else cfg_parser->cfg->infra_cache_numhosts = atoi($2); 1684 free($2); 1685 } 1686 ; 1687 server_infra_cache_lame_size: VAR_INFRA_CACHE_LAME_SIZE STRING_ARG 1688 { 1689 OUTYY(("P(server_infra_cache_lame_size:%s)\n", $2)); 1690 verbose(VERB_DETAIL, "ignored infra-cache-lame-size: %s " 1691 "(option removed, use infra-cache-numhosts)", $2); 1692 free($2); 1693 } 1694 ; 1695 server_infra_cache_slabs: VAR_INFRA_CACHE_SLABS STRING_ARG 1696 { 1697 OUTYY(("P(server_infra_cache_slabs:%s)\n", $2)); 1698 if(atoi($2) == 0) { 1699 yyerror("number expected"); 1700 } else { 1701 cfg_parser->cfg->infra_cache_slabs = atoi($2); 1702 if(!is_pow2(cfg_parser->cfg->infra_cache_slabs)) 1703 yyerror("must be a power of 2"); 1704 } 1705 free($2); 1706 } 1707 ; 1708 server_infra_cache_min_rtt: VAR_INFRA_CACHE_MIN_RTT STRING_ARG 1709 { 1710 OUTYY(("P(server_infra_cache_min_rtt:%s)\n", $2)); 1711 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1712 yyerror("number expected"); 1713 else cfg_parser->cfg->infra_cache_min_rtt = atoi($2); 1714 free($2); 1715 } 1716 ; 1717 server_infra_cache_max_rtt: VAR_INFRA_CACHE_MAX_RTT STRING_ARG 1718 { 1719 OUTYY(("P(server_infra_cache_max_rtt:%s)\n", $2)); 1720 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1721 yyerror("number expected"); 1722 else cfg_parser->cfg->infra_cache_max_rtt = atoi($2); 1723 free($2); 1724 } 1725 ; 1726 server_infra_keep_probing: VAR_INFRA_KEEP_PROBING STRING_ARG 1727 { 1728 OUTYY(("P(server_infra_keep_probing:%s)\n", $2)); 1729 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1730 yyerror("expected yes or no."); 1731 else cfg_parser->cfg->infra_keep_probing = 1732 (strcmp($2, "yes")==0); 1733 free($2); 1734 } 1735 ; 1736 server_target_fetch_policy: VAR_TARGET_FETCH_POLICY STRING_ARG 1737 { 1738 OUTYY(("P(server_target_fetch_policy:%s)\n", $2)); 1739 free(cfg_parser->cfg->target_fetch_policy); 1740 cfg_parser->cfg->target_fetch_policy = $2; 1741 } 1742 ; 1743 server_harden_short_bufsize: VAR_HARDEN_SHORT_BUFSIZE STRING_ARG 1744 { 1745 OUTYY(("P(server_harden_short_bufsize:%s)\n", $2)); 1746 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1747 yyerror("expected yes or no."); 1748 else cfg_parser->cfg->harden_short_bufsize = 1749 (strcmp($2, "yes")==0); 1750 free($2); 1751 } 1752 ; 1753 server_harden_large_queries: VAR_HARDEN_LARGE_QUERIES STRING_ARG 1754 { 1755 OUTYY(("P(server_harden_large_queries:%s)\n", $2)); 1756 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1757 yyerror("expected yes or no."); 1758 else cfg_parser->cfg->harden_large_queries = 1759 (strcmp($2, "yes")==0); 1760 free($2); 1761 } 1762 ; 1763 server_harden_glue: VAR_HARDEN_GLUE STRING_ARG 1764 { 1765 OUTYY(("P(server_harden_glue:%s)\n", $2)); 1766 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1767 yyerror("expected yes or no."); 1768 else cfg_parser->cfg->harden_glue = 1769 (strcmp($2, "yes")==0); 1770 free($2); 1771 } 1772 ; 1773 server_harden_dnssec_stripped: VAR_HARDEN_DNSSEC_STRIPPED STRING_ARG 1774 { 1775 OUTYY(("P(server_harden_dnssec_stripped:%s)\n", $2)); 1776 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1777 yyerror("expected yes or no."); 1778 else cfg_parser->cfg->harden_dnssec_stripped = 1779 (strcmp($2, "yes")==0); 1780 free($2); 1781 } 1782 ; 1783 server_harden_below_nxdomain: VAR_HARDEN_BELOW_NXDOMAIN STRING_ARG 1784 { 1785 OUTYY(("P(server_harden_below_nxdomain:%s)\n", $2)); 1786 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1787 yyerror("expected yes or no."); 1788 else cfg_parser->cfg->harden_below_nxdomain = 1789 (strcmp($2, "yes")==0); 1790 free($2); 1791 } 1792 ; 1793 server_harden_referral_path: VAR_HARDEN_REFERRAL_PATH STRING_ARG 1794 { 1795 OUTYY(("P(server_harden_referral_path:%s)\n", $2)); 1796 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1797 yyerror("expected yes or no."); 1798 else cfg_parser->cfg->harden_referral_path = 1799 (strcmp($2, "yes")==0); 1800 free($2); 1801 } 1802 ; 1803 server_harden_algo_downgrade: VAR_HARDEN_ALGO_DOWNGRADE STRING_ARG 1804 { 1805 OUTYY(("P(server_harden_algo_downgrade:%s)\n", $2)); 1806 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1807 yyerror("expected yes or no."); 1808 else cfg_parser->cfg->harden_algo_downgrade = 1809 (strcmp($2, "yes")==0); 1810 free($2); 1811 } 1812 ; 1813 server_harden_unknown_additional: VAR_HARDEN_UNKNOWN_ADDITIONAL STRING_ARG 1814 { 1815 OUTYY(("P(server_harden_unknown_additional:%s)\n", $2)); 1816 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1817 yyerror("expected yes or no."); 1818 else cfg_parser->cfg->harden_unknown_additional = 1819 (strcmp($2, "yes")==0); 1820 free($2); 1821 } 1822 ; 1823 server_use_caps_for_id: VAR_USE_CAPS_FOR_ID STRING_ARG 1824 { 1825 OUTYY(("P(server_use_caps_for_id:%s)\n", $2)); 1826 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1827 yyerror("expected yes or no."); 1828 else cfg_parser->cfg->use_caps_bits_for_id = 1829 (strcmp($2, "yes")==0); 1830 free($2); 1831 } 1832 ; 1833 server_caps_whitelist: VAR_CAPS_WHITELIST STRING_ARG 1834 { 1835 OUTYY(("P(server_caps_whitelist:%s)\n", $2)); 1836 if(!cfg_strlist_insert(&cfg_parser->cfg->caps_whitelist, $2)) 1837 yyerror("out of memory"); 1838 } 1839 ; 1840 server_private_address: VAR_PRIVATE_ADDRESS STRING_ARG 1841 { 1842 OUTYY(("P(server_private_address:%s)\n", $2)); 1843 if(!cfg_strlist_insert(&cfg_parser->cfg->private_address, $2)) 1844 yyerror("out of memory"); 1845 } 1846 ; 1847 server_private_domain: VAR_PRIVATE_DOMAIN STRING_ARG 1848 { 1849 OUTYY(("P(server_private_domain:%s)\n", $2)); 1850 if(!cfg_strlist_insert(&cfg_parser->cfg->private_domain, $2)) 1851 yyerror("out of memory"); 1852 } 1853 ; 1854 server_prefetch: VAR_PREFETCH STRING_ARG 1855 { 1856 OUTYY(("P(server_prefetch:%s)\n", $2)); 1857 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1858 yyerror("expected yes or no."); 1859 else cfg_parser->cfg->prefetch = (strcmp($2, "yes")==0); 1860 free($2); 1861 } 1862 ; 1863 server_prefetch_key: VAR_PREFETCH_KEY STRING_ARG 1864 { 1865 OUTYY(("P(server_prefetch_key:%s)\n", $2)); 1866 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1867 yyerror("expected yes or no."); 1868 else cfg_parser->cfg->prefetch_key = (strcmp($2, "yes")==0); 1869 free($2); 1870 } 1871 ; 1872 server_deny_any: VAR_DENY_ANY STRING_ARG 1873 { 1874 OUTYY(("P(server_deny_any:%s)\n", $2)); 1875 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1876 yyerror("expected yes or no."); 1877 else cfg_parser->cfg->deny_any = (strcmp($2, "yes")==0); 1878 free($2); 1879 } 1880 ; 1881 server_unwanted_reply_threshold: VAR_UNWANTED_REPLY_THRESHOLD STRING_ARG 1882 { 1883 OUTYY(("P(server_unwanted_reply_threshold:%s)\n", $2)); 1884 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1885 yyerror("number expected"); 1886 else cfg_parser->cfg->unwanted_threshold = atoi($2); 1887 free($2); 1888 } 1889 ; 1890 server_do_not_query_address: VAR_DO_NOT_QUERY_ADDRESS STRING_ARG 1891 { 1892 OUTYY(("P(server_do_not_query_address:%s)\n", $2)); 1893 if(!cfg_strlist_insert(&cfg_parser->cfg->donotqueryaddrs, $2)) 1894 yyerror("out of memory"); 1895 } 1896 ; 1897 server_do_not_query_localhost: VAR_DO_NOT_QUERY_LOCALHOST STRING_ARG 1898 { 1899 OUTYY(("P(server_do_not_query_localhost:%s)\n", $2)); 1900 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 1901 yyerror("expected yes or no."); 1902 else cfg_parser->cfg->donotquery_localhost = 1903 (strcmp($2, "yes")==0); 1904 free($2); 1905 } 1906 ; 1907 server_access_control: VAR_ACCESS_CONTROL STRING_ARG STRING_ARG 1908 { 1909 OUTYY(("P(server_access_control:%s %s)\n", $2, $3)); 1910 validate_acl_action($3); 1911 if(!cfg_str2list_insert(&cfg_parser->cfg->acls, $2, $3)) 1912 fatal_exit("out of memory adding acl"); 1913 } 1914 ; 1915 server_interface_action: VAR_INTERFACE_ACTION STRING_ARG STRING_ARG 1916 { 1917 OUTYY(("P(server_interface_action:%s %s)\n", $2, $3)); 1918 validate_acl_action($3); 1919 if(!cfg_str2list_insert( 1920 &cfg_parser->cfg->interface_actions, $2, $3)) 1921 fatal_exit("out of memory adding acl"); 1922 } 1923 ; 1924 server_module_conf: VAR_MODULE_CONF STRING_ARG 1925 { 1926 OUTYY(("P(server_module_conf:%s)\n", $2)); 1927 free(cfg_parser->cfg->module_conf); 1928 cfg_parser->cfg->module_conf = $2; 1929 } 1930 ; 1931 server_val_override_date: VAR_VAL_OVERRIDE_DATE STRING_ARG 1932 { 1933 OUTYY(("P(server_val_override_date:%s)\n", $2)); 1934 if(*$2 == '\0' || strcmp($2, "0") == 0) { 1935 cfg_parser->cfg->val_date_override = 0; 1936 } else if(strlen($2) == 14) { 1937 cfg_parser->cfg->val_date_override = 1938 cfg_convert_timeval($2); 1939 if(!cfg_parser->cfg->val_date_override) 1940 yyerror("bad date/time specification"); 1941 } else { 1942 if(atoi($2) == 0) 1943 yyerror("number expected"); 1944 cfg_parser->cfg->val_date_override = atoi($2); 1945 } 1946 free($2); 1947 } 1948 ; 1949 server_val_sig_skew_min: VAR_VAL_SIG_SKEW_MIN STRING_ARG 1950 { 1951 OUTYY(("P(server_val_sig_skew_min:%s)\n", $2)); 1952 if(*$2 == '\0' || strcmp($2, "0") == 0) { 1953 cfg_parser->cfg->val_sig_skew_min = 0; 1954 } else { 1955 cfg_parser->cfg->val_sig_skew_min = atoi($2); 1956 if(!cfg_parser->cfg->val_sig_skew_min) 1957 