Mercurial > masqmail-0.2
diff src/local.c @ 0:08114f7dcc23 0.2.21
this is masqmail-0.2.21 from oliver kurth
author | meillo@marmaro.de |
---|---|
date | Fri, 26 Sep 2008 17:05:23 +0200 |
parents | |
children | 26e34ae9a3e3 |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/src/local.c Fri Sep 26 17:05:23 2008 +0200 @@ -0,0 +1,366 @@ +/* MasqMail + Copyright (C) 1999-2001 Oliver Kurth + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. +*/ + +#include "masqmail.h" +#include "peopen.h" +#include <sys/wait.h> + +static +void message_stream(FILE *out, message *msg, GList *hdr_list, guint flags) +{ + time_t now = time(NULL); + GList *node; + + if(flags & MSGSTR_FROMLINE){ + fprintf(out, "From <%s@%s> %s", msg->return_path->local_part, + msg->return_path->domain, ctime(&now)); + } + + foreach(hdr_list, node){ + header *hdr = (header *)(node->data); + fputs(hdr->header, out); + } + putc('\n', out); + foreach(msg->data_list, node){ + /* From hack: */ + if(flags & MSGSTR_FROMHACK){ + if(strncmp(node->data, "From ", 5) == 0) + putc('>', out); + } + fputs(node->data, out); + } + putc('\n', out); +} + +gboolean append_file(message *msg, GList *hdr_list, gchar *user) +{ + struct passwd *pw; + gboolean ok = FALSE; + + /* headers may be special for a local delivery */ + if(hdr_list == NULL) + hdr_list = msg->hdr_list; + + if((pw = getpwnam(user))){ + uid_t saved_uid = geteuid(); + gid_t saved_gid = getegid(); + gboolean uid_ok = TRUE, gid_ok = TRUE; + + if(!conf.run_as_user){ + uid_ok = (seteuid(0) == 0); + if(uid_ok){ + gid_ok = (setegid(conf.mail_gid) == 0); + uid_ok = (seteuid(pw->pw_uid) == 0); + } + } + + DEBUG(5) debugf("running as euid %d\n", geteuid()); + DEBUG(5) debugf("running as egid %d\n", getegid()); + + if(uid_ok && gid_ok){ + gchar *filename; + FILE *out; + + filename = g_strdup_printf("%s/%s", conf.mail_dir, user); + if((out = fopen(filename, "a"))){ +#ifdef USE_LIBLOCKFILE + gint err; + /* lock file using liblockfile */ + err = maillock(user,3); + if(err == 0){ +#else + /* lock file: */ + struct flock lock; + lock.l_type = F_WRLCK; + lock.l_whence = SEEK_END; + lock.l_start = lock.l_len = 0; + if(fcntl(fileno(out), F_SETLK, &lock) != -1){ +#endif + fchmod(fileno(out), 0600); + + message_stream(out, msg, hdr_list, MSGSTR_FROMLINE|MSGSTR_FROMHACK); + + ok = TRUE; + + /* close when still user */ + fclose(out); +#ifdef USE_LIBLOCKFILE + mailunlock(); +#endif + }else{ + fclose(out); +#ifdef USE_LIBLOCKFILE + DEBUG(3) debugf("could not lock file %s: error %d\n", + filename, err); + } /* XEmacs indenting convenience... */ +#else + DEBUG(3) debugf("could not lock file %s: %s\n", + filename, strerror(errno)); + } +#endif + }else{ + logwrite(LOG_ALERT, "could not open file %s: %s\n", + filename, strerror(errno)); + } + g_free(filename); + + if(!conf.run_as_user){ + uid_ok = (seteuid(0) == 0); + if(uid_ok){ + gid_ok = (setegid(saved_gid) == 0); + uid_ok = (seteuid(saved_uid) == 0); + } + } + + if(!uid_ok || !gid_ok){ + /* FIXME: if this fails we HAVE to exit, because we shall not run + with some users id. But we do not return, and so this message + will not be finished, so the user will get the message again + next time a delivery