#include <stdio.h>
#include <stdlib.h>
#include <string.h>
+#include <net/if.h>
#include <sys/socket.h>
-#include <map>
#include <string>
#include <utility>
+#include <unordered_map>
#include <vector>
+#include "tlse.h"
+
#include "acceptor.h"
#include "config.h"
+#include "input.h"
#include "log.h"
#include "parse.h"
using namespace std;
-#define DEFAULT_BACKLOG_SIZE 1048576
+#define DEFAULT_BACKLOG_SIZE 10485760
struct ConfigLine {
string keyword;
vector<string> arguments;
- map<string, string> parameters;
+ unordered_map<string, string> parameters;
};
namespace {
+bool parse_hostport(const string &hostport, sockaddr_in6 *addr)
+{
+ memset(addr, 0, sizeof(*addr));
+ addr->sin6_family = AF_INET6;
+
+ string port_string;
+
+ // See if the argument if on the type [ipv6addr]:port.
+ if (!hostport.empty() && hostport[0] == '[') {
+ size_t split = hostport.find("]:");
+ if (split == string::npos) {
+ log(ERROR, "address '%s' is malformed; must be either [ipv6addr]:port or ipv4addr:port");
+ return false;
+ }
+
+ string host(hostport.begin() + 1, hostport.begin() + split);
+ port_string = hostport.substr(split + 2);
+
+ if (inet_pton(AF_INET6, host.c_str(), &addr->sin6_addr) != 1) {
+ log(ERROR, "'%s' is not a valid IPv6 address");
+ return false;
+ }
+ } else {
+ // OK, then it must be ipv4addr:port.
+ size_t split = hostport.find(":");
+ if (split == string::npos) {
+ log(ERROR, "address '%s' is malformed; must be either [ipv6addr]:port or ipv4addr:port");
+ return false;
+ }
+
+ string host(hostport.begin(), hostport.begin() + split);
+ port_string = hostport.substr(split + 1);
+
+ // Parse to an IPv4 address, then construct a mapped-v4 address from that.
+ in_addr addr4;
+
+ if (inet_pton(AF_INET, host.c_str(), &addr4) != 1) {
+ log(ERROR, "'%s' is not a valid IPv4 address");
+ return false;
+ }
+
+ addr->sin6_addr.s6_addr32[2] = htonl(0xffff);
+ addr->sin6_addr.s6_addr32[3] = addr4.s_addr;
+ }
+
+ int port = stoi(port_string);
+ if (port < 1 || port >= 65536) {
+ log(ERROR, "port %d is out of range (must be [1,65536>).", port);
+ return false;
+ }
+ addr->sin6_port = ntohs(port);
+
+ return true;
+}
+
bool read_config(const string &filename, vector<ConfigLine> *lines)
{
FILE *fp = fopen(filename.c_str(), "r");
- if (fp == NULL) {
+ if (fp == nullptr) {
log_perror(filename.c_str());
return false;
}
char buf[4096];
while (!feof(fp)) {
- if (fgets(buf, sizeof(buf), fp) == NULL) {
+ if (fgets(buf, sizeof(buf), fp) == nullptr) {
break;
}
lines->push_back(line);
}
- fclose(fp);
+ if (fclose(fp) == EOF) {
+ log_perror(filename.c_str());
+ return false;
+ }
return true;
}
bool fetch_config_string(const vector<ConfigLine> &config, const string &keyword, string *value)
{
- for (unsigned i = 0; i < config.size(); ++i) {
- if (config[i].keyword != keyword) {
+ for (const ConfigLine &line : config) {
+ if (line.keyword != keyword) {
continue;
}
- if (config[i].parameters.size() > 0 ||
- config[i].arguments.size() != 1) {
+ if (line.parameters.size() > 0 ||
+ line.arguments.size() != 1) {
log(ERROR, "'%s' takes one argument and no parameters", keyword.c_str());
return false;
}
- *value = config[i].arguments[0];
+ *value = line.arguments[0];
return true;
}
return false;
bool fetch_config_int(const vector<ConfigLine> &config, const string &keyword, int *value)
{
- for (unsigned i = 0; i < config.size(); ++i) {
- if (config[i].keyword != keyword) {
+ for (const ConfigLine &line : config) {
+ if (line.keyword != keyword) {
continue;
}
- if (config[i].parameters.size() > 0 ||
- config[i].arguments.size() != 1) {
+ if (line.parameters.size() > 0 ||
+ line.arguments.size() != 1) {
log(ERROR, "'%s' takes one argument and no parameters", keyword.c_str());
return false;
}
- *value = atoi(config[i].arguments[0].c_str()); // TODO: verify int validity.