yyerror("number expected"); 1958 } 1959 free($2); 1960 } 1961 ; 1962 server_val_sig_skew_max: VAR_VAL_SIG_SKEW_MAX STRING_ARG 1963 { 1964 OUTYY(("P(server_val_sig_skew_max:%s)\n", $2)); 1965 if(*$2 == '\0' || strcmp($2, "0") == 0) { 1966 cfg_parser->cfg->val_sig_skew_max = 0; 1967 } else { 1968 cfg_parser->cfg->val_sig_skew_max = atoi($2); 1969 if(!cfg_parser->cfg->val_sig_skew_max) 1970 yyerror("number expected"); 1971 } 1972 free($2); 1973 } 1974 ; 1975 server_val_max_restart: VAR_VAL_MAX_RESTART STRING_ARG 1976 { 1977 OUTYY(("P(server_val_max_restart:%s)\n", $2)); 1978 if(*$2 == '\0' || strcmp($2, "0") == 0) { 1979 cfg_parser->cfg->val_max_restart = 0; 1980 } else { 1981 cfg_parser->cfg->val_max_restart = atoi($2); 1982 if(!cfg_parser->cfg->val_max_restart) 1983 yyerror("number expected"); 1984 } 1985 free($2); 1986 } 1987 ; 1988 server_cache_max_ttl: VAR_CACHE_MAX_TTL STRING_ARG 1989 { 1990 OUTYY(("P(server_cache_max_ttl:%s)\n", $2)); 1991 if(atoi($2) == 0 && strcmp($2, "0") != 0) 1992 yyerror("number expected"); 1993 else cfg_parser->cfg->max_ttl = atoi($2); 1994 free($2); 1995 } 1996 ; 1997 server_cache_max_negative_ttl: VAR_CACHE_MAX_NEGATIVE_TTL STRING_ARG 1998 { 1999 OUTYY(("P(server_cache_max_negative_ttl:%s)\n", $2)); 2000 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2001 yyerror("number expected"); 2002 else cfg_parser->cfg->max_negative_ttl = atoi($2); 2003 free($2); 2004 } 2005 ; 2006 server_cache_min_ttl: VAR_CACHE_MIN_TTL STRING_ARG 2007 { 2008 OUTYY(("P(server_cache_min_ttl:%s)\n", $2)); 2009 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2010 yyerror("number expected"); 2011 else cfg_parser->cfg->min_ttl = atoi($2); 2012 free($2); 2013 } 2014 ; 2015 server_bogus_ttl: VAR_BOGUS_TTL STRING_ARG 2016 { 2017 OUTYY(("P(server_bogus_ttl:%s)\n", $2)); 2018 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2019 yyerror("number expected"); 2020 else cfg_parser->cfg->bogus_ttl = atoi($2); 2021 free($2); 2022 } 2023 ; 2024 server_val_clean_additional: VAR_VAL_CLEAN_ADDITIONAL STRING_ARG 2025 { 2026 OUTYY(("P(server_val_clean_additional:%s)\n", $2)); 2027 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2028 yyerror("expected yes or no."); 2029 else cfg_parser->cfg->val_clean_additional = 2030 (strcmp($2, "yes")==0); 2031 free($2); 2032 } 2033 ; 2034 server_val_permissive_mode: VAR_VAL_PERMISSIVE_MODE STRING_ARG 2035 { 2036 OUTYY(("P(server_val_permissive_mode:%s)\n", $2)); 2037 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2038 yyerror("expected yes or no."); 2039 else cfg_parser->cfg->val_permissive_mode = 2040 (strcmp($2, "yes")==0); 2041 free($2); 2042 } 2043 ; 2044 server_aggressive_nsec: VAR_AGGRESSIVE_NSEC STRING_ARG 2045 { 2046 OUTYY(("P(server_aggressive_nsec:%s)\n", $2)); 2047 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2048 yyerror("expected yes or no."); 2049 else 2050 cfg_parser->cfg->aggressive_nsec = 2051 (strcmp($2, "yes")==0); 2052 free($2); 2053 } 2054 ; 2055 server_ignore_cd_flag: VAR_IGNORE_CD_FLAG STRING_ARG 2056 { 2057 OUTYY(("P(server_ignore_cd_flag:%s)\n", $2)); 2058 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2059 yyerror("expected yes or no."); 2060 else cfg_parser->cfg->ignore_cd = (strcmp($2, "yes")==0); 2061 free($2); 2062 } 2063 ; 2064 server_disable_edns_do: VAR_DISABLE_EDNS_DO STRING_ARG 2065 { 2066 OUTYY(("P(server_disable_edns_do:%s)\n", $2)); 2067 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2068 yyerror("expected yes or no."); 2069 else cfg_parser->cfg->disable_edns_do = (strcmp($2, "yes")==0); 2070 free($2); 2071 } 2072 ; 2073 server_serve_expired: VAR_SERVE_EXPIRED STRING_ARG 2074 { 2075 OUTYY(("P(server_serve_expired:%s)\n", $2)); 2076 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2077 yyerror("expected yes or no."); 2078 else cfg_parser->cfg->serve_expired = (strcmp($2, "yes")==0); 2079 free($2); 2080 } 2081 ; 2082 server_serve_expired_ttl: VAR_SERVE_EXPIRED_TTL STRING_ARG 2083 { 2084 OUTYY(("P(server_serve_expired_ttl:%s)\n", $2)); 2085 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2086 yyerror("number expected"); 2087 else cfg_parser->cfg->serve_expired_ttl = atoi($2); 2088 free($2); 2089 } 2090 ; 2091 server_serve_expired_ttl_reset: VAR_SERVE_EXPIRED_TTL_RESET STRING_ARG 2092 { 2093 OUTYY(("P(server_serve_expired_ttl_reset:%s)\n", $2)); 2094 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2095 yyerror("expected yes or no."); 2096 else cfg_parser->cfg->serve_expired_ttl_reset = (strcmp($2, "yes")==0); 2097 free($2); 2098 } 2099 ; 2100 server_serve_expired_reply_ttl: VAR_SERVE_EXPIRED_REPLY_TTL STRING_ARG 2101 { 2102 OUTYY(("P(server_serve_expired_reply_ttl:%s)\n", $2)); 2103 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2104 yyerror("number expected"); 2105 else cfg_parser->cfg->serve_expired_reply_ttl = atoi($2); 2106 free($2); 2107 } 2108 ; 2109 server_serve_expired_client_timeout: VAR_SERVE_EXPIRED_CLIENT_TIMEOUT STRING_ARG 2110 { 2111 OUTYY(("P(server_serve_expired_client_timeout:%s)\n", $2)); 2112 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2113 yyerror("number expected"); 2114 else cfg_parser->cfg->serve_expired_client_timeout = atoi($2); 2115 free($2); 2116 } 2117 ; 2118 server_ede_serve_expired: VAR_EDE_SERVE_EXPIRED STRING_ARG 2119 { 2120 OUTYY(("P(server_ede_serve_expired:%s)\n", $2)); 2121 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2122 yyerror("expected yes or no."); 2123 else cfg_parser->cfg->ede_serve_expired = (strcmp($2, "yes")==0); 2124 free($2); 2125 } 2126 ; 2127 server_serve_original_ttl: VAR_SERVE_ORIGINAL_TTL STRING_ARG 2128 { 2129 OUTYY(("P(server_serve_original_ttl:%s)\n", $2)); 2130 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2131 yyerror("expected yes or no."); 2132 else cfg_parser->cfg->serve_original_ttl = (strcmp($2, "yes")==0); 2133 free($2); 2134 } 2135 ; 2136 server_fake_dsa: VAR_FAKE_DSA STRING_ARG 2137 { 2138 OUTYY(("P(server_fake_dsa:%s)\n", $2)); 2139 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2140 yyerror("expected yes or no."); 2141 #if defined(HAVE_SSL) || defined(HAVE_NETTLE) 2142 else fake_dsa = (strcmp($2, "yes")==0); 2143 if(fake_dsa) 2144 log_warn("test option fake_dsa is enabled"); 2145 #endif 2146 free($2); 2147 } 2148 ; 2149 server_fake_sha1: VAR_FAKE_SHA1 STRING_ARG 2150 { 2151 OUTYY(("P(server_fake_sha1:%s)\n", $2)); 2152 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2153 yyerror("expected yes or no."); 2154 #if defined(HAVE_SSL) || defined(HAVE_NETTLE) 2155 else fake_sha1 = (strcmp($2, "yes")==0); 2156 if(fake_sha1) 2157 log_warn("test option fake_sha1 is enabled"); 2158 #endif 2159 free($2); 2160 } 2161 ; 2162 server_val_log_level: VAR_VAL_LOG_LEVEL STRING_ARG 2163 { 2164 OUTYY(("P(server_val_log_level:%s)\n", $2)); 2165 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2166 yyerror("number expected"); 2167 else cfg_parser->cfg->val_log_level = atoi($2); 2168 free($2); 2169 } 2170 ; 2171 server_val_nsec3_keysize_iterations: VAR_VAL_NSEC3_KEYSIZE_ITERATIONS STRING_ARG 2172 { 2173 OUTYY(("P(server_val_nsec3_keysize_iterations:%s)\n", $2)); 2174 free(cfg_parser->cfg->val_nsec3_key_iterations); 2175 cfg_parser->cfg->val_nsec3_key_iterations = $2; 2176 } 2177 ; 2178 server_zonemd_permissive_mode: VAR_ZONEMD_PERMISSIVE_MODE STRING_ARG 2179 { 2180 OUTYY(("P(server_zonemd_permissive_mode:%s)\n", $2)); 2181 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2182 yyerror("expected yes or no."); 2183 else cfg_parser->cfg->zonemd_permissive_mode = (strcmp($2, "yes")==0); 2184 free($2); 2185 } 2186 ; 2187 server_add_holddown: VAR_ADD_HOLDDOWN STRING_ARG 2188 { 2189 OUTYY(("P(server_add_holddown:%s)\n", $2)); 2190 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2191 yyerror("number expected"); 2192 else cfg_parser->cfg->add_holddown = atoi($2); 2193 free($2); 2194 } 2195 ; 2196 server_del_holddown: VAR_DEL_HOLDDOWN STRING_ARG 2197 { 2198 OUTYY(("P(server_del_holddown:%s)\n", $2)); 2199 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2200 yyerror("number expected"); 2201 else cfg_parser->cfg->del_holddown = atoi($2); 2202 free($2); 2203 } 2204 ; 2205 server_keep_missing: VAR_KEEP_MISSING STRING_ARG 2206 { 2207 OUTYY(("P(server_keep_missing:%s)\n", $2)); 2208 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2209 yyerror("number expected"); 2210 else cfg_parser->cfg->keep_missing = atoi($2); 2211 free($2); 2212 } 2213 ; 2214 server_permit_small_holddown: VAR_PERMIT_SMALL_HOLDDOWN STRING_ARG 2215 { 2216 OUTYY(("P(server_permit_small_holddown:%s)\n", $2)); 2217 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2218 yyerror("expected yes or no."); 2219 else cfg_parser->cfg->permit_small_holddown = 2220 (strcmp($2, "yes")==0); 2221 free($2); 2222 } 2223 ; 2224 server_key_cache_size: VAR_KEY_CACHE_SIZE STRING_ARG 2225 { 2226 OUTYY(("P(server_key_cache_size:%s)\n", $2)); 2227 if(!cfg_parse_memsize($2, &cfg_parser->cfg->key_cache_size)) 2228 yyerror("memory size expected"); 2229 free($2); 2230 } 2231 ; 2232 server_key_cache_slabs: VAR_KEY_CACHE_SLABS STRING_ARG 2233 { 2234 OUTYY(("P(server_key_cache_slabs:%s)\n", $2)); 2235 if(atoi($2) == 0) { 2236 yyerror("number expected"); 2237 } else { 2238 cfg_parser->cfg->key_cache_slabs = atoi($2); 2239 if(!is_pow2(cfg_parser->cfg->key_cache_slabs)) 2240 yyerror("must be a power of 2"); 2241 } 2242 free($2); 2243 } 2244 ; 2245 server_neg_cache_size: VAR_NEG_CACHE_SIZE STRING_ARG 2246 { 2247 OUTYY(("P(server_neg_cache_size:%s)\n", $2)); 2248 if(!cfg_parse_memsize($2, &cfg_parser->cfg->neg_cache_size)) 2249 yyerror("memory size expected"); 2250 free($2); 2251 } 2252 ; 2253 server_local_zone: VAR_LOCAL_ZONE STRING_ARG STRING_ARG 2254 { 2255 OUTYY(("P(server_local_zone:%s %s)\n", $2, $3)); 2256 if(strcmp($3, "static")!