summaryrefslogtreecommitdiff
path: root/src/or/config.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2006-07-07 17:33:30 +0000
committerNick Mathewson <nickm@torproject.org>2006-07-07 17:33:30 +0000
commita40ad152b1c1a955506eb9b14b881ae09a9ef3f5 (patch)
tree2817c40e29bd68eda578299c6a7c223f41aca4ae /src/or/config.c
parentf33c4f978133b39bd630e2df457438a616b22008 (diff)
downloadtor-a40ad152b1c1a955506eb9b14b881ae09a9ef3f5.tar.gz
tor-a40ad152b1c1a955506eb9b14b881ae09a9ef3f5.zip
When using eventdns: suppress logging of addresses when SafeLogging is active, and make set of nameservers configurable from torrc.
svn:r6744
Diffstat (limited to 'src/or/config.c')
-rw-r--r--src/or/config.c29
1 files changed, 29 insertions, 0 deletions
diff --git a/src/or/config.c b/src/or/config.c
index 31c150db4a..eda2631976 100644
--- a/src/or/config.c
+++ b/src/or/config.c
@@ -58,6 +58,7 @@ static config_abbrev_t _option_abbrevs[] = {
PLURAL(LongLivedPort),
PLURAL(HiddenServiceNode),
PLURAL(HiddenServiceExcludeNode),
+ PLURAL(Nameserver),
PLURAL(NumCpu),
PLURAL(RendNode),
PLURAL(RendExcludeNode),
@@ -191,6 +192,7 @@ static config_var_t _option_vars[] = {
OBSOLETE("MonthlyAccountingStart"),
VAR("MyFamily", STRING, MyFamily, NULL),
VAR("NewCircuitPeriod", INTERVAL, NewCircuitPeriod, "30 seconds"),
+ VAR("Nameservers", CSV, Nameservers, ""),
VAR("NamingAuthoritativeDirectory",BOOL, NamingAuthoritativeDir, "0"),
VAR("Nickname", STRING, Nickname, NULL),
VAR("NoPublish", BOOL, NoPublish, "0"),
@@ -1971,6 +1973,30 @@ validate_ports_csv(smartlist_t *sl, const char *name, char **msg)
return 0;
}
+/* Return 0 if every element of sl is a string holding an IP address, or if sl
+ * is NULL. Otherwise set *msg and return -1. */
+static int
+validate_ips_csv(smartlist_t *sl, const char *name, char **msg)
+{
+ char buf[1024];
+ tor_assert(name);
+
+ if (!sl)
+ return 0;
+
+ SMARTLIST_FOREACH(sl, const char *, cp,
+ {
+ struct in_addr in;
+ if (0 == tor_inet_aton(cp, &in)) {
+ int r = tor_snprintf(buf, sizeof(buf),
+ "Malformed address '%s' out of range in %s", cp, name);
+ *msg = tor_strdup(r >= 0 ? buf : "internal error");
+ return -1;
+ }
+ });
+ return 0;
+}
+
/** Lowest allowable value for RendPostPeriod; if this is too low, hidden
* services can overload the directory system. */
#define MIN_REND_POST_PERIOD (5*60)
@@ -2186,6 +2212,9 @@ options_validate(or_options_t *old_options, or_options_t *options,
if (validate_ports_csv(options->LongLivedPorts, "LongLivedPorts", msg) < 0)
return -1;
+ if (validate_ips_csv(options->Nameservers, "Nameservers", msg) < 0)
+ return -1;
+
if (options->FascistFirewall && !options->ReachableAddresses) {
if (smartlist_len(options->FirewallPorts)) {
/* We already have firewall ports set, so migrate them to