+ *value = stoi(line.arguments[0]); // TODO: verify int validity.
return true;
}
return false;
}
-bool parse_port(const ConfigLine &line, Config *config)
+bool load_file_to_string(const string &filename, size_t max_size, string *contents)
{
- if (line.arguments.size() != 1) {
- log(ERROR, "'port' takes exactly one argument");
- return false;
- }
+ contents->clear();
- int port = atoi(line.arguments[0].c_str());
- if (port < 1 || port >= 65536) {
- log(ERROR, "port %d is out of range (must be [1,65536>).", port);
+ FILE *fp = fopen(filename.c_str(), "r");
+ if (fp == nullptr) {
+ log_perror(filename.c_str());
return false;
}
- AcceptorConfig acceptor;
- acceptor.addr = CreateAnyAddress(port);
+ char buf[4096];
+ while (!feof(fp)) {
+ size_t ret = fread(buf, 1, sizeof(buf), fp);
+ if (ret > 0) {
+ contents->append(buf, buf + ret);
+ } else {
+ if (ferror(fp)) {
+ log_perror(filename.c_str());
+ fclose(fp);
+ return false;
+ }
+ assert(feof(fp));
+ break;
+ }
- config->acceptors.push_back(acceptor);
+ if (contents->size() > max_size) {
+ log(ERROR, "%s was longer than the maximum allowed %zu bytes", filename.c_str(), max_size);
+ fclose(fp);
+ return false;
+ }
+ }
+ fclose(fp);
return true;
}
-bool parse_listen(const ConfigLine &line, Config *config)
+bool parse_tls_parameters(const unordered_map<string, string> ¶meters, AcceptorConfig *acceptor)
{
- if (line.arguments.size() != 1) {
- log(ERROR, "'listen' takes exactly one argument");
- return false;
- }
-
- string addr_string = line.arguments[0];
- if (addr_string.empty()) {
- // Actually, this should never happen.
- log(ERROR, "'listen' argument cannot be empty");
- return false;
- }
+ bool has_cert = false, has_key = false;
- string port_string;
-
- AcceptorConfig acceptor;
- memset(&acceptor.addr, 0, sizeof(acceptor.addr));
- acceptor.addr.sin6_family = AF_INET6;
- if (addr_string[0] == '[') {
- // IPv6 address: [addr]:port.
- size_t addr_end = addr_string.find("]:");
- if (addr_end == string::npos) {
- log(ERROR, "IPv6 address '%s' should be on form [address]:port", addr_string.c_str());
+ auto tls_cert_it = parameters.find("tls_cert");
+ if (tls_cert_it != parameters.end()) {
+ if (!load_file_to_string(tls_cert_it->second, 1048576, &acceptor->certificate_chain)) {
return false;
}
- string addr_only = addr_string.substr(1, addr_end - 1);
- if (inet_pton(AF_INET6, addr_only.c_str(), &acceptor.addr.sin6_addr) != 1) {
- log(ERROR, "Invalid IPv6 address '%s'", addr_only.c_str());
+ // Verify that the certificate is valid.
+ bool is_server = true;
+ TLSContext *server_context = tls_create_context(is_server, TLS_V12);
+ int num_cert = tls_load_certificates(
+ server_context,
+ reinterpret_cast<const unsigned char *>(acceptor->certificate_chain.data()),
+ acceptor->certificate_chain.size());
+ if (num_cert < 0) {
+ log_tls_error(tls_cert_it->second.c_str(), num_cert);
+ tls_destroy_context(server_context);
+ return false;
+ } else if (num_cert == 0) {
+ log(ERROR, "%s did not contain any certificates", tls_cert_it->second.c_str());
return false;
}
+ tls_destroy_context(server_context);
+ has_cert = true;
+ }
- port_string = addr_string.substr(addr_end + 2);
- } else {
- // IPv4 address: addr:port.