is attempted... */ + logwrite(LOG_ALERT, + "could not set back uid or gid after local delivery: %s\n", + strerror(errno)); + logwrite(LOG_ALERT, + "uid=%d, gid=%d, euid=%d, egid=%d, want = %d, %d\n", + getuid(), getgid(), geteuid(), getegid(), saved_uid, saved_gid); + exit(EXIT_FAILURE); + } + }else{ + logwrite(LOG_ALERT, + "could not set uid or gid for local delivery, uid = %d: %s\n", + pw->pw_uid, strerror(errno)); + } + }else{ + logwrite(LOG_ALERT, "could not find password entry for user %s\n", user); + errno = ENOENT; /* getpwnam does not set errno correctly */ + } + + return ok; +} + +#ifdef ENABLE_MAILDIR +gboolean maildir_out(message *msg, GList *hdr_list, gchar *user, guint flags) +{ + struct passwd *pw; + gboolean ok = FALSE; + + /* headers may be special for a local delivery */ + if(hdr_list == NULL) + hdr_list = msg->hdr_list; + + if((pw = getpwnam(user))){ + uid_t saved_uid = geteuid(); + gid_t saved_gid = getegid(); + gboolean uid_ok = TRUE, gid_ok = TRUE; + + if(!conf.run_as_user){ + uid_ok = (seteuid(0) == 0); + if(uid_ok){ + gid_ok = (setegid(conf.mail_gid) == 0); + uid_ok = (seteuid(pw->pw_uid) == 0); + } + } + + DEBUG(5) debugf("running as euid %d\n", geteuid()); + DEBUG(5) debugf("running as egid %d\n", getegid()); + + if(uid_ok && gid_ok){ + char *path = g_strdup_printf("%s/Maildir", pw->pw_dir); + struct stat statbuf; + int ret; + + DEBUG(5) debugf("path = %s\n", path); + + ok = TRUE; + ret = stat(path, &statbuf); + if(ret != 0){ + ok = FALSE; + if(errno == ENOENT){ + logwrite(LOG_NOTICE, "directory %s does not exist, creating\n", path); + if(mkdir(path, 0700) == 0) + ok = TRUE; + }else + logwrite(LOG_ALERT, "stat of %s failed: %s\n", path, strerror(errno)); + } + if(ok){ + ok = FALSE; + ret = stat(path, &statbuf); + if(S_ISDIR(statbuf.st_mode)){ + gchar *subdirs[] = {"tmp", "new", "cur"}; + int i; + for(i = 0; i < 3; i++){ + char *path1 = g_strdup_printf("%s/%s", path, subdirs[i]); + ret = stat(path1, &statbuf); + if(ret != 0){ + if(errno == ENOENT){ + logwrite(LOG_NOTICE, "directory %s does not exist, creating\n", path1); + if(mkdir(path1, 0700) != 0) break; + } + } + g_free(path1); + } + if(i == 3){ + FILE *out; + mode_t saved_mode = umask(066); + /* the qmail style unique works only if delivering + with different process. We do not fork for each delivery, + so our uid is more unique. Hope it is compatible with all + MUAs. + */ + gchar *filename = g_strdup_printf("%s/tmp/%s.%s", path, msg->uid, conf.host_name); + + DEBUG(5) debugf("filename = %s\n", filename); + + if((out = fopen(filename, "w"))){ + gchar *newname = + g_strdup_printf("%s/new/%s.%s", path, msg->uid, conf.host_name); + message_stream(out, msg, hdr_list, flags); + ok = TRUE; + if(fflush(out) == EOF) ok = FALSE; + else if(fdatasync(fileno(out)) != 0){ + if(errno != EINVAL) /* some fs do not support this.. + I hope this also means that it is not necessary */ + ok = FALSE; + } + fclose(out); + if(rename(filename, newname) != 0){ + ok = FALSE; + logwrite(LOG_ALERT, "moving %s to %s failed: %s", + filename, newname, strerror(errno)); + } + g_free(newname); + } + umask(saved_mode); + g_free(filename); + } + }else{ + logwrite(LOG_ALERT, "%s is not