masqmail

view src/conf.c @ 333:0bd27f603910

Added debug level 9 for msgs to stderr during reading config See changes to man page, included in this changeset.
author markus schnalke <meillo@marmaro.de>
date Sat, 27 Aug 2011 16:54:14 +0200
parents f899ca0835a8
children 08932c629849
line source
1 /* MasqMail
2 Copyright (C) 1999-2001 Oliver Kurth
3 Copyright (C) 2010 markus schnalke <meillo@marmaro.de>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program; if not, write to the Free Software
17 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18 */
20 #include <pwd.h>
21 #include <grp.h>
23 #include "masqmail.h"
25 masqmail_conf conf;
27 void
28 init_conf()
29 {
30 struct passwd *passwd;
31 struct group *group;
33 memset(&conf, 0, sizeof(masqmail_conf));
35 conf.orig_uid = getuid();
36 conf.orig_gid = getgid();
38 if ((passwd = getpwnam(DEF_MAIL_USER)))
39 conf.mail_uid = passwd->pw_uid;
40 else {
41 fprintf(stderr, "user %s not found! (terminating)\n", DEF_MAIL_USER);
42 exit(1);
43 }
44 if ((group = getgrnam(DEF_MAIL_GROUP)))
45 conf.mail_gid = group->gr_gid;
46 else {
47 fprintf(stderr, "group %s not found! (terminating)\n", DEF_MAIL_GROUP);
48 exit(1);
49 }
50 }
52 static gchar* true_strings[] = {
53 "yes", "on", "true", NULL
54 };
56 static gchar *false_strings[] = {
57 "no", "off", "false", NULL
58 };
60 static gboolean
61 parse_boolean(gchar * rval)
62 {
63 gchar **str;
65 DEBUG(9) fprintf(stderr, "parse_boolean: %s\n", rval);
67 str = true_strings;
68 while (*str) {
69 if (strncasecmp(*str, rval, strlen(*str)) == 0)
70 return TRUE;
71 str++;
72 }
74 str = false_strings;
75 while (*str) {
76 if (strncasecmp(*str, rval, strlen(*str)) == 0)
77 return FALSE;
78 str++;
79 }
81 fprintf(stderr, "cannot parse value '%s'\n", rval);
82 exit(1);
83 }
85 /* make a list from each line in a file */
86 static GList*
87 parse_list_file(gchar * fname)
88 {
89 GList *list = NULL;
90 FILE *fptr;
92 if ((fptr = fopen(fname, "rt")) == NULL) {
93 logwrite(LOG_ALERT, "could not open %s for reading: %s\n", fname, strerror(errno));
94 exit(1);
95 }
97 gchar buf[256];
99 while (!feof(fptr)) {
100 fgets(buf, 255, fptr);
101 if (buf[0] && (buf[0] != '#') && (buf[0] != '\n')) {
102 g_strchomp(buf);
103 DEBUG(9) fprintf(stderr,"parse_list_file: item = %s\n", buf);
104 list = g_list_append(list, g_strdup(buf));
105 }
106 }
107 fclose(fptr);
109 return list;
110 }
112 /* given a semicolon separated string, this function makes a GList out of it. */
113 GList*
114 parse_list(gchar * line, gboolean read_file)
115 {
116 GList *list = NULL;
117 gchar buf[256];
118 gchar *p, *q;
120 DEBUG(9) fprintf(stderr, "parsing list %s, file?:%d\n", line, read_file);
122 p = line;
123 while (*p != '\0') {
124 q = buf;
126 while (*p && (*p != ';') && (q < buf + 255))
127 *(q++) = *(p++);
128 *q = '\0';
130 if ((buf[0] == '/') && (read_file))
131 /* item is a filename, include its contents */
132 list = g_list_concat(list, parse_list_file(buf));
133 else
134 /* just a normal item */
135 list = g_list_append(list, g_strdup(buf));
137 DEBUG(9) fprintf(stderr, "item = %s\n", buf);
139 if (*p)
140 p++;
141 }
142 return list;
143 }
145 /* Split the addrs at '@' into local_part and domain. Without an '@'
146 everything is local_part. Create address structs, which are put
147 into a list and returned.