- size_t addr_end = addr_string.find(":");
- if (addr_end == string::npos) {
- log(ERROR, "IPv4 address '%s' should be on form address:port", addr_string.c_str());
+ auto tls_key_it = parameters.find("tls_key");
+ if (tls_key_it != parameters.end()) {
+ if (!load_file_to_string(tls_key_it->second, 1048576, &acceptor->private_key)) {
return false;
}
- in_addr addr4;
- string addr_only = addr_string.substr(0, addr_end);
- if (inet_pton(AF_INET, addr_only.c_str(), &addr4) != 1) {
- log(ERROR, "Invalid IPv4 address '%s'", addr_only.c_str());
+ // Verify that the key is valid.
+ bool is_server = true;
+ TLSContext *server_context = tls_create_context(is_server, TLS_V12);
+ int num_keys = tls_load_private_key(
+ server_context,
+ reinterpret_cast<const unsigned char *>(acceptor->private_key.data()),
+ acceptor->private_key.size());
+ if (num_keys < 0) {
+ log_tls_error(tls_key_it->second.c_str(), num_keys);
+ tls_destroy_context(server_context);
+ return false;
+ } else if (num_keys == 0) {
+ log(ERROR, "%s did not contain any private keys", tls_key_it->second.c_str());
return false;
}
-
- // Convert to a v4-mapped address.
- acceptor.addr.sin6_addr.s6_addr32[2] = htonl(0xffff);
- acceptor.addr.sin6_addr.s6_addr32[3] = addr4.s_addr;
- port_string = addr_string.substr(addr_end + 1);
+ tls_destroy_context(server_context);
+ has_key = true;
}
- int port = atoi(port_string.c_str());
- if (port < 1 || port >= 65536) {
- log(ERROR, "port %d is out of range (must be [1,65536>).", port);
+ if (has_cert != has_key) {
+ log(ERROR, "Only one of tls_cert= and tls_key= was given, needs zero or both");
return false;
}
- acceptor.addr.sin6_port = ntohs(port);
- config->acceptors.push_back(acceptor);
return true;
}
-int allocate_mark_pool(int from, int to, Config *config)
+
+bool parse_port(const ConfigLine &line, Config *config)
{
- int pool_index = -1;
-
- // Reuse mark pools if an identical one exists.
- // Otherwise, check if we're overlapping some other mark pool.
- for (size_t i = 0; i < config->mark_pools.size(); ++i) {
- const MarkPoolConfig &pool = config->mark_pools[i];
- if (from == pool.from && to == pool.to) {
- pool_index = i;
- } else if ((from >= pool.from && from < pool.to) ||
- (to >= pool.from && to < pool.to)) {
- log(WARNING, "Mark pool %d-%d partially overlaps with %d-%d, you may get duplicate marks."
- "Mark pools must either be completely disjunct, or completely overlapping.",
- from, to, pool.from, pool.to);
- }
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'port' takes exactly one argument");
+ return false;
}
- if (pool_index != -1) {
- return pool_index;
+ int port = stoi(line.arguments[0]);
+ if (port < 1 || port >= 65536) {
+ log(ERROR, "port %d is out of range (must be [1,65536>).", port);
+ return false;
}
- // No match to existing pools.
- MarkPoolConfig pool;
- pool.from = from;
- pool.to = to;
- config->mark_pools.push_back(pool);
+ AcceptorConfig acceptor;
+ acceptor.addr = create_any_address(port);
- return config->mark_pools.size() - 1;
+ if (!parse_tls_parameters(line.parameters, &acceptor)) {
+ return false;
+ }
+ config->acceptors.push_back(acceptor);
+ return true;
}
-bool parse_mark_pool(const string &mark_str, int *from, int *to)
+bool parse_listen(const ConfigLine &line, Config *config)
{
- size_t split = mark_str.find_first_of('-');
- if (split == string::npos) {
- log(ERROR, "Invalid mark specification '%s' (expected 'X-Y').",
- mark_str.c_str());
- return false;
- }
-
- string from_str(mark_str.begin(), mark_str.begin() + split);
- string to_str(mark_str.begin() + split + 1, mark_str.end());
- *from = atoi(from_str.c_str());
- *to = atoi(to_str.c_str());
-
- if (*from <= 0 || *from >= 65536 || *to <= 0 || *to >= 65536) {
- log(ERROR, "Mark pool range %d-%d is outside legal range [1,65536>.",
- *from, *to);
- return false;
- }
-
- return true;
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'listen' takes exactly one argument");
+ return false;
+ }
+
+ AcceptorConfig acceptor;
+ if (!parse_hostport(line.arguments[0], &acceptor.addr)) {
+ return false;
+ }
+ if (!parse_tls_parameters(line.parameters, &acceptor)) {
+ return false;
+ }
+ config->acceptors.push_back(acceptor);
+ return true;
}
bool parse_stream(const ConfigLine &line, Config *config)
StreamConfig stream;
stream.url = line.arguments[0];
- map<string, string>::const_iterator src_it = line.parameters.find("src");
+ const auto src_it = line.parameters.find("src");
+ bool input_is_udp = false;
if (src_it == line.parameters.end()) {
log(WARNING, "stream '%s' has no src= attribute, clients will not get any data.",
stream.url.c_str());
} else {
stream.src = src_it->second;
- // TODO: Verify that the URL is parseable?