a directory\n", path); + errno = ENOTDIR; + } + } + if(!conf.run_as_user){ + uid_ok = (seteuid(0) == 0); + if(uid_ok){ + gid_ok = (setegid(saved_gid) == 0); + uid_ok = (seteuid(saved_uid) == 0); + } + } + if(!uid_ok || !gid_ok){ + /* FIXME: if this fails we HAVE to exit, because we shall not run + with some users id. But we do not return, and so this message + will not be finished, so the user will get the message again + next time a delivery is attempted... */ + logwrite(LOG_ALERT, + "could not set back uid or gid after local delivery: %s\n", + strerror(errno)); + exit(EXIT_FAILURE); + } + g_free(path); + }else{ + logwrite(LOG_ALERT, + "could not set uid or gid for local delivery, uid = %d: %s\n", + pw->pw_uid, strerror(errno)); + } + }else{ + logwrite(LOG_ALERT, "could not find password entry for user %s\n", user); + errno = ENOENT; /* getpwnam does not set errno correctly */ + } + return ok; +} +#endif + +gboolean +pipe_out(message *msg, GList *hdr_list, address *rcpt, gchar *cmd, guint flags) +{ + gchar *envp[40]; + FILE *out; + uid_t saved_uid = geteuid(); + gid_t saved_gid = getegid(); + gboolean ok = FALSE; + gint i, n; + pid_t pid; + void (*old_signal)(int); + int status; + + /* set uid and gid to the mail ids */ + if(!conf.run_as_user){ + set_euidgid(conf.mail_uid, conf.mail_gid, &saved_uid, &saved_gid); + } + + /* set environment */ + { + gint i = 0; + address *ancestor = addr_find_ancestor(rcpt); + + envp[i++] = g_strdup_printf("SENDER=%s@%s", msg->return_path->local_part, msg->return_path->domain); + envp[i++] = g_strdup_printf("SENDER_DOMAIN=%s", msg->return_path->domain); + envp[i++] = g_strdup_printf("SENDER_LOCAL=%s", msg->return_path->local_part); + envp[i++] = g_strdup_printf("RECEIVED_HOST=%s", msg->received_host ? msg->received_host : ""); + + envp[i++] = g_strdup_printf("RETURN_PATH=%s@%s", + msg->return_path->local_part, msg->return_path->domain); + envp[i++] = g_strdup_printf("DOMAIN=%s", ancestor->domain); + + envp[i++] = g_strdup_printf("LOCAL_PART=%s", ancestor->local_part); + envp[i++] = g_strdup_printf("USER=%s", ancestor->local_part); + envp[i++] = g_strdup_printf("LOGNAME=%s", ancestor->local_part); + + envp[i++] = g_strdup_printf("MESSAGE_ID=%s", msg->uid); + envp[i++] = g_strdup_printf("QUALIFY_DOMAIN=%s", conf.host_name); + + envp[i] = NULL; + n = i; + } + + old_signal = signal(SIGCHLD, SIG_DFL); + + out = peidopen(cmd, "w", envp, &pid, conf.mail_uid, conf.mail_gid); + if(out != NULL){ + message_stream(out, msg, hdr_list, flags); + + fclose(out); + + waitpid(pid, &status, 0); + + if(WEXITSTATUS(status) != 0){ + int exstat = WEXITSTATUS(status); + logwrite(LOG_ALERT, "process returned %d (%s)\n", exstat, ext_strerror(1024 + exstat)); + errno = 1024 + exstat; + }else if(WIFSIGNALED(status)){ + logwrite(LOG_ALERT, "process got signal %d\n", WTERMSIG(status)); + }else + ok = TRUE; + + }else + logwrite(LOG_ALERT, "could not open pipe '%s': %s\n", cmd, strerror(errno)); + + signal(SIGCHLD, old_signal); + + /* free environment */ + for(i = 0; i < n; i++){ + g_free(envp[i]); + } + + /* set uid and gid back */ + if(!conf.run_as_user){ + set_euidgid(saved_uid, saved_gid, NULL, NULL); + } + + return ok; +} +