148 This funktion is used for lists of addrs containing globbing chars (* and ?).
149 We don't need valid RFC821 addresses here, just patterns to match against.
150 */
151 static GList*
152 parse_address_glob_list(gchar * line, gboolean read_file)
153 {
154 GList *plain_list = parse_list(line, read_file);
155 GList *node;
156 GList *list = NULL;
158 foreach(plain_list, node) {
159 gchar *item = (gchar *) (node->data);
160 char* at;
161 char* p;
162 address *addr = calloc(1, sizeof(address));
164 for (p=item+strlen(item)-1; isspace(*p) || *p=='>'; p--) {
165 *p = '\0';
166 }
167 for (p=item; isspace(*p) || *p=='<'; p++) {
168 }
170 addr->address = strdup(p);
171 at = strrchr(p, '@');
172 if (at) {
173 *at = '\0';
174 addr->local_part = strdup(p);
175 addr->domain = strdup(at+1);
176 } else {
177 addr->local_part = strdup(p);
178 /* No `@', thus any domain is okay. */
179 addr->domain = "*";
180 }
181 list = g_list_append(list, addr);
182 DEBUG(6) debugf("parse_address_glob_list: read pattern `%s' `%s'\n",
183 addr->local_part, addr->domain);
184 g_free(item);
185 }
186 g_list_free(plain_list);
187 return list;
188 }
190 static GList*
191 parse_resolve_list(gchar * line)
192 {
193 GList *list;
194 GList *list_node;
195 GList *res_list = NULL;
197 list = parse_list(line, FALSE);
198 if (!list) {
199 return NULL;
200 }
202 foreach(list, list_node) {
203 gchar *item = (gchar *) (list_node->data);
204 if (strcmp(item, "byname") == 0) {
205 res_list = g_list_append(res_list, resolve_byname);
206 #ifdef ENABLE_RESOLVER
207 } else if (strcmp(item, "dns_a") == 0) {
208 res_list = g_list_append(res_list, resolve_dns_a);
209 } else if (strcmp(item, "dns_mx") == 0) {
210 res_list = g_list_append(res_list, resolve_dns_mx);
211 #endif
212 } else {
213 logwrite(LOG_ALERT, "unknown resolver %s\n", item);
214 exit(1);
215 }
216 g_free(item);
217 }
218 g_list_free(list);
219 return res_list;
220 }
222 static interface*
223 parse_interface(gchar * line, gint def_port)
224 {
225 gchar buf[256];
226 gchar *p, *q;
227 interface *iface;
229 DEBUG(9) fprintf(stderr, "parse_interface: %s\n", line);
231 p = line;
232 q = buf;
233 while ((*p != '\0') && (*p != ':') && (q < buf + 255))
234 *(q++) = *(p++);
235 *q = '\0';
237 iface = g_malloc(sizeof(interface));
238 iface->address = g_strdup(buf);
240 if (*p) {
241 p++;
242 iface->port = atoi(p);
243 } else
244 iface->port = def_port;
245 DEBUG(9) fprintf(stderr,"rval=%s, address:port=%s:%i\n",line, iface->address, iface->port);
247 return iface;
248 }
250 #ifdef ENABLE_IDENT /* so far used for that only */
251 static struct in_addr*
252 parse_network(gchar * line, gint def_port)
253 {
254 gchar buf[256];
255 gchar *p, *q;