+
+ string protocol, user, host, port, path;
+ if (!parse_url(stream.src, &protocol, &user, &host, &port, &path)) {
+ log(ERROR, "could not parse URL '%s'", stream.src.c_str());
+ return false;
+ }
+ if (protocol == "udp") {
+ input_is_udp = true;
+ }
}
- map<string, string>::const_iterator backlog_it = line.parameters.find("backlog_size");
+ const auto backlog_it = line.parameters.find("backlog_size");
if (backlog_it == line.parameters.end()) {
stream.backlog_size = DEFAULT_BACKLOG_SIZE;
} else {
- stream.backlog_size = atoi(backlog_it->second.c_str());
+ stream.backlog_size = stoll(backlog_it->second);
}
- // Parse encoding.
- map<string, string>::const_iterator encoding_parm_it = line.parameters.find("encoding");
+ const auto prebuffer_it = line.parameters.find("force_prebuffer");
+ if (prebuffer_it == line.parameters.end()) {
+ stream.prebuffering_bytes = 0;
+ } else {
+ stream.prebuffering_bytes = stoll(prebuffer_it->second);
+ }
+
+ // Parse output encoding.
+ const auto encoding_parm_it = line.parameters.find("encoding");
if (encoding_parm_it == line.parameters.end() ||
encoding_parm_it->second == "raw") {
stream.encoding = StreamConfig::STREAM_ENCODING_RAW;
return false;
}
- // Parse marks, if so desired.
- map<string, string>::const_iterator mark_parm_it = line.parameters.find("mark");
- if (mark_parm_it == line.parameters.end()) {
- stream.mark_pool = -1;
- } else {
- int from, to;
- if (!parse_mark_pool(mark_parm_it->second, &from, &to)) {
+ // Parse input encoding.
+ const auto src_encoding_parm_it = line.parameters.find("src_encoding");
+ if (src_encoding_parm_it == line.parameters.end()) {
+ stream.src_encoding = input_is_udp ? StreamConfig::STREAM_ENCODING_RAW : StreamConfig::STREAM_ENCODING_METACUBE;
+ } else if (src_encoding_parm_it->second == "metacube") {
+ if (input_is_udp) {
+ log(ERROR, "UDP streams cannot have Metacube input");
return false;
}
- stream.mark_pool = allocate_mark_pool(from, to, config);
+ stream.src_encoding = StreamConfig::STREAM_ENCODING_METACUBE;
+ } else if (src_encoding_parm_it->second == "raw") {
+ stream.src_encoding = StreamConfig::STREAM_ENCODING_RAW;
+ } else {
+ log(ERROR, "Parameter 'src_encoding' must be either 'raw' (default for UDP) or 'metacube' (default for HTTP)");
+ return false;
}
// Parse the pacing rate, converting from kilobits to bytes as needed.
- map<string, string>::const_iterator pacing_rate_it = line.parameters.find("pacing_rate_kbit");
+ const auto pacing_rate_it = line.parameters.find("pacing_rate_kbit");
if (pacing_rate_it == line.parameters.end()) {
stream.pacing_rate = ~0U;
} else {
- stream.pacing_rate = atoi(pacing_rate_it->second.c_str()) * 1024 / 8;
+ stream.pacing_rate = stoll(pacing_rate_it->second.c_str()) * 1024 / 8;
+ }
+
+ // Parse the HLS URL, if any.
