/** The list of connected clients. */
static struct list_head clients;
/** The whitelist/blacklist. */
-static struct list_head access_perm_list;
+static struct list_head http_acl;
/** Describes one client that connected the tcp port of the http sender. */
struct http_client {
struct in_addr addr;
/** The netmask for this entry. */
unsigned netmask;
- /** The position of this entry in the access_perm_list. */
+ /** The position of this entry in the acl. */
struct list_head node;
};
if (!v4_addr.s_addr)
goto no_match;
- list_for_each_entry_safe(ai, tmp, &access_perm_list, node)
+ list_for_each_entry_safe(ai, tmp, &http_acl, node)
if (v4_addr_match(v4_addr.s_addr, ai->addr.s_addr, ai->netmask))
return 1;
no_match:
{
struct access_info *ai, *tmp;
- list_for_each_entry_safe(ai, tmp, &access_perm_list, node) {
+ list_for_each_entry_safe(ai, tmp, &http_acl, node) {
char *nad = para_strdup(inet_ntoa(ai->addr));
if (!strcmp(nad, inet_ntoa(scd->addr)) &&
ai->netmask == scd->netmask) {
ai->netmask = scd->netmask;
PARA_INFO_LOG("adding %s/%i to access list\n", inet_ntoa(ai->addr),
ai->netmask);
- para_list_add(&ai->node, &access_perm_list);
+ para_list_add(&ai->node, &http_acl);
}
static int http_com_deny(struct sender_command_data *scd)
struct access_info *ai, *tmp_ai;
struct http_client *hc, *tmp_hc;
- list_for_each_entry_safe(ai, tmp_ai, &access_perm_list, node) {
+ list_for_each_entry_safe(ai, tmp_ai, &http_acl, node) {
char *tmp = make_message("%s%s/%d ", ap? ap : "",
inet_ntoa(ai->addr), ai->netmask);
free(ap);
int i;
struct sender_command_data scd;
- INIT_LIST_HEAD(&access_perm_list);
+ INIT_LIST_HEAD(&http_acl);
for (i = 0; i < conf.http_access_given; i++) {
char *arg = para_strdup(conf.http_access_arg[i]);
char *p = strchr(arg, '/');