256 struct in_addr addr, mask_addr, net_addr, *p_net_addr;
257 guint n;
259 DEBUG(9) fprintf(stderr, "parse_network: %s\n", line);
261 p = line;
262 q = buf;
263 while ((*p != '\0') && (*p != '/') && (q < buf + 255))
264 *(q++) = *(p++);
265 *q = '\0';
267 if ((addr.s_addr = inet_addr(buf)) == INADDR_NONE) {
268 fprintf(stderr, "'%s' is not a valid address (must be ip)\n", buf);
269 exit(1);
270 }
272 if (*p) {
273 guint i;
274 p++;
275 i = atoi(p);
276 if ((i >= 0) && (i <= 32))
277 n = i ? ~((1 << (32 - i)) - 1) : 0;
278 else {
279 fprintf(stderr, "'%d' is not a valid net mask (must be >= 0 and <= 32)\n", i);
280 exit(1);
281 }
282 } else
283 n = 0;
285 mask_addr.s_addr = htonl(n);
286 net_addr.s_addr = mask_addr.s_addr & addr.s_addr;
288 p_net_addr = g_malloc(sizeof(struct in_addr));
289 p_net_addr->s_addr = net_addr.s_addr;
290 return p_net_addr;
291 }
292 #endif
294 static gboolean
295 eat_comments(FILE * in)
296 {
297 gint c;
299 for (c = fgetc(in); (c == '#' || isspace(c)) && c != EOF;
300 c = fgetc(in)) {
301 if (c == '#') {
302 gint c;
303 for (c = fgetc(in); (c != '\n') && (c != EOF); c = fgetc(in));
304 }
305 }
306 if (c == EOF)
307 return FALSE;
308 ungetc(c, in);
309 return TRUE;
310 }
312 /* after parsing, eat trailing character until LF */
313 static gboolean
314 eat_line_trailing(FILE * in)
315 {
316 gint c;
318 for (c = fgetc(in); c != EOF && c != '\n'; c = fgetc(in));
319 if (c == EOF)
320 return FALSE;
321 return TRUE;
322 }
324 static gboolean
325 eat_spaces(FILE * in)
326 {
327 gint c;
329 for (c = fgetc(in); c != EOF && isspace(c); c = fgetc(in)) {
330 /* empty */
331 }
332 if (c == EOF)
333 return FALSE;
334 ungetc(c, in);
335 return TRUE;
336 }
338 static gboolean
339 read_lval(FILE * in, gchar * buf, gint size)
340 {
341 gint c;
342 gchar *ptr = buf;
344 DEBUG(9) fprintf(stderr, "read_lval()\n");
346 if (!eat_spaces(in))
347 return FALSE;
349 c = fgetc(in);
350 DEBUG(9) fprintf(stderr, "read_lval() 2\n");
351 while ((isalnum(c) || c == '_' || c == '-' || c == '.')
352 && (ptr < buf + size - 1)
353 && (c != EOF)) {
354 *ptr = c;
355 ptr++;
356 c = fgetc(in);
357 }
358 *ptr = '\0';
359 ungetc(c, in);
361 if (c == EOF) {
362 fprintf(stderr, "unexpected EOF after %s\n", buf);
363 return FALSE;
364 } else if (ptr >= buf + size - 1) {
365 fprintf(stderr, "lval too long\n");
366 }
368 eat_spaces(in);
370 DEBUG(9) fprintf(stderr, "lval = %s\n", buf);
372 return buf[0] != '\0';
373 }
375 static gboolean
376 read_rval(FILE * in, gchar * buf, gint size)
377 {
378 gint c;
379 gchar *ptr = buf;
381 DEBUG(9) fprintf(stderr, "read_rval()\n");
383 if (!eat_spaces(in))
384 return FALSE;
386 c = fgetc(in);
387 if (c != '\"') {
388 while ((isalnum(c) || c == '_' || c == '-' || c == '.'