+ const auto hls_url_it = line.parameters.find("hls_playlist");
+ if (hls_url_it != line.parameters.end()) {
+ stream.hls_url = hls_url_it->second;
+ if (stream.hls_url.empty()) {
+ log(ERROR, "Parameter 'hls_playlist' was given but empty");
+ return false;
+ }
+ if (stream.encoding == StreamConfig::STREAM_ENCODING_METACUBE) {
+ log(ERROR, "HLS cannot be used with Metacube output");
+ return false;
+ }
+ }
+
+ // Parse the HLS fragment duration, if any.
+ const auto hls_frag_duration_it = line.parameters.find("hls_frag_duration");
+ if (hls_frag_duration_it != line.parameters.end()) {
+ if (stream.hls_url.empty()) {
+ log(ERROR, "Parameter 'hls_frag_duration' given, but no 'hls_playlist' given");
+ return false;
+ }
+ stream.hls_frag_duration = stoi(hls_frag_duration_it->second);
+ if (stream.hls_frag_duration <= 0) {
+ log(ERROR, "'hls_frag_duration' must be a strictly positive integer");
+ return false;
+ }
+ }
+
+ // Parse the HLS backlog margin, if any.
+ const auto hls_backlog_margin_it = line.parameters.find("hls_backlog_margin");
+ if (hls_backlog_margin_it != line.parameters.end()) {
+ if (stream.hls_url.empty()) {
+ log(ERROR, "Parameter 'hls_backlog_margin' given, but no 'hls_playlist' given");
+ return false;
+ }
+ stream.hls_backlog_margin = stoi(hls_backlog_margin_it->second);
+ if (stream.hls_backlog_margin >= stream.backlog_size) {
+ log(ERROR, "'hls_backlog_margin' must be nonnegative, but less than the backlog size");
+ return false;
+ }
+ }
+
+ // Parse the CORS origin, if it exists.
+ const auto allow_origin_it = line.parameters.find("allow_origin");
+ if (allow_origin_it != line.parameters.end()) {
+ stream.allow_origin = allow_origin_it->second;
}
config->streams.push_back(stream);
UDPStreamConfig udpstream;
string hostport = line.arguments[0];
-
- // See if the argument if on the type [ipv6addr]:port.
- if (!hostport.empty() && hostport[0] == '[') {
- size_t split = hostport.find("]:");
- if (split == string::npos) {
- log(ERROR, "udpstream destination '%s' is malformed; must be either [ipv6addr]:port or ipv4addr:port");
- return false;
- }
-
- string host(hostport.begin() + 1, hostport.begin() + split);
- string port = hostport.substr(split + 2);
-
- udpstream.dst.sin6_family = AF_INET6;
- if (inet_pton(AF_INET6, host.c_str(), &udpstream.dst.sin6_addr) != 1) {
- log(ERROR, "udpstream destination host '%s' is not a valid IPv6 address");
- return false;
- }
-
- udpstream.dst.sin6_port = htons(atoi(port.c_str())); // TODO: Verify validity.
- } else {
- // OK, then it must be ipv4addr:port.
- size_t split = hostport.find(":");
- if (split == string::npos) {
- log(ERROR, "udpstream destination '%s' is malformed; must be either [ipv6addr]:port or ipv4addr:port");
- return false;
- }
-
- string host(hostport.begin(), hostport.begin() + split);
- string port = hostport.substr(split + 1);
-
- // Parse to an IPv4 address, then construct a mapped-v4 address from that.
- in_addr addr4;
-
- if (inet_pton(AF_INET, host.c_str(), &addr4) != 1) {
- log(ERROR, "udpstream destination host '%s' is not a valid IPv4 address");
- return false;
- }
-
- udpstream.dst.sin6_family = AF_INET6;
- udpstream.dst.sin6_addr.s6_addr32[0] = 0;
- udpstream.dst.sin6_addr.s6_addr32[1] = 0;
- udpstream.dst.sin6_addr.s6_addr32[2] = htonl(0xffff);
- udpstream.dst.sin6_addr.s6_addr32[3] = addr4.s_addr;
- udpstream.dst.sin6_port = htons(atoi(port.c_str())); // TODO: Verify validity.