=0 && strcmp($3, "deny")!=0 && 2257 strcmp($3, "refuse")!=0 && strcmp($3, "redirect")!=0 && 2258 strcmp($3, "transparent")!=0 && strcmp($3, "nodefault")!=0 2259 && strcmp($3, "typetransparent")!=0 2260 && strcmp($3, "always_transparent")!=0 2261 && strcmp($3, "block_a")!=0 2262 && strcmp($3, "always_refuse")!=0 2263 && strcmp($3, "always_nxdomain")!=0 2264 && strcmp($3, "always_nodata")!=0 2265 && strcmp($3, "always_deny")!=0 2266 && strcmp($3, "always_null")!=0 2267 && strcmp($3, "noview")!=0 2268 && strcmp($3, "inform")!=0 && strcmp($3, "inform_deny")!=0 2269 && strcmp($3, "inform_redirect") != 0 2270 && strcmp($3, "ipset") != 0) { 2271 yyerror("local-zone type: expected static, deny, " 2272 "refuse, redirect, transparent, " 2273 "typetransparent, inform, inform_deny, " 2274 "inform_redirect, always_transparent, block_a," 2275 "always_refuse, always_nxdomain, " 2276 "always_nodata, always_deny, always_null, " 2277 "noview, nodefault or ipset"); 2278 free($2); 2279 free($3); 2280 } else if(strcmp($3, "nodefault")==0) { 2281 if(!cfg_strlist_insert(&cfg_parser->cfg-> 2282 local_zones_nodefault, $2)) 2283 fatal_exit("out of memory adding local-zone"); 2284 free($3); 2285 #ifdef USE_IPSET 2286 } else if(strcmp($3, "ipset")==0) { 2287 size_t len = strlen($2); 2288 /* Make sure to add the trailing dot. 2289 * These are str compared to domain names. */ 2290 if($2[len-1] != '.') { 2291 if(!($2 = realloc($2, len+2))) { 2292 fatal_exit("out of memory adding local-zone"); 2293 } 2294 $2[len] = '.'; 2295 $2[len+1] = 0; 2296 } 2297 if(!cfg_strlist_insert(&cfg_parser->cfg-> 2298 local_zones_ipset, $2)) 2299 fatal_exit("out of memory adding local-zone"); 2300 free($3); 2301 #endif 2302 } else { 2303 if(!cfg_str2list_insert(&cfg_parser->cfg->local_zones, 2304 $2, $3)) 2305 fatal_exit("out of memory adding local-zone"); 2306 } 2307 } 2308 ; 2309 server_local_data: VAR_LOCAL_DATA STRING_ARG 2310 { 2311 OUTYY(("P(server_local_data:%s)\n", $2)); 2312 if(!cfg_strlist_insert(&cfg_parser->cfg->local_data, $2)) 2313 fatal_exit("out of memory adding local-data"); 2314 } 2315 ; 2316 server_local_data_ptr: VAR_LOCAL_DATA_PTR STRING_ARG 2317 { 2318 char* ptr; 2319 OUTYY(("P(server_local_data_ptr:%s)\n", $2)); 2320 ptr = cfg_ptr_reverse($2); 2321 free($2); 2322 if(ptr) { 2323 if(!cfg_strlist_insert(&cfg_parser->cfg-> 2324 local_data, ptr)) 2325 fatal_exit("out of memory adding local-data"); 2326 } else { 2327 yyerror("local-data-ptr could not be reversed"); 2328 } 2329 } 2330 ; 2331 server_minimal_responses: VAR_MINIMAL_RESPONSES STRING_ARG 2332 { 2333 OUTYY(("P(server_minimal_responses:%s)\n", $2)); 2334 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2335 yyerror("expected yes or no."); 2336 else cfg_parser->cfg->minimal_responses = 2337 (strcmp($2, "yes")==0); 2338 free($2); 2339 } 2340 ; 2341 server_rrset_roundrobin: VAR_RRSET_ROUNDROBIN STRING_ARG 2342 { 2343 OUTYY(("P(server_rrset_roundrobin:%s)\n", $2)); 2344 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2345 yyerror("expected yes or no."); 2346 else cfg_parser->cfg->rrset_roundrobin = 2347 (strcmp($2, "yes")==0); 2348 free($2); 2349 } 2350 ; 2351 server_unknown_server_time_limit: VAR_UNKNOWN_SERVER_TIME_LIMIT STRING_ARG 2352 { 2353 OUTYY(("P(server_unknown_server_time_limit:%s)\n", $2)); 2354 cfg_parser->cfg->unknown_server_time_limit = atoi($2); 2355 free($2); 2356 } 2357 ; 2358 server_max_udp_size: VAR_MAX_UDP_SIZE STRING_ARG 2359 { 2360 OUTYY(("P(server_max_udp_size:%s)\n", $2)); 2361 cfg_parser->cfg->max_udp_size = atoi($2); 2362 free($2); 2363 } 2364 ; 2365 server_dns64_prefix: VAR_DNS64_PREFIX STRING_ARG 2366 { 2367 OUTYY(("P(dns64_prefix:%s)\n", $2)); 2368 free(cfg_parser->cfg->dns64_prefix); 2369 cfg_parser->cfg->dns64_prefix = $2; 2370 } 2371 ; 2372 server_dns64_synthall: VAR_DNS64_SYNTHALL STRING_ARG 2373 { 2374 OUTYY(("P(server_dns64_synthall:%s)\n", $2)); 2375 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2376 yyerror("expected yes or no."); 2377 else cfg_parser->cfg->dns64_synthall = (strcmp($2, "yes")==0); 2378 free($2); 2379 } 2380 ; 2381 server_dns64_ignore_aaaa: VAR_DNS64_IGNORE_AAAA STRING_ARG 2382 { 2383 OUTYY(("P(dns64_ignore_aaaa:%s)\n", $2)); 2384 if(!cfg_strlist_insert(&cfg_parser->cfg->dns64_ignore_aaaa, 2385 $2)) 2386 fatal_exit("out of memory adding dns64-ignore-aaaa"); 2387 } 2388 ; 2389 server_nat64_prefix: VAR_NAT64_PREFIX STRING_ARG 2390 { 2391 OUTYY(("P(nat64_prefix:%s)\n", $2)); 2392 free(cfg_parser->cfg->nat64_prefix); 2393 cfg_parser->cfg->nat64_prefix = $2; 2394 } 2395 ; 2396 server_define_tag: VAR_DEFINE_TAG STRING_ARG 2397 { 2398 char* p, *s = $2; 2399 OUTYY(("P(server_define_tag:%s)\n", $2)); 2400 while((p=strsep(&s, " \t\n")) != NULL) { 2401 if(*p) { 2402 if(!config_add_tag(cfg_parser->cfg, p)) 2403 yyerror("could not define-tag, " 2404 "out of memory"); 2405 } 2406 } 2407 free($2); 2408 } 2409 ; 2410 server_local_zone_tag: VAR_LOCAL_ZONE_TAG STRING_ARG STRING_ARG 2411 { 2412 size_t len = 0; 2413 uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, $3, 2414 &len); 2415 free($3); 2416 OUTYY(("P(server_local_zone_tag:%s)\n", $2)); 2417 if(!bitlist) { 2418 yyerror("could not parse tags, (define-tag them first)"); 2419 free($2); 2420 } 2421 if(bitlist) { 2422 if(!cfg_strbytelist_insert( 2423 &cfg_parser->cfg->local_zone_tags, 2424 $2, bitlist, len)) { 2425 yyerror("out of memory"); 2426 free($2); 2427 } 2428 } 2429 } 2430 ; 2431 server_access_control_tag: VAR_ACCESS_CONTROL_TAG STRING_ARG STRING_ARG 2432 { 2433 size_t len = 0; 2434 uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, $3, 2435 &len); 2436 free($3); 2437 OUTYY(("P(server_access_control_tag:%s)\n", $2)); 2438 if(!bitlist) { 2439 yyerror("could not parse tags, (define-tag them first)"); 2440 free($2); 2441 } 2442 if(bitlist) { 2443 if(!cfg_strbytelist_insert( 2444 &cfg_parser->cfg->acl_tags, 2445 $2, bitlist, len)) { 2446 yyerror("out of memory"); 2447 free($2); 2448 } 2449 } 2450 } 2451 ; 2452 server_access_control_tag_action: VAR_ACCESS_CONTROL_TAG_ACTION STRING_ARG STRING_ARG STRING_ARG 2453 { 2454 OUTYY(("P(server_access_control_tag_action:%s %s %s)\n", $2, $3, $4)); 2455 if(!cfg_str3list_insert(&cfg_parser->cfg->acl_tag_actions, 2456 $2, $3, $4)) { 2457 yyerror("out of memory"); 2458 free($2); 2459 free($3); 2460 free($4); 2461 } 2462 } 2463 ; 2464 server_access_control_tag_data: VAR_ACCESS_CONTROL_TAG_DATA STRING_ARG STRING_ARG STRING_ARG 2465 { 2466 OUTYY(("P(server_access_control_tag_data:%s %s %s)\n", $2, $3, $4)); 2467 if(!cfg_str3list_insert(&cfg_parser->cfg->acl_tag_datas, 2468 $2, $3, $4)) { 2469 yyerror("out of memory"); 2470 free($2); 2471 free($3); 2472 free($4); 2473 } 2474 } 2475 ; 2476 server_local_zone_override: VAR_LOCAL_ZONE_OVERRIDE STRING_ARG STRING_ARG STRING_ARG 2477 { 2478 OUTYY(("P(server_local_zone_override:%s %s %s)\n", $2, $3, $4)); 2479 if(!cfg_str3list_insert(&cfg_parser->cfg->local_zone_overrides, 2480 $2, $3, $4)) { 2481 yyerror("out of memory"); 2482 free($2); 2483 free($3); 2484 free($4); 2485 } 2486 } 2487 ; 2488 server_access_control_view: VAR_ACCESS_CONTROL_VIEW STRING_ARG STRING_ARG 2489 { 2490 OUTYY(("P(server_access_control_view:%s %s)\n", $2, $3)); 2491 if(!cfg_str2list_insert(&cfg_parser->cfg->acl_view, 2492 $2, $3)) { 2493 yyerror("out of memory"); 2494 } 2495 } 2496 ; 2497 server_interface_tag: VAR_INTERFACE_TAG STRING_ARG STRING_ARG 2498 { 2499 size_t len = 0; 2500 uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, $3, 2501 &len); 2502 free($3); 2503 OUTYY(("P(server_interface_tag:%s)\n", $2)); 2504 if(!bitlist) { 2505 yyerror("could not parse tags, (define-tag them first)"); 2506 free($2); 2507 } 2508 if(bitlist) { 2509 if(!cfg_strbytelist_insert( 2510 &cfg_parser->cfg->interface_tags, 2511 $2, bitlist, len)) { 2512 yyerror("out of memory"); 2513 free($2); 2514 } 2515 } 2516 } 2517 ; 2518 server_interface_tag_action: VAR_INTERFACE_TAG_ACTION STRING_ARG STRING_ARG STRING_ARG 2519 { 2520 OUTYY(("P(server_interface_tag_action:%s %s %s)\n", $2, $3, $4)); 2521 if(!cfg_str3list_insert(&cfg_parser->cfg->interface_tag_actions, 2522 $2, $3, $4)) { 2523 yyerror("out of memory"); 2524 free($2); 2525 free($3); 2526 free($4); 2527 } 2528 } 2529 ; 2530 server_interface_tag_data: VAR_INTERFACE_TAG_DATA STRING_ARG STRING_ARG STRING_ARG 2531 { 2532 OUTYY(("P(server_interface_tag_data:%s %s %s)\n", $2, $3, $4)); 2533 if(!cfg_str3list_insert(&cfg_parser->cfg->interface_tag_datas, 2534 $2, $3, $4)) { 2535 yyerror("out of memory"); 2536 free($2); 2537 