389 || c == '/' || c == '@' || c == ';' || c == ':')
390 && (ptr < buf + size - 1)
391 && (c != EOF)) {
392 *ptr = c;
393 ptr++;
394 c = fgetc(in);
395 }
396 *ptr = '\0';
397 ungetc(c, in);
398 } else {
399 gboolean escape = FALSE;
400 c = fgetc(in);
401 while (((c != '\"') || escape) && (ptr < buf + size - 1)) {
402 if (c != '\n') { /* ignore line breaks */
403 if ((c == '\\') && (!escape)) {
404 escape = TRUE;
405 } else {
406 *ptr = c;
407 ptr++;
408 escape = FALSE;
409 }
410 }
411 c = fgetc(in);
412 }
413 *ptr = '\0';
414 }
416 eat_line_trailing(in);
418 DEBUG(9) fprintf(stderr, "rval = %s\n", buf);
420 return TRUE;
421 }
423 static gboolean
424 read_statement(FILE * in, gchar * lval, gint lsize, gchar * rval, gint rsize)
425 {
426 gint c;
428 DEBUG(9) fprintf(stderr, "read_statement()\n");
430 /* eat comments and empty lines: */
431 if (!eat_comments(in))
432 return FALSE;
434 if (!read_lval(in, lval, lsize)) {
435 return FALSE;
436 }
438 DEBUG(9) fprintf(stderr, " lval = %s\n", lval);
439 if ((c = fgetc(in) == '=')) {
440 if (read_rval(in, rval, rsize)) {
441 DEBUG(9) fprintf(stderr, " rval = %s\n", rval);
442 return TRUE;
443 }
444 } else {
445 DEBUG(9) fprintf(stderr," '=' expected after %s, char was '%c'\n", lval, c);
446 fprintf(stderr, "'=' expected after %s, char was '%c'\n", lval, c);
447 }
448 return FALSE;
449 }
451 gboolean
452 read_conf(gchar * filename)
453 {
454 FILE *in;
456 conf.log_max_pri = 7;
457 conf.do_relay = TRUE;
458 conf.localpartcmp = strcmp;
459 conf.max_defer_time = 86400 * 4; /* 4 days */
460 conf.max_msg_size = 0; /* no limit on msg size */
461 conf.spool_dir = SPOOL_DIR;
462 conf.mail_dir = "/var/mail";
463 conf.listen_addresses = g_list_append(NULL, parse_interface("localhost", 25));
465 if ((in = fopen(filename, "r")) == NULL) {
466 logwrite(LOG_ALERT, "could not open config file %s: %s\n", filename, strerror(errno));
467 return FALSE;
468 }
470 gchar lval[256], rval[2048];
471 while (read_statement(in, lval, 256, rval, 2048)) {
472 DEBUG(9) fprintf(stderr,"read_conf(): lval=%s\n", lval);
473 if (strcmp(lval, "debug_level") == 0)
474 conf.debug_level = atoi(rval);
475 else if (strcmp(lval, "run_as_user") == 0) {
476 if (!conf.run_as_user) /* you should not be able to reset that flag */
477 conf.run_as_user = parse_boolean(rval);
478 } else if (strcmp(lval, "use_syslog") == 0)
479 conf.use_syslog = parse_boolean(rval);
480 else if (strcmp(lval, "mail_dir") == 0)
481 conf.mail_dir = g_strdup(rval);
482 else if (strcmp(lval, "lock_dir") == 0)
483 conf.lock_dir = g_strdup(rval);
484 else if (strcmp(lval, "spool_dir") == 0)
485 conf.spool_dir = g_strdup(rval);
486 else if (strcmp(lval, "log_dir") == 0)
487 conf.log_dir = g_strdup(rval);
488 else if (strcmp(lval, "host_name") == 0) {
489 if (rval[0] != '/')
490 conf.host_name = g_strdup(rval);
491 else {
492 char buf[256];
493 FILE *fptr = fopen(rval, "rt");
494 if (!fptr) {
495 logwrite(LOG_ALERT, "could not open %s: %s\n", rval, strerror(errno));
496 return FALSE;
497 }
498 fgets(buf, 255, fptr);
499 g_strchomp(buf);
500 conf.host_name = g_strdup(buf);
501 fclose(fptr);
502 }
503 } else if (strcmp(lval, "local_hosts") == 0)
504 conf.local_hosts = parse_list(rval, FALSE);
505 else if (strcmp(lval, "local_addresses") == 0)
506 conf.local_addresses = parse_list(rval, TRUE);
507 else if (strcmp(lval, "not_local_addresses") == 0)
508 conf.not_local_addresses = parse_list(rval, TRUE);