+ if (!parse_hostport(hostport, &udpstream.dst)) {
+ return false;
}
- map<string, string>::const_iterator src_it = line.parameters.find("src");
+ const auto src_it = line.parameters.find("src");
if (src_it == line.parameters.end()) {
// This is pretty meaningless, but OK, consistency is good.
log(WARNING, "udpstream to %s has no src= attribute, clients will not get any data.",
// TODO: Verify that the URL is parseable?
}
- // Parse marks, if so desired.
- map<string, string>::const_iterator mark_parm_it = line.parameters.find("mark");
- if (mark_parm_it == line.parameters.end()) {
- udpstream.mark_pool = -1;
- } else {
- int from, to;
- if (!parse_mark_pool(mark_parm_it->second, &from, &to)) {
- return false;
- }
- udpstream.mark_pool = allocate_mark_pool(from, to, config);
- }
-
// Parse the pacing rate, converting from kilobits to bytes as needed.
- map<string, string>::const_iterator pacing_rate_it = line.parameters.find("pacing_rate_kbit");
+ const auto pacing_rate_it = line.parameters.find("pacing_rate_kbit");
if (pacing_rate_it == line.parameters.end()) {
udpstream.pacing_rate = ~0U;
} else {
- udpstream.pacing_rate = atoi(pacing_rate_it->second.c_str()) * 1024 / 8;
+ udpstream.pacing_rate = stoi(pacing_rate_it->second) * 1024 / 8;
+ }
+
+ // Parse the TTL. The same value is used for unicast and multicast.
+ const auto ttl_it = line.parameters.find("ttl");
+ if (ttl_it == line.parameters.end()) {
+ udpstream.ttl = -1;
+ } else {
+ udpstream.ttl = stoi(ttl_it->second);
+ }
+
+ // Parse the multicast interface index.
+ const auto multicast_iface_it = line.parameters.find("multicast_output_interface");
+ if (multicast_iface_it == line.parameters.end()) {
+ udpstream.multicast_iface_index = -1;
+ } else {
+ udpstream.multicast_iface_index = if_nametoindex(multicast_iface_it->second.c_str());
+ if (udpstream.multicast_iface_index == 0) {
+ log(ERROR, "Interface '%s' does not exist", multicast_iface_it->second.c_str());
+ return false;
+ }
}
config->udpstreams.push_back(udpstream);
return true;
}
+bool parse_gen204(const ConfigLine &line, Config *config)
+{
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'gen204' takes exactly one argument");
+ return false;
+ }
+
+ Gen204Config gen204;
+ gen204.url = line.arguments[0];
+
+ // Parse the CORS origin, if it exists.
+ const auto allow_origin_it = line.parameters.find("allow_origin");
+ if (allow_origin_it != line.parameters.end()) {
+ gen204.allow_origin = allow_origin_it->second;
+ }
+
+ config->pings.push_back(gen204);
+ return true;
+}
+
bool parse_error_log(const ConfigLine &line, Config *config)
{
if (line.arguments.size() != 0) {
}
LogConfig log_config;
- map<string, string>::const_iterator type_it = line.parameters.find("type");
+ const auto type_it = line.parameters.find("type");
if (type_it == line.parameters.end()) {
log(ERROR, "'error_log' has no type= parameter");
return false;
}
if (log_config.type == LogConfig::LOG_TYPE_FILE) {
- map<string, string>::const_iterator filename_it = line.parameters.find("filename");
+ const auto filename_it = line.parameters.find("filename");
if (filename_it == line.parameters.end()) {
log(ERROR, "error_log type 'file' with no filename= parameter");
return false;
fetch_config_string(lines, "access_log", &config->access_log_file);
- for (size_t i = 0; i < lines.size(); ++i) {
- const ConfigLine &line = lines[i];
+ for (const ConfigLine &line : lines) {
if (line.keyword == "num_servers" ||
line.keyword == "stats_file" ||
line.keyword == "stats_interval" ||
if (!parse_udpstream(line, config)) {
return false;
}
+ } else if (line.keyword == "gen204") {
+ if (!parse_gen204(line, config)) {
+ return false;
+ }
} else if (line.keyword == "error_log") {
if (!parse_error_log(line, config)) {
return false;