free($3); 2538 free($4); 2539 } 2540 } 2541 ; 2542 server_interface_view: VAR_INTERFACE_VIEW STRING_ARG STRING_ARG 2543 { 2544 OUTYY(("P(server_interface_view:%s %s)\n", $2, $3)); 2545 if(!cfg_str2list_insert(&cfg_parser->cfg->interface_view, 2546 $2, $3)) { 2547 yyerror("out of memory"); 2548 } 2549 } 2550 ; 2551 server_response_ip_tag: VAR_RESPONSE_IP_TAG STRING_ARG STRING_ARG 2552 { 2553 size_t len = 0; 2554 uint8_t* bitlist = config_parse_taglist(cfg_parser->cfg, $3, 2555 &len); 2556 free($3); 2557 OUTYY(("P(response_ip_tag:%s)\n", $2)); 2558 if(!bitlist) { 2559 yyerror("could not parse tags, (define-tag them first)"); 2560 free($2); 2561 } 2562 if(bitlist) { 2563 if(!cfg_strbytelist_insert( 2564 &cfg_parser->cfg->respip_tags, 2565 $2, bitlist, len)) { 2566 yyerror("out of memory"); 2567 free($2); 2568 } 2569 } 2570 } 2571 ; 2572 server_ip_ratelimit: VAR_IP_RATELIMIT STRING_ARG 2573 { 2574 OUTYY(("P(server_ip_ratelimit:%s)\n", $2)); 2575 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2576 yyerror("number expected"); 2577 else cfg_parser->cfg->ip_ratelimit = atoi($2); 2578 free($2); 2579 } 2580 ; 2581 server_ip_ratelimit_cookie: VAR_IP_RATELIMIT_COOKIE STRING_ARG 2582 { 2583 OUTYY(("P(server_ip_ratelimit_cookie:%s)\n", $2)); 2584 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2585 yyerror("number expected"); 2586 else cfg_parser->cfg->ip_ratelimit_cookie = atoi($2); 2587 free($2); 2588 } 2589 ; 2590 server_ratelimit: VAR_RATELIMIT STRING_ARG 2591 { 2592 OUTYY(("P(server_ratelimit:%s)\n", $2)); 2593 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2594 yyerror("number expected"); 2595 else cfg_parser->cfg->ratelimit = atoi($2); 2596 free($2); 2597 } 2598 ; 2599 server_ip_ratelimit_size: VAR_IP_RATELIMIT_SIZE STRING_ARG 2600 { 2601 OUTYY(("P(server_ip_ratelimit_size:%s)\n", $2)); 2602 if(!cfg_parse_memsize($2, &cfg_parser->cfg->ip_ratelimit_size)) 2603 yyerror("memory size expected"); 2604 free($2); 2605 } 2606 ; 2607 server_ratelimit_size: VAR_RATELIMIT_SIZE STRING_ARG 2608 { 2609 OUTYY(("P(server_ratelimit_size:%s)\n", $2)); 2610 if(!cfg_parse_memsize($2, &cfg_parser->cfg->ratelimit_size)) 2611 yyerror("memory size expected"); 2612 free($2); 2613 } 2614 ; 2615 server_ip_ratelimit_slabs: VAR_IP_RATELIMIT_SLABS STRING_ARG 2616 { 2617 OUTYY(("P(server_ip_ratelimit_slabs:%s)\n", $2)); 2618 if(atoi($2) == 0) { 2619 yyerror("number expected"); 2620 } else { 2621 cfg_parser->cfg->ip_ratelimit_slabs = atoi($2); 2622 if(!is_pow2(cfg_parser->cfg->ip_ratelimit_slabs)) 2623 yyerror("must be a power of 2"); 2624 } 2625 free($2); 2626 } 2627 ; 2628 server_ratelimit_slabs: VAR_RATELIMIT_SLABS STRING_ARG 2629 { 2630 OUTYY(("P(server_ratelimit_slabs:%s)\n", $2)); 2631 if(atoi($2) == 0) { 2632 yyerror("number expected"); 2633 } else { 2634 cfg_parser->cfg->ratelimit_slabs = atoi($2); 2635 if(!is_pow2(cfg_parser->cfg->ratelimit_slabs)) 2636 yyerror("must be a power of 2"); 2637 } 2638 free($2); 2639 } 2640 ; 2641 server_ratelimit_for_domain: VAR_RATELIMIT_FOR_DOMAIN STRING_ARG STRING_ARG 2642 { 2643 OUTYY(("P(server_ratelimit_for_domain:%s %s)\n", $2, $3)); 2644 if(atoi($3) == 0 && strcmp($3, "0") != 0) { 2645 yyerror("number expected"); 2646 free($2); 2647 free($3); 2648 } else { 2649 if(!cfg_str2list_insert(&cfg_parser->cfg-> 2650 ratelimit_for_domain, $2, $3)) 2651 fatal_exit("out of memory adding " 2652 "ratelimit-for-domain"); 2653 } 2654 } 2655 ; 2656 server_ratelimit_below_domain: VAR_RATELIMIT_BELOW_DOMAIN STRING_ARG STRING_ARG 2657 { 2658 OUTYY(("P(server_ratelimit_below_domain:%s %s)\n", $2, $3)); 2659 if(atoi($3) == 0 && strcmp($3, "0") != 0) { 2660 yyerror("number expected"); 2661 free($2); 2662 free($3); 2663 } else { 2664 if(!cfg_str2list_insert(&cfg_parser->cfg-> 2665 ratelimit_below_domain, $2, $3)) 2666 fatal_exit("out of memory adding " 2667 "ratelimit-below-domain"); 2668 } 2669 } 2670 ; 2671 server_ip_ratelimit_factor: VAR_IP_RATELIMIT_FACTOR STRING_ARG 2672 { 2673 OUTYY(("P(server_ip_ratelimit_factor:%s)\n", $2)); 2674 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2675 yyerror("number expected"); 2676 else cfg_parser->cfg->ip_ratelimit_factor = atoi($2); 2677 free($2); 2678 } 2679 ; 2680 server_ratelimit_factor: VAR_RATELIMIT_FACTOR STRING_ARG 2681 { 2682 OUTYY(("P(server_ratelimit_factor:%s)\n", $2)); 2683 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2684 yyerror("number expected"); 2685 else cfg_parser->cfg->ratelimit_factor = atoi($2); 2686 free($2); 2687 } 2688 ; 2689 server_ip_ratelimit_backoff: VAR_IP_RATELIMIT_BACKOFF STRING_ARG 2690 { 2691 OUTYY(("P(server_ip_ratelimit_backoff:%s)\n", $2)); 2692 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2693 yyerror("expected yes or no."); 2694 else cfg_parser->cfg->ip_ratelimit_backoff = 2695 (strcmp($2, "yes")==0); 2696 free($2); 2697 } 2698 ; 2699 server_ratelimit_backoff: VAR_RATELIMIT_BACKOFF STRING_ARG 2700 { 2701 OUTYY(("P(server_ratelimit_backoff:%s)\n", $2)); 2702 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2703 yyerror("expected yes or no."); 2704 else cfg_parser->cfg->ratelimit_backoff = 2705 (strcmp($2, "yes")==0); 2706 free($2); 2707 } 2708 ; 2709 server_outbound_msg_retry: VAR_OUTBOUND_MSG_RETRY STRING_ARG 2710 { 2711 OUTYY(("P(server_outbound_msg_retry:%s)\n", $2)); 2712 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2713 yyerror("number expected"); 2714 else cfg_parser->cfg->outbound_msg_retry = atoi($2); 2715 free($2); 2716 } 2717 ; 2718 server_max_sent_count: VAR_MAX_SENT_COUNT STRING_ARG 2719 { 2720 OUTYY(("P(server_max_sent_count:%s)\n", $2)); 2721 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2722 yyerror("number expected"); 2723 else cfg_parser->cfg->max_sent_count = atoi($2); 2724 free($2); 2725 } 2726 ; 2727 server_max_query_restarts: VAR_MAX_QUERY_RESTARTS STRING_ARG 2728 { 2729 OUTYY(("P(server_max_query_restarts:%s)\n", $2)); 2730 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2731 yyerror("number expected"); 2732 else cfg_parser->cfg->max_query_restarts = atoi($2); 2733 free($2); 2734 } 2735 ; 2736 server_low_rtt: VAR_LOW_RTT STRING_ARG 2737 { 2738 OUTYY(("P(low-rtt option is deprecated, use fast-server-num instead)\n")); 2739 free($2); 2740 } 2741 ; 2742 server_fast_server_num: VAR_FAST_SERVER_NUM STRING_ARG 2743 { 2744 OUTYY(("P(server_fast_server_num:%s)\n", $2)); 2745 if(atoi($2) <= 0) 2746 yyerror("number expected"); 2747 else cfg_parser->cfg->fast_server_num = atoi($2); 2748 free($2); 2749 } 2750 ; 2751 server_fast_server_permil: VAR_FAST_SERVER_PERMIL STRING_ARG 2752 { 2753 OUTYY(("P(server_fast_server_permil:%s)\n", $2)); 2754 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2755 yyerror("number expected"); 2756 else cfg_parser->cfg->fast_server_permil = atoi($2); 2757 free($2); 2758 } 2759 ; 2760 server_qname_minimisation: VAR_QNAME_MINIMISATION STRING_ARG 2761 { 2762 OUTYY(("P(server_qname_minimisation:%s)\n", $2)); 2763 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2764 yyerror("expected yes or no."); 2765 else cfg_parser->cfg->qname_minimisation = 2766 (strcmp($2, "yes")==0); 2767 free($2); 2768 } 2769 ; 2770 server_qname_minimisation_strict: VAR_QNAME_MINIMISATION_STRICT STRING_ARG 2771 { 2772 OUTYY(("P(server_qname_minimisation_strict:%s)\n", $2)); 2773 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2774 yyerror("expected yes or no."); 2775 else cfg_parser->cfg->qname_minimisation_strict = 2776 (strcmp($2, "yes")==0); 2777 free($2); 2778 } 2779 ; 2780 server_pad_responses: VAR_PAD_RESPONSES STRING_ARG 2781 { 2782 OUTYY(("P(server_pad_responses:%s)\n", $2)); 2783 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2784 yyerror("expected yes or no."); 2785 else cfg_parser->cfg->pad_responses = 2786 (strcmp($2, "yes")==0); 2787 free($2); 2788 } 2789 ; 2790 server_pad_responses_block_size: VAR_PAD_RESPONSES_BLOCK_SIZE STRING_ARG 2791 { 2792 OUTYY(("P(server_pad_responses_block_size:%s)\n", $2)); 2793 if(atoi($2) == 0) 2794 yyerror("number expected"); 2795 else cfg_parser->cfg->pad_responses_block_size = atoi($2); 2796 free($2); 2797 } 2798 ; 2799 server_pad_queries: VAR_PAD_QUERIES STRING_ARG 2800 { 2801 OUTYY(("P(server_pad_queries:%s)\n", $2)); 2802 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2803 yyerror("expected yes or no."); 2804 else cfg_parser->cfg->pad_queries = 2805 (strcmp($2, "yes")==0); 2806 free($2); 2807 } 2808 ; 2809 server_pad_queries_block_size: VAR_PAD_QUERIES_BLOCK_SIZE STRING_ARG 2810 { 2811 OUTYY(("P(server_pad_queries_block_size:%s)\n", $2)); 2812 if(atoi($2) == 0) 2813 yyerror("number expected"); 2814 else cfg_parser->cfg->pad_queries_block_size = atoi($2); 2815 free($2); 2816 } 2817 ; 2818 server_ipsecmod_enabled: VAR_IPSECMOD_ENABLED STRING_ARG 2819 { 2820 #ifdef USE_IPSECMOD 2821 OUTYY(("P(server_ipsecmod_enabled:%s)\n", $2)); 2822 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2823 yyerror("expected yes or no."); 2824 else cfg_parser->cfg->ipsecmod_enabled = (strcmp($2, "yes")==0); 2825 #else 2826 OUTYY(("P(Compiled without IPsec module, ignoring)\n")); 2827 #endif 2828 free($2); 2829 } 2830 ; 2831 server_ipsecmod_ignore_bogus: VAR_IPSECMOD_IGNORE_BOGUS STRING_ARG 2832 { 2833 #ifdef USE_IPSECMOD 2834 OUTYY(("P(server_ipsecmod_ignore_bogus:%s)\n", $2)); 2835 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2836 yyerror("expected yes or no."); 2837 else cfg_parser->cfg->ipsecmod_ignore_bogus = (strcmp($2, "yes")==0); 2838 #else 2839 OUTYY(("P(Compiled without IPsec module, ignoring)\n")); 2840 #endif 2841 free($2); 2842 } 2843 ; 2844 server_ipsecmod_hook: VAR_IPSECMOD_HOOK STRING_ARG 2845 { 2846 #ifdef USE_IPSECMOD 2847 OUTYY(("P(server_ipsecmod_hook:%s)\n", $2)); 2848 free(cfg_parser->cfg->ipsecmod_hook); 2849 cfg_parser->cfg->ipsecmod_hook = $2; 2850 #else 2851 OUTYY(("P(Compiled without IPsec module, ignoring)\n")); 2852 free($2); 2853 #endif 2854 } 2855 ; 2856 server_ipsecmod_max_ttl: VAR_IPSECMOD_MAX_TTL STRING_ARG 2857 { 2858 #ifdef USE_IPSECMOD 2859 OUTYY(("P(server_ipsecmod_max_ttl:%s)\n", $2)); 2860 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2861 yyerror("number expected"); 2862 else cfg_parser->cfg->ipsecmod_max_ttl = atoi($2); 2863 free($2); 2864 #else 2865 OUTYY(("P(Compiled without IPsec module, ignoring)\n")); 2866 free($2); 2867 #endif 2868 } 2869 ; 2870 server_ipsecmod_whitelist: VAR_IPSECMOD_WHITELIST STRING_ARG 2871 { 2872 #ifdef USE_IPSECMOD 2873 OUTYY(("P(server_ipsecmod_whitelist:%s)\n", $2)); 2874 if(!cfg_strlist_insert(&cfg_parser->cfg->ipsecmod_whitelist, $2)) 2875 yyerror("out of memory"); 2876 #else 2877 OUTYY(("P(Compiled without IPsec module, ignoring)\n")); 2878 free($2); 2879 #endif 2880 } 2881 ; 2882 server_ipsecmod_strict: VAR_IPSECMOD_STRICT STRING_ARG 2883 { 2884 #ifdef USE_IPSECMOD 2885 OUTYY(("P(server_ipsecmod_strict:%s)\n", $2)); 2886 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2887 yyerror("expected yes or no."); 2888 else cfg_parser->cfg->ipsecmod_strict = (strcmp($2, "yes")==0); 2889 free($2); 2890 #else 2891 OUTYY(("P(Compiled without IPsec module, ignoring)\n")); 2892 free($2); 2893 #endif 2894 } 2895 ; 2896 server_edns_client_string: VAR_EDNS_CLIENT_STRING STRING_ARG STRING_ARG 2897 { 2898 OUTYY(("P(server_edns_client_string:%s %s)\n", $2, $3)); 2899 if(!cfg_str2list_insert( 2900 &cfg_parser->cfg->edns_client_strings, $2, $3)) 2901 fatal_exit("out of memory adding " 2902 "edns-client-string"); 2903 } 2904 ; 2905 server_edns_client_string_opcode: VAR_EDNS_CLIENT_STRING_OPCODE STRING_ARG 2906 { 2907 OUTYY(("P(edns_client_string_opcode:%s)\n", $2)); 2908 if(atoi($2) == 0 && strcmp($2, "0") != 0) 2909 yyerror("option code expected"); 2910 else if(atoi($2) > 65535 || atoi($2) < 0) 2911 yyerror("option code must be in interval [0, 65535]"); 2912 else cfg_parser->cfg->edns_client_string_opcode = atoi($2); 2913 free($2); 2914 } 2915 ; 2916 server_ede: VAR_EDE STRING_ARG 2917 { 2918 OUTYY(("P(server_ede:%s)\n", $2)); 2919 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2920 yyerror("expected yes or no."); 2921 else cfg_parser->cfg->ede = (strcmp($2, "yes")==0); 2922 free($2); 2923 } 2924 ; 2925 server_proxy_protocol_port: VAR_PROXY_PROTOCOL_PORT STRING_ARG 2926 { 2927 OUTYY(("P(server_proxy_protocol_port:%s)\n", $2)); 2928 if(!cfg_strlist_insert(&cfg_parser->cfg->proxy_protocol_port, $2)) 2929 yyerror("out of memory"); 2930 } 2931 ; 2932 stub_name: VAR_NAME STRING_ARG 2933 { 2934 OUTYY(("P(name:%s)\n", $2)); 2935 if(cfg_parser->cfg->stubs->name) 2936 yyerror("stub name override, there must be one name " 2937 "for one stub-zone"); 2938 free(cfg_parser->cfg->stubs->name); 2939 cfg_parser->cfg->stubs->name = $2; 2940 } 2941 ; 2942 stub_host: VAR_STUB_HOST STRING_ARG 2943 { 2944 OUTYY(("P(stub-host:%s)\n", $2)); 2945 if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->hosts, $2)) 2946 yyerror("out of memory"); 2947 } 2948 ; 2949 stub_addr: VAR_STUB_ADDR STRING_ARG 2950 { 2951 OUTYY(("P(stub-addr:%s)\n", $2)); 2952 if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->addrs, $2)) 2953 yyerror("out of memory"); 2954 } 2955 ; 2956 stub_first: VAR_STUB_FIRST STRING_ARG 2957 { 2958 OUTYY(("P(stub-first:%s)\n", $2)); 2959 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2960 yyerror("expected yes or no."); 2961 else cfg_parser->cfg->stubs->isfirst=(strcmp($2, "yes")==0); 2962 free($2); 2963 } 2964 ; 2965 stub_no_cache: VAR_STUB_NO_CACHE STRING_ARG 2966 { 2967 OUTYY(("P(stub-no-cache:%s)\n", $2)); 2968 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2969 yyerror("expected yes or no."); 2970 else cfg_parser->cfg->stubs->no_cache=(strcmp($2, "yes")==0); 2971 free($2); 2972 } 2973 ; 2974 stub_ssl_upstream: VAR_STUB_SSL_UPSTREAM STRING_ARG 2975 { 2976 OUTYY(("P(stub-ssl-upstream:%s)\n", $2)); 2977 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2978 yyerror("expected yes or no."); 2979 else cfg_parser->cfg->stubs->ssl_upstream = 2980 (strcmp($2, "yes")==0); 2981 free($2); 2982 } 2983 ; 2984 stub_tcp_upstream: VAR_STUB_TCP_UPSTREAM STRING_ARG 2985 { 2986 OUTYY(("P(stub-tcp-upstream:%s)\n", $2)); 2987 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2988 yyerror("expected yes or no."); 2989 else cfg_parser->cfg->stubs->tcp_upstream = 2990 (strcmp($2, "yes")==0); 2991 free($2); 2992 } 2993 ; 2994 stub_prime: VAR_STUB_PRIME STRING_ARG 2995 { 2996 OUTYY(("P(stub-prime:%s)\n", $2)); 2997 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 2998 yyerror("expected yes or no."); 2999 else cfg_parser->cfg->stubs->isprime = 3000 (strcmp($2, "yes")==0); 3001 free($2); 3002 } 3003 ; 3004 forward_name: VAR_NAME STRING_ARG 3005 { 3006 OUTYY(("P(name:%s)\n", $2)); 3007 if(cfg_parser->cfg->forwards->name) 3008 yyerror("forward name override, there must be one " 3009 "name for one forward-zone"); 3010 free(cfg_parser->cfg->forwards->name); 3011 cfg_parser->cfg->forwards->name = $2; 3012 } 3013 ; 3014 forward_host: VAR_FORWARD_HOST STRING_ARG 3015 { 3016 OUTYY(("P(forward-host:%s)\n", $2)); 3017 if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->hosts, $2)) 3018 yyerror("out of memory"); 3019 } 3020 ; 3021 forward_addr: VAR_FORWARD_ADDR STRING_ARG 3022 { 3023 OUTYY(("P(forward-addr:%s)\n", $2)); 3024 if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->addrs, $2)) 3025 yyerror("out of memory"); 3026 } 3027 ; 3028 forward_first: VAR_FORWARD_FIRST STRING_ARG 3029 { 3030 OUTYY(("P(forward-first:%s)\n", $2)); 3031 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3032 yyerror("expected yes or no."); 3033 else cfg_parser->cfg->forwards->isfirst=(strcmp($2, "yes")==0); 3034 free($2); 3035 } 3036 ; 3037 forward_no_cache: VAR_FORWARD_NO_CACHE STRING_ARG 3038 { 3039 OUTYY(("P(forward-no-cache:%s)\n", $2)); 3040 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3041 yyerror("expected yes or no."); 3042 else cfg_parser->cfg->forwards->no_cache=(strcmp($2, "yes")==0); 3043 free($2); 3044 } 3045 ; 3046 forward_ssl_upstream: VAR_FORWARD_SSL_UPSTREAM STRING_ARG 3047 { 3048 OUTYY(("P(forward-ssl-upstream:%s)\n", $2)); 3049 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3050 yyerror("expected yes or no."); 3051 else cfg_parser->cfg->forwards->ssl_upstream = 3052 (strcmp($2, "yes")==0); 3053 free($2); 3054 } 3055 ; 3056 forward_tcp_upstream: VAR_FORWARD_TCP_UPSTREAM STRING_ARG 3057 { 3058 OUTYY(("P(forward-tcp-upstream:%s)\n", $2)); 3059 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3060 yyerror("expected yes or no."); 3061 else cfg_parser->cfg->forwards->tcp_upstream = 3062 (strcmp($2, "yes")==0); 3063 free($2); 3064 } 3065 ; 3066 auth_name: VAR_NAME STRING_ARG 3067 { 3068 OUTYY(("P(name:%s)\n", $2)); 3069 if(cfg_parser->cfg->auths->name) 3070 yyerror("auth name override, there must be one name " 3071 "for one auth-zone"); 3072 free(cfg_parser->cfg->auths->name); 3073 cfg_parser->cfg->auths->name = $2; 3074 } 3075 ; 3076 auth_zonefile: VAR_ZONEFILE STRING_ARG 3077 { 3078 OUTYY(("P(zonefile:%s)\n", $2)); 3079 free(cfg_parser->cfg->auths->zonefile); 3080 cfg_parser->cfg->auths->zonefile = $2; 3081 } 3082 ; 3083 auth_master: VAR_MASTER STRING_ARG 3084 { 3085 OUTYY(("P(master:%s)\n", $2)); 3086 if(!cfg_strlist_insert(&cfg_parser->cfg->auths->masters, $2)) 3087 yyerror("out of memory"); 3088 } 3089 ; 3090 auth_url: VAR_URL STRING_ARG 3091 { 3092 OUTYY(("P(url:%s)\n", $2)); 3093 if(!cfg_strlist_insert(&cfg_parser->cfg->auths->urls, $2)) 3094 yyerror("out of memory"); 3095 } 3096 ; 3097 auth_allow_notify: VAR_ALLOW_NOTIFY STRING_ARG 3098 { 3099 OUTYY(("P(allow-notify:%s)\n", $2)); 3100 if(!cfg_strlist_insert(&cfg_parser->cfg->auths->allow_notify, 3101 $2)) 3102 yyerror("out of memory"); 3103 } 3104 ; 3105 auth_zonemd_check: VAR_ZONEMD_CHECK STRING_ARG 3106 { 3107 OUTYY(("P(zonemd-check:%s)\n", $2)); 3108 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3109 yyerror("expected yes or no."); 3110 else cfg_parser->cfg->auths->zonemd_check = 3111 (strcmp($2, "yes")==0); 3112 free($2); 3113 } 3114 ; 3115 auth_zonemd_reject_absence: VAR_ZONEMD_REJECT_ABSENCE STRING_ARG 3116 { 3117 OUTYY(("P(zonemd-reject-absence:%s)\n", $2)); 3118 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3119 yyerror("expected yes or no."); 3120 else cfg_parser->cfg->auths->zonemd_reject_absence = 3121 (strcmp($2, "yes")==0); 3122 free($2); 3123 } 3124 ; 3125 auth_for_downstream: VAR_FOR_DOWNSTREAM STRING_ARG 3126 { 3127 OUTYY(("P(for-downstream:%s)\n", $2)); 3128 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3129 yyerror("expected yes or no."); 3130 else cfg_parser->cfg->auths->for_downstream = 3131 (strcmp($2, "yes")==0); 3132 free($2); 3133 } 3134 ; 3135 auth_for_upstream: VAR_FOR_UPSTREAM STRING_ARG 3136 { 3137 OUTYY(("P(for-upstream:%s)\n", $2)); 3138 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3139 yyerror("expected yes or no."); 3140 else cfg_parser->cfg->auths->for_upstream = 3141 (strcmp($2, "yes")==0); 3142 free($2); 3143 } 3144 ; 3145 auth_fallback_enabled: VAR_FALLBACK_ENABLED STRING_ARG 3146 { 3147 OUTYY(("P(fallback-enabled:%s)\n", $2)); 3148 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3149 yyerror("expected yes or no."); 3150 else cfg_parser->cfg->auths->fallback_enabled = 3151 (strcmp($2, "yes")==0); 3152 free($2); 3153 } 3154 ; 3155 view_name: VAR_NAME STRING_ARG 3156 { 3157 OUTYY(("P(name:%s)\n", $2)); 3158 if(cfg_parser->cfg->views->name) 3159 yyerror("view name override, there must be one " 3160 "name for one view"); 3161 free(cfg_parser->cfg->views->name); 3162 cfg_parser->cfg->views->name = $2; 3163 } 3164 ; 3165 view_local_zone: VAR_LOCAL_ZONE STRING_ARG STRING_ARG 3166 { 3167 OUTYY(("P(view_local_zone:%s %s)\n", $2, $3)); 3168 if(strcmp($3, "static")!=0 && strcmp($3, "deny")!=0 && 3169 strcmp($3, "refuse")!=0 && strcmp($3, "redirect")!=0 && 3170 strcmp($3, "transparent")!=0 && strcmp($3, "nodefault")!=0 3171 && strcmp($3, "typetransparent")!=0 3172 && strcmp($3, "always_transparent")!=0 3173 && strcmp($3, "always_refuse")!=0 3174 && strcmp($3, "always_nxdomain")!=0 3175 && strcmp($3, "always_nodata")!=0 3176 && strcmp($3, "always_deny")!=0 3177 && strcmp($3, "always_null")!=0 3178 && strcmp($3, "noview")!=0 3179 && strcmp($3, "inform")!=0 && strcmp($3, "inform_deny")!=0 3180 && strcmp($3, "inform_redirect") != 0 3181 && strcmp($3, "ipset") != 0) { 3182 yyerror("local-zone type: expected static, deny, " 3183 "refuse, redirect, transparent, " 3184 "typetransparent, inform, inform_deny, " 3185 "inform_redirect, always_transparent, " 3186 "always_refuse, always_nxdomain, " 3187 "always_nodata, always_deny, always_null, " 3188 "noview, nodefault or ipset"); 3189 free($2); 3190 free($3); 3191 } else if(strcmp($3, "nodefault")==0) { 3192 if(!cfg_strlist_insert(&cfg_parser->cfg->views-> 3193 local_zones_nodefault, $2)) 3194 fatal_exit("out of memory adding local-zone"); 3195 free($3); 3196 #ifdef USE_IPSET 3197 } else if(strcmp($3, "ipset")==0) { 3198 size_t len = strlen($2); 3199 /* Make sure to add the trailing dot. 3200 * These are str compared to domain names. */ 3201 if($2[len-1] != '.') { 3202 if(!($2 = realloc($2, len+2))) { 3203 fatal_exit("out of memory adding local-zone"); 3204 } 3205 $2[len] = '.'; 3206 $2[len+1] = 0; 3207 } 3208 if(!cfg_strlist_insert(&cfg_parser->cfg->views-> 3209 local_zones_ipset, $2)) 3210 fatal_exit("out of memory adding local-zone"); 3211 free($3); 3212 #endif 3213 } else { 3214 if(!cfg_str2list_insert( 3215 &cfg_parser->cfg->views->local_zones, 3216 $2, $3)) 3217 fatal_exit("out of memory adding local-zone"); 3218 } 3219 } 3220 ; 3221 view_response_ip: VAR_RESPONSE_IP STRING_ARG STRING_ARG 3222 { 3223 OUTYY(("P(view_response_ip:%s %s)\n", $2, $3)); 3224 validate_respip_action($3); 3225 if(!cfg_str2list_insert( 3226 &cfg_parser->cfg->views->respip_actions, $2, $3)) 3227 fatal_exit("out of memory adding per-view " 3228 "response-ip action"); 3229 } 3230 ; 3231 view_response_ip_data: VAR_RESPONSE_IP_DATA STRING_ARG STRING_ARG 3232 { 3233 OUTYY(("P(view_response_ip_data:%s)\n", $2)); 3234 if(!cfg_str2list_insert( 3235 &cfg_parser->cfg->views->respip_data, $2, $3)) 3236 fatal_exit("out of memory adding response-ip-data"); 3237 } 3238 ; 3239 view_local_data: VAR_LOCAL_DATA STRING_ARG 3240 { 3241 OUTYY(("P(view_local_data:%s)\n", $2)); 3242 if(!cfg_strlist_insert(&cfg_parser->cfg->views->local_data, $2)) { 3243 fatal_exit("out of memory adding local-data"); 3244 } 3245 } 3246 ; 3247 view_local_data_ptr: VAR_LOCAL_DATA_PTR STRING_ARG 3248 { 3249 char* ptr; 3250 OUTYY(("P(view_local_data_ptr:%s)\n", $2)); 3251 ptr = cfg_ptr_reverse($2); 3252 free($2); 3253 if(ptr) { 3254 if(!cfg_strlist_insert(&cfg_parser->cfg->views-> 3255 local_data, ptr)) 3256 fatal_exit("out of memory adding local-data"); 3257 } else { 3258 yyerror("local-data-ptr could not be reversed"); 3259 } 3260 } 3261 ; 3262 view_first: VAR_VIEW_FIRST STRING_ARG 3263 { 3264 OUTYY(("P(view-first:%s)\n", $2)); 3265 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3266 yyerror("expected yes or no."); 3267 else cfg_parser->cfg->views->isfirst=(strcmp($2, "yes")==0); 3268 free($2); 3269 } 3270 ; 3271 rcstart: VAR_REMOTE_CONTROL 3272 { 3273 OUTYY(("\nP(remote-control:)\n")); 3274 cfg_parser->started_toplevel = 1; 3275 } 3276 ; 3277 contents_rc: contents_rc content_rc 3278 | ; 3279 content_rc: rc_control_enable | rc_control_interface | rc_control_port | 3280 rc_server_key_file | rc_server_cert_file | rc_control_key_file | 3281 rc_control_cert_file | rc_control_use_cert 3282 ; 3283 rc_control_enable: VAR_CONTROL_ENABLE STRING_ARG 3284 { 3285 OUTYY(("P(control_enable:%s)\n", $2)); 3286 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3287 yyerror("expected yes or no."); 3288 else cfg_parser->cfg->remote_control_enable = 3289 (strcmp($2, "yes")==0); 3290 free($2); 3291 } 3292 ; 3293 rc_control_port: VAR_CONTROL_PORT STRING_ARG 3294 { 3295 OUTYY(("P(control_port:%s)\n", $2)); 3296 if(atoi($2) == 0) 3297 yyerror("control port number expected"); 3298 else cfg_parser->cfg->control_port = atoi($2); 3299 free($2); 3300 } 3301 ; 3302 rc_control_interface: VAR_CONTROL_INTERFACE STRING_ARG 3303 { 3304 OUTYY(("P(control_interface:%s)\n", $2)); 3305 if(!cfg_strlist_append(&cfg_parser->cfg->control_ifs, $2)) 3306 yyerror("out of memory"); 3307 } 3308 ; 3309 rc_control_use_cert: VAR_CONTROL_USE_CERT STRING_ARG 3310 { 3311 OUTYY(("P(control_use_cert:%s)\n", $2)); 3312 cfg_parser->cfg->control_use_cert = (strcmp($2, "yes")==0); 3313 free($2); 3314 } 3315 ; 3316 rc_server_key_file: VAR_SERVER_KEY_FILE STRING_ARG 3317 { 3318 OUTYY(("P(rc_server_key_file:%s)\n", $2)); 3319 free(cfg_parser->cfg->server_key_file); 3320 cfg_parser->cfg->server_key_file = $2; 3321 } 3322 ; 3323 rc_server_cert_file: VAR_SERVER_CERT_FILE STRING_ARG 3324 { 3325 OUTYY(("P(rc_server_cert_file:%s)\n", $2)); 3326 free(cfg_parser->cfg->server_cert_file); 3327 cfg_parser->cfg->server_cert_file = $2; 3328 } 3329 ; 3330 rc_control_key_file: VAR_CONTROL_KEY_FILE STRING_ARG 3331 { 3332 OUTYY(("P(rc_control_key_file:%s)\n", $2)); 3333 free(cfg_parser->cfg->control_key_file); 3334 cfg_parser->cfg->control_key_file = $2; 3335 } 3336 ; 3337 rc_control_cert_file: VAR_CONTROL_CERT_FILE STRING_ARG 3338 { 3339 OUTYY(("P(rc_control_cert_file:%s)\n", $2)); 3340 free(cfg_parser->cfg->control_cert_file); 3341 cfg_parser->cfg->control_cert_file = $2; 3342 } 3343 ; 3344 dtstart: VAR_DNSTAP 3345 { 3346 OUTYY(("\nP(dnstap:)\n")); 3347 cfg_parser->started_toplevel = 1; 3348 } 3349 ; 3350 contents_dt: contents_dt content_dt 3351 | ; 3352 content_dt: dt_dnstap_enable | dt_dnstap_socket_path | dt_dnstap_bidirectional | 3353 dt_dnstap_ip | dt_dnstap_tls | dt_dnstap_tls_server_name | 3354 dt_dnstap_tls_cert_bundle | 3355 dt_dnstap_tls_client_key_file | dt_dnstap_tls_client_cert_file | 3356 dt_dnstap_send_identity | dt_dnstap_send_version | 3357 dt_dnstap_identity | dt_dnstap_version | 3358 dt_dnstap_log_resolver_query_messages | 3359 dt_dnstap_log_resolver_response_messages | 3360 dt_dnstap_log_client_query_messages | 3361 dt_dnstap_log_client_response_messages | 3362 dt_dnstap_log_forwarder_query_messages | 3363 dt_dnstap_log_forwarder_response_messages 3364 ; 3365 dt_dnstap_enable: VAR_DNSTAP_ENABLE STRING_ARG 3366 { 3367 OUTYY(("P(dt_dnstap_enable:%s)\n", $2)); 3368 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3369 yyerror("expected yes or no."); 3370 else cfg_parser->cfg->dnstap = (strcmp($2, "yes")==0); 3371 free($2); 3372 } 3373 ; 3374 dt_dnstap_bidirectional: VAR_DNSTAP_BIDIRECTIONAL STRING_ARG 3375 { 3376 OUTYY(("P(dt_dnstap_bidirectional:%s)\n", $2)); 3377 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3378 yyerror("expected yes or no."); 3379 else cfg_parser->cfg->dnstap_bidirectional = 3380 (strcmp($2, "yes")==0); 3381 free($2); 3382 } 3383 ; 3384 dt_dnstap_socket_path: VAR_DNSTAP_SOCKET_PATH STRING_ARG 3385 { 3386 OUTYY(("P(dt_dnstap_socket_path:%s)\n", $2)); 3387 free(cfg_parser->cfg->dnstap_socket_path); 3388 cfg_parser->cfg->dnstap_socket_path = $2; 3389 } 3390 ; 3391 dt_dnstap_ip: VAR_DNSTAP_IP STRING_ARG 3392 { 3393 OUTYY(("P(dt_dnstap_ip:%s)\n", $2)); 3394 free(cfg_parser->cfg->dnstap_ip); 3395 cfg_parser->cfg->dnstap_ip = $2; 3396 } 3397 ; 3398 dt_dnstap_tls: VAR_DNSTAP_TLS STRING_ARG 3399 { 3400 OUTYY(("P(dt_dnstap_tls:%s)\n", $2)); 3401 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3402 yyerror("expected yes or no."); 3403 else cfg_parser->cfg->dnstap_tls = (strcmp($2, "yes")==0); 3404 free($2); 3405 } 3406 ; 3407 dt_dnstap_tls_server_name: VAR_DNSTAP_TLS_SERVER_NAME STRING_ARG 3408 { 3409 OUTYY(("P(dt_dnstap_tls_server_name:%s)\n", $2)); 3410 free(cfg_parser->cfg->dnstap_tls_server_name); 3411 cfg_parser->cfg->dnstap_tls_server_name = $2; 3412 } 3413 ; 3414 dt_dnstap_tls_cert_bundle: VAR_DNSTAP_TLS_CERT_BUNDLE STRING_ARG 3415 { 3416 OUTYY(("P(dt_dnstap_tls_cert_bundle:%s)\n", $2)); 3417 free(cfg_parser->cfg->dnstap_tls_cert_bundle); 3418 cfg_parser->cfg->dnstap_tls_cert_bundle = $2; 3419 } 3420 ; 3421 dt_dnstap_tls_client_key_file: VAR_DNSTAP_TLS_CLIENT_KEY_FILE STRING_ARG 3422 { 3423 OUTYY(("P(dt_dnstap_tls_client_key_file:%s)\n", $2)); 3424 free(cfg_parser->cfg->dnstap_tls_client_key_file); 3425 cfg_parser->cfg->dnstap_tls_client_key_file = $2; 3426 } 3427 ; 3428 dt_dnstap_tls_client_cert_file: VAR_DNSTAP_TLS_CLIENT_CERT_FILE STRING_ARG 3429 { 3430 OUTYY(("P(dt_dnstap_tls_client_cert_file:%s)\n", $2)); 3431 free(cfg_parser->cfg->dnstap_tls_client_cert_file); 3432 cfg_parser->cfg->dnstap_tls_client_cert_file = $2; 3433 } 3434 ; 3435 dt_dnstap_send_identity: VAR_DNSTAP_SEND_IDENTITY STRING_ARG 3436 { 3437 OUTYY(("P(dt_dnstap_send_identity:%s)\n", $2)); 3438 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3439 yyerror("expected yes or no."); 3440 else cfg_parser->cfg->dnstap_send_identity = (strcmp($2, "yes")==0); 3441 free($2); 3442 } 3443 ; 3444 dt_dnstap_send_version: VAR_DNSTAP_SEND_VERSION STRING_ARG 3445 { 3446 OUTYY(("P(dt_dnstap_send_version:%s)\n", $2)); 3447 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3448 yyerror("expected yes or no."); 3449 else cfg_parser->cfg->dnstap_send_version = (strcmp($2, "yes")==0); 3450 free($2); 3451 } 3452 ; 3453 dt_dnstap_identity: VAR_DNSTAP_IDENTITY STRING_ARG 3454 { 3455 OUTYY(("P(dt_dnstap_identity:%s)\n", $2)); 3456 free(cfg_parser->cfg->dnstap_identity); 3457 cfg_parser->cfg->dnstap_identity = $2; 3458 } 3459 ; 3460 dt_dnstap_version: VAR_DNSTAP_VERSION STRING_ARG 3461 { 3462 OUTYY(("P(dt_dnstap_version:%s)\n", $2)); 3463 free(cfg_parser->cfg->dnstap_version); 3464 cfg_parser->cfg->dnstap_version = $2; 3465 } 3466 ; 3467 dt_dnstap_log_resolver_query_messages: VAR_DNSTAP_LOG_RESOLVER_QUERY_MESSAGES STRING_ARG 3468 { 3469 OUTYY(("P(dt_dnstap_log_resolver_query_messages:%s)\n", $2)); 3470 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3471 yyerror("expected yes or no."); 3472 else cfg_parser->cfg->dnstap_log_resolver_query_messages = 3473 (strcmp($2, "yes")==0); 3474 free($2); 3475 } 3476 ; 3477 dt_dnstap_log_resolver_response_messages: VAR_DNSTAP_LOG_RESOLVER_RESPONSE_MESSAGES STRING_ARG 3478 { 3479 OUTYY(("P(dt_dnstap_log_resolver_response_messages:%s)\n", $2)); 3480 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3481 yyerror("expected yes or no."); 3482 else cfg_parser->cfg->dnstap_log_resolver_response_messages = 3483 (strcmp($2, "yes")==0); 3484 free($2); 3485 } 3486 ; 3487 dt_dnstap_log_client_query_messages: VAR_DNSTAP_LOG_CLIENT_QUERY_MESSAGES STRING_ARG 3488 { 3489 OUTYY(("P(dt_dnstap_log_client_query_messages:%s)\n", $2)); 3490 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3491 yyerror("expected yes or no."); 3492 else cfg_parser->cfg->dnstap_log_client_query_messages = 3493 (strcmp($2, "yes")==0); 3494 free($2); 3495 } 3496 ; 3497 dt_dnstap_log_client_response_messages: VAR_DNSTAP_LOG_CLIENT_RESPONSE_MESSAGES STRING_ARG 3498 { 3499 OUTYY(("P(dt_dnstap_log_client_response_messages:%s)\n", $2)); 3500 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3501 yyerror("expected yes or no."); 3502 else cfg_parser->cfg->dnstap_log_client_response_messages = 3503 (strcmp($2, "yes")==0); 3504 free($2); 3505 } 3506 ; 3507 dt_dnstap_log_forwarder_query_messages: VAR_DNSTAP_LOG_FORWARDER_QUERY_MESSAGES STRING_ARG 3508 { 3509 OUTYY(("P(dt_dnstap_log_forwarder_query_messages:%s)\n", $2)); 3510 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3511 yyerror("expected yes or no."); 3512 else cfg_parser->cfg->dnstap_log_forwarder_query_messages = 3513 (strcmp($2, "yes")==0); 3514 free($2); 3515 } 3516 ; 3517 dt_dnstap_log_forwarder_response_messages: VAR_DNSTAP_LOG_FORWARDER_RESPONSE_MESSAGES STRING_ARG 3518 { 3519 OUTYY(("P(dt_dnstap_log_forwarder_response_messages:%s)\n", $2)); 3520 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3521 yyerror("expected yes or no."); 3522 else cfg_parser->cfg->dnstap_log_forwarder_response_messages = 3523 (strcmp($2, "yes")==0); 3524 free($2); 3525 } 3526 ; 3527 pythonstart: VAR_PYTHON 3528 { 3529 OUTYY(("\nP(python:)\n")); 3530 cfg_parser->started_toplevel = 1; 3531 } 3532 ; 3533 contents_py: contents_py content_py 3534 | ; 3535 content_py: py_script 3536 ; 3537 py_script: VAR_PYTHON_SCRIPT STRING_ARG 3538 { 3539 OUTYY(("P(python-script:%s)\n", $2)); 3540 if(!cfg_strlist_append_ex(&cfg_parser->cfg->python_script, $2)) 3541 yyerror("out of memory"); 3542 } 3543 ; 3544 dynlibstart: VAR_DYNLIB 3545 { 3546 OUTYY(("\nP(dynlib:)\n")); 3547 cfg_parser->started_toplevel = 1; 3548 } 3549 ; 3550 contents_dl: contents_dl content_dl 3551 | ; 3552 content_dl: dl_file 3553 ; 3554 dl_file: VAR_DYNLIB_FILE STRING_ARG 3555 { 3556 OUTYY(("P(dynlib-file:%s)\n", $2)); 3557 if(!cfg_strlist_append_ex(&cfg_parser->cfg->dynlib_file, $2)) 3558 yyerror("out of memory"); 3559 } 3560 ; 3561 server_disable_dnssec_lame_check: VAR_DISABLE_DNSSEC_LAME_CHECK STRING_ARG 3562 { 3563 OUTYY(("P(disable_dnssec_lame_check:%s)\n", $2)); 3564 if (strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3565 yyerror("expected yes or no."); 3566 else cfg_parser->cfg->disable_dnssec_lame_check = 3567 (strcmp($2, "yes")==0); 3568 free($2); 3569 } 3570 ; 3571 server_log_identity: VAR_LOG_IDENTITY STRING_ARG 3572 { 3573 OUTYY(("P(server_log_identity:%s)\n", $2)); 3574 free(cfg_parser->cfg->log_identity); 3575 cfg_parser->cfg->log_identity = $2; 3576 } 3577 ; 3578 server_response_ip: VAR_RESPONSE_IP STRING_ARG STRING_ARG 3579 { 3580 OUTYY(("P(server_response_ip:%s %s)\n", $2, $3)); 3581 validate_respip_action($3); 3582 if(!cfg_str2list_insert(&cfg_parser->cfg->respip_actions, 3583 $2, $3)) 3584 fatal_exit("out of memory adding response-ip"); 3585 } 3586 ; 3587 server_response_ip_data: VAR_RESPONSE_IP_DATA STRING_ARG STRING_ARG 3588 { 3589 OUTYY(("P(server_response_ip_data:%s)\n", $2)); 3590 if(!cfg_str2list_insert(&cfg_parser->cfg->respip_data, 3591 $2, $3)) 3592 fatal_exit("out of memory adding response-ip-data"); 3593 } 3594 ; 3595 dnscstart: VAR_DNSCRYPT 3596 { 3597 OUTYY(("\nP(dnscrypt:)\n")); 3598 cfg_parser->started_toplevel = 1; 3599 } 3600 ; 3601 contents_dnsc: contents_dnsc content_dnsc 3602 | ; 3603 content_dnsc: 3604 dnsc_dnscrypt_enable | dnsc_dnscrypt_port | dnsc_dnscrypt_provider | 3605 dnsc_dnscrypt_secret_key | dnsc_dnscrypt_provider_cert | 3606 dnsc_dnscrypt_provider_cert_rotated | 3607 dnsc_dnscrypt_shared_secret_cache_size | 3608 dnsc_dnscrypt_shared_secret_cache_slabs | 3609 dnsc_dnscrypt_nonce_cache_size | 3610 dnsc_dnscrypt_nonce_cache_slabs 3611 ; 3612 dnsc_dnscrypt_enable: VAR_DNSCRYPT_ENABLE STRING_ARG 3613 { 3614 OUTYY(("P(dnsc_dnscrypt_enable:%s)\n", $2)); 3615 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3616 yyerror("expected yes or no."); 3617 else cfg_parser->cfg->dnscrypt = (strcmp($2, "yes")==0); 3618 free($2); 3619 } 3620 ; 3621 dnsc_dnscrypt_port: VAR_DNSCRYPT_PORT STRING_ARG 3622 { 3623 OUTYY(("P(dnsc_dnscrypt_port:%s)\n", $2)); 3624 if(atoi($2) == 0) 3625 yyerror("port number expected"); 3626 else cfg_parser->cfg->dnscrypt_port = atoi($2); 3627 free($2); 3628 } 3629 ; 3630 dnsc_dnscrypt_provider: VAR_DNSCRYPT_PROVIDER STRING_ARG 3631 { 3632 OUTYY(("P(dnsc_dnscrypt_provider:%s)\n", $2)); 3633 free(cfg_parser->cfg->dnscrypt_provider); 3634 cfg_parser->cfg->dnscrypt_provider = $2; 3635 } 3636 ; 3637 dnsc_dnscrypt_provider_cert: VAR_DNSCRYPT_PROVIDER_CERT STRING_ARG 3638 { 3639 OUTYY(("P(dnsc_dnscrypt_provider_cert:%s)\n", $2)); 3640 if(cfg_strlist_find(cfg_parser->cfg->dnscrypt_provider_cert, $2)) 3641 log_warn("dnscrypt-provider-cert %s is a duplicate", $2); 3642 if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert, $2)) 3643 fatal_exit("out of memory adding dnscrypt-provider-cert"); 3644 } 3645 ; 3646 dnsc_dnscrypt_provider_cert_rotated: VAR_DNSCRYPT_PROVIDER_CERT_ROTATED STRING_ARG 3647 { 3648 OUTYY(("P(dnsc_dnscrypt_provider_cert_rotated:%s)\n", $2)); 3649 if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert_rotated, $2)) 3650 fatal_exit("out of memory adding dnscrypt-provider-cert-rotated"); 3651 } 3652 ; 3653 dnsc_dnscrypt_secret_key: VAR_DNSCRYPT_SECRET_KEY STRING_ARG 3654 { 3655 OUTYY(("P(dnsc_dnscrypt_secret_key:%s)\n", $2)); 3656 if(cfg_strlist_find(cfg_parser->cfg->dnscrypt_secret_key, $2)) 3657 log_warn("dnscrypt-secret-key: %s is a duplicate", $2); 3658 if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_secret_key, $2)) 3659 fatal_exit("out of memory adding dnscrypt-secret-key"); 3660 } 3661 ; 3662 dnsc_dnscrypt_shared_secret_cache_size: VAR_DNSCRYPT_SHARED_SECRET_CACHE_SIZE STRING_ARG 3663 { 3664 OUTYY(("P(dnscrypt_shared_secret_cache_size:%s)\n", $2)); 3665 if(!cfg_parse_memsize($2, &cfg_parser->cfg->dnscrypt_shared_secret_cache_size)) 3666 yyerror("memory size expected"); 3667 free($2); 3668 } 3669 ; 3670 dnsc_dnscrypt_shared_secret_cache_slabs: VAR_DNSCRYPT_SHARED_SECRET_CACHE_SLABS STRING_ARG 3671 { 3672 OUTYY(("P(dnscrypt_shared_secret_cache_slabs:%s)\n", $2)); 3673 if(atoi($2) == 0) { 3674 yyerror("number expected"); 3675 } else { 3676 cfg_parser->cfg->dnscrypt_shared_secret_cache_slabs = atoi($2); 3677 if(!is_pow2(cfg_parser->cfg->dnscrypt_shared_secret_cache_slabs)) 3678 yyerror("must be a power of 2"); 3679 } 3680 free($2); 3681 } 3682 ; 3683 dnsc_dnscrypt_nonce_cache_size: VAR_DNSCRYPT_NONCE_CACHE_SIZE STRING_ARG 3684 { 3685 OUTYY(("P(dnscrypt_nonce_cache_size:%s)\n", $2)); 3686 if(!cfg_parse_memsize($2, &cfg_parser->cfg->dnscrypt_nonce_cache_size)) 3687 yyerror("memory size expected"); 3688 free($2); 3689 } 3690 ; 3691 dnsc_dnscrypt_nonce_cache_slabs: VAR_DNSCRYPT_NONCE_CACHE_SLABS STRING_ARG 3692 { 3693 OUTYY(("P(dnscrypt_nonce_cache_slabs:%s)\n", $2)); 3694 if(atoi($2) == 0) { 3695 yyerror("number expected"); 3696 } else { 3697 cfg_parser->cfg->dnscrypt_nonce_cache_slabs = atoi($2); 3698 if(!is_pow2(cfg_parser->cfg->dnscrypt_nonce_cache_slabs)) 3699 yyerror("must be a power of 2"); 3700 } 3701 free($2); 3702 } 3703 ; 3704 cachedbstart: VAR_CACHEDB 3705 { 3706 OUTYY(("\nP(cachedb:)\n")); 3707 cfg_parser->started_toplevel = 1; 3708 } 3709 ; 3710 contents_cachedb: contents_cachedb content_cachedb 3711 | ; 3712 content_cachedb: cachedb_backend_name | cachedb_secret_seed | 3713 redis_server_host | redis_server_port | redis_timeout | 3714 redis_expire_records | redis_server_path | redis_server_password | 3715 cachedb_no_store | redis_logical_db 3716 ; 3717 cachedb_backend_name: VAR_CACHEDB_BACKEND STRING_ARG 3718 { 3719 #ifdef USE_CACHEDB 3720 OUTYY(("P(backend:%s)\n", $2)); 3721 free(cfg_parser->cfg->cachedb_backend); 3722 cfg_parser->cfg->cachedb_backend = $2; 3723 #else 3724 OUTYY(("P(Compiled without cachedb, ignoring)\n")); 3725 free($2); 3726 #endif 3727 } 3728 ; 3729 cachedb_secret_seed: VAR_CACHEDB_SECRETSEED STRING_ARG 3730 { 3731 #ifdef USE_CACHEDB 3732 OUTYY(("P(secret-seed:%s)\n", $2)); 3733 free(cfg_parser->cfg->cachedb_secret); 3734 cfg_parser->cfg->cachedb_secret = $2; 3735 #else 3736 OUTYY(("P(Compiled without cachedb, ignoring)\n")); 3737 free($2); 3738 #endif 3739 } 3740 ; 3741 cachedb_no_store: VAR_CACHEDB_NO_STORE STRING_ARG 3742 { 3743 #ifdef USE_CACHEDB 3744 OUTYY(("P(cachedb_no_store:%s)\n", $2)); 3745 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3746 yyerror("expected yes or no."); 3747 else cfg_parser->cfg->cachedb_no_store = (strcmp($2, "yes")==0); 3748 #else 3749 OUTYY(("P(Compiled without cachedb, ignoring)\n")); 3750 #endif 3751 free($2); 3752 } 3753 ; 3754 redis_server_host: VAR_CACHEDB_REDISHOST STRING_ARG 3755 { 3756 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3757 OUTYY(("P(redis_server_host:%s)\n", $2)); 3758 free(cfg_parser->cfg->redis_server_host); 3759 cfg_parser->cfg->redis_server_host = $2; 3760 #else 3761 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3762 free($2); 3763 #endif 3764 } 3765 ; 3766 redis_server_port: VAR_CACHEDB_REDISPORT STRING_ARG 3767 { 3768 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3769 int port; 3770 OUTYY(("P(redis_server_port:%s)\n", $2)); 3771 port = atoi($2); 3772 if(port == 0 || port < 0 || port > 65535) 3773 yyerror("valid redis server port number expected"); 3774 else cfg_parser->cfg->redis_server_port = port; 3775 #else 3776 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3777 #endif 3778 free($2); 3779 } 3780 ; 3781 redis_server_path: VAR_CACHEDB_REDISPATH STRING_ARG 3782 { 3783 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3784 OUTYY(("P(redis_server_path:%s)\n", $2)); 3785 free(cfg_parser->cfg->redis_server_path); 3786 cfg_parser->cfg->redis_server_path = $2; 3787 #else 3788 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3789 free($2); 3790 #endif 3791 } 3792 ; 3793 redis_server_password: VAR_CACHEDB_REDISPASSWORD STRING_ARG 3794 { 3795 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3796 OUTYY(("P(redis_server_password:%s)\n", $2)); 3797 free(cfg_parser->cfg->redis_server_password); 3798 cfg_parser->cfg->redis_server_password = $2; 3799 #else 3800 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3801 free($2); 3802 #endif 3803 } 3804 ; 3805 redis_timeout: VAR_CACHEDB_REDISTIMEOUT STRING_ARG 3806 { 3807 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3808 OUTYY(("P(redis_timeout:%s)\n", $2)); 3809 if(atoi($2) == 0) 3810 yyerror("redis timeout value expected"); 3811 else cfg_parser->cfg->redis_timeout = atoi($2); 3812 #else 3813 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3814 #endif 3815 free($2); 3816 } 3817 ; 3818 redis_expire_records: VAR_CACHEDB_REDISEXPIRERECORDS STRING_ARG 3819 { 3820 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3821 OUTYY(("P(redis_expire_records:%s)\n", $2)); 3822 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3823 yyerror("expected yes or no."); 3824 else cfg_parser->cfg->redis_expire_records = (strcmp($2, "yes")==0); 3825 #else 3826 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3827 #endif 3828 free($2); 3829 } 3830 ; 3831 redis_logical_db: VAR_CACHEDB_REDISLOGICALDB STRING_ARG 3832 { 3833 #if defined(USE_CACHEDB) && defined(USE_REDIS) 3834 int db; 3835 OUTYY(("P(redis_logical_db:%s)\n", $2)); 3836 db = atoi($2); 3837 if((db == 0 && strcmp($2, "0") != 0) || db < 0) 3838 yyerror("valid redis logical database index expected"); 3839 else cfg_parser->cfg->redis_logical_db = db; 3840 #else 3841 OUTYY(("P(Compiled without cachedb or redis, ignoring)\n")); 3842 #endif 3843 free($2); 3844 } 3845 ; 3846 server_tcp_connection_limit: VAR_TCP_CONNECTION_LIMIT STRING_ARG STRING_ARG 3847 { 3848 OUTYY(("P(server_tcp_connection_limit:%s %s)\n", $2, $3)); 3849 if (atoi($3) < 0) 3850 yyerror("positive number expected"); 3851 else { 3852 if(!cfg_str2list_insert(&cfg_parser->cfg->tcp_connection_limits, $2, $3)) 3853 fatal_exit("out of memory adding tcp connection limit"); 3854 } 3855 } 3856 ; 3857 server_answer_cookie: VAR_ANSWER_COOKIE STRING_ARG 3858 { 3859 OUTYY(("P(server_answer_cookie:%s)\n", $2)); 3860 if(strcmp($2, "yes") != 0 && strcmp($2, "no") != 0) 3861 yyerror("expected yes or no."); 3862 else cfg_parser->cfg->do_answer_cookie = (strcmp($2, "yes")==0); 3863 free($2); 3864 } 3865 ; 3866 server_cookie_secret: VAR_COOKIE_SECRET STRING_ARG 3867 { 3868 uint8_t secret[32]; 3869 size_t secret_len = sizeof(secret); 3870 3871 OUTYY(("P(server_cookie_secret:%s)\n", $2)); 3872 if(sldns_str2wire_hex_buf($2, secret, &secret_len) 3873 || (secret_len != 16)) 3874 yyerror("expected 128 bit hex string"); 3875 else { 3876 cfg_parser->cfg->cookie_secret_len = secret_len; 3877 memcpy(cfg_parser->cfg->cookie_secret, secret, sizeof(secret)); 3878 } 3879 free($2); 3880 } 3881 ; 3882 ipsetstart: VAR_IPSET 3883 { 3884 OUTYY(("\nP(ipset:)\n")); 3885 cfg_parser->started_toplevel = 1; 3886 } 3887 ; 3888 contents_ipset: contents_ipset content_ipset 3889 | ; 3890 content_ipset: ipset_name_v4 | ipset_name_v6 3891 ; 3892 ipset_name_v4: VAR_IPSET_NAME_V4 STRING_ARG 3893 { 3894 #ifdef USE_IPSET 3895 OUTYY(("P(name-v4:%s)\n", $2)); 3896 if(cfg_parser->cfg->ipset_name_v4) 3897 yyerror("ipset name v4 override, there must be one " 3898 "name for ip v4"); 3899 free(cfg_parser->cfg->ipset_name_v4); 3900 cfg_parser->cfg->ipset_name_v4 = $2; 3901 #else 3902 OUTYY(("P(Compiled without ipset, ignoring)\n")); 3903 free($2); 3904 #endif 3905 } 3906 ; 3907 ipset_name_v6: VAR_IPSET_NAME_V6 STRING_ARG 3908 { 3909 #ifdef USE_IPSET 3910 OUTYY(("P(name-v6:%s)\n", $2)); 3911 if(cfg_parser->cfg->ipset_name_v6) 3912 yyerror("ipset name v6 override, there must be one " 3913 "name for ip v6"); 3914 free(cfg_parser->cfg->ipset_name_v6); 3915 cfg_parser->cfg->ipset_name_v6 = $2; 3916 #else 3917 OUTYY(("P(Compiled without ipset, ignoring)\n")); 3918 free($2); 3919 #endif 3920 } 3921 ; 3922 %% 3923 3924 /* parse helper routines could be here */ 3925 static void 3926 validate_respip_action(const char* action) 3927 { 3928 if(strcmp(action, "deny")!=0 && 3929 strcmp(action, "redirect")!=0 && 3930 strcmp(action, "inform")!=0 && 3931 strcmp(action, "inform_deny")!=0 && 3932 strcmp(action, "always_transparent")!=0 && 3933 strcmp(action, "always_refuse")!=0 && 3934 strcmp(action, "always_nxdomain")!=0) 3935 { 3936 yyerror("response-ip action: expected deny, redirect, " 3937 "inform, inform_deny, always_transparent, " 3938 "always_refuse or always_nxdomain"); 3939 } 3940 } 3941 3942 static void 3943 validate_acl_action(const char* action) 3944 { 3945 if(strcmp(action, "deny")!=0 && 3946 strcmp(action, "refuse")!=0 && 3947 strcmp(action, "deny_non_local")!=0 && 3948 strcmp(action, "refuse_non_local")!=0 && 3949 strcmp(action, "allow_setrd")!=0 && 3950 strcmp(action, "allow")!=0 && 3951 strcmp(action, "allow_snoop")!=0 && 3952 strcmp(action, "allow_cookie")!=0) 3953 { 3954 yyerror("expected deny, refuse, deny_non_local, " 3955 "refuse_non_local, allow, allow_setrd, " 3956 "allow_snoop or allow_cookie as access control action"); 3957 } 3958 } 3959