509 else if (strcmp(lval, "local_nets") == 0)
510 conf.local_nets = parse_list(rval, FALSE);
511 else if (strcmp(lval, "do_save_envelope_to") == 0)
512 conf.do_save_envelope_to = parse_boolean(rval);
513 else if (strcmp(lval, "defer_all") == 0)
514 conf.defer_all = parse_boolean(rval);
515 else if (strcmp(lval, "do_relay") == 0)
516 conf.do_relay = parse_boolean(rval);
517 else if (strcmp(lval, "alias_file") == 0) {
518 conf.alias_file = g_strdup(rval);
519 } else if (strcmp(lval, "caseless_matching") == 0) {
520 conf.localpartcmp = parse_boolean(rval) ? strcasecmp : strcmp;
521 } else if (strcmp(lval, "mbox_default") == 0) {
522 conf.mbox_default = g_strdup(rval);
523 } else if (strcmp(lval, "mbox_users") == 0) {
524 conf.mbox_users = parse_list(rval, TRUE);
525 } else if (strcmp(lval, "mda_users") == 0) {
526 conf.mda_users = parse_list(rval, TRUE);
527 } else if (strcmp(lval, "mda") == 0) {
528 conf.mda = g_strdup(rval);
529 } else if (strcmp(lval, "mda_fromline") == 0) {
530 conf.mda_fromline = parse_boolean(rval);
531 } else if (strcmp(lval, "mda_fromhack") == 0) {
532 conf.mda_fromhack = parse_boolean(rval);
533 } else if (strcmp(lval, "pipe_fromline") == 0) {
534 conf.pipe_fromline = parse_boolean(rval);
535 } else if (strcmp(lval, "pipe_fromhack") == 0) {
536 conf.pipe_fromhack = parse_boolean(rval);
537 } else if (strcmp(lval, "listen_addresses") == 0) {
538 GList *node;
539 GList *tmp_list = parse_list(rval, FALSE);
541 conf.listen_addresses = NULL;
542 foreach(tmp_list, node) {
543 conf.listen_addresses = g_list_append(conf.listen_addresses, parse_interface((gchar *) (node-> data), 25));
544 g_free(node->data);
545 }
546 g_list_free(tmp_list);
547 } else if (strcmp(lval, "ident_trusted_nets") == 0) {
548 #ifdef ENABLE_IDENT
549 GList *node;
550 GList *tmp_list = parse_list(rval, FALSE);
552 conf.ident_trusted_nets = NULL;
553 foreach(tmp_list, node) {
554 conf.ident_trusted_nets = g_list_append(conf.ident_trusted_nets, parse_network((gchar *) (node->data), 25));
555 g_free(node->data);
556 }
557 g_list_free(tmp_list);
558 #else
559 logwrite(LOG_WARNING, "%s ignored: not compiled with ident support\n", lval);
560 #endif
561 } else if ((strncmp(lval, "connect_route.", 14) == 0)
562 || (strncmp(lval, "online_routes.", 14) == 0)) {
563 GList *file_list = parse_list(rval, FALSE);
564 table_pair *pair = create_pair(&(lval[14]), file_list);
565 conf.connect_routes = g_list_append(conf.connect_routes, pair);
566 } else if (strcmp(lval, "local_net_route") == 0) {
567 conf.local_net_routes = parse_list(rval, FALSE);
568 } else if (strcmp(lval, "online_query") == 0)
569 conf.online_query = g_strdup(rval);
570 else if (strcmp(lval, "do_queue") == 0)
571 conf.do_queue = parse_boolean(rval);
572 else if (strcmp(lval, "errmsg_file") == 0)
573 conf.errmsg_file = g_strdup(rval);
574 else if (strcmp(lval, "warnmsg_file") == 0)
575 conf.warnmsg_file = g_strdup(rval);
576 else if (strcmp(lval, "warn_intervals") == 0)
577 conf.warn_intervals = parse_list(rval, FALSE);
578 else if (strcmp(lval, "max_defer_time") == 0) {
579 gint ival = time_interval(rval);
580 if (ival < 0)
581 logwrite(LOG_WARNING, "invalid time interval for 'max_defer_time': %s\n", rval);
582 else
583 conf.max_defer_time = ival;
584 } else if (strcmp(lval, "log_user") == 0)
585 conf.log_user = g_strdup(rval);
586 else if(strcmp(lval, "max_msg_size") == 0) {
587 conf.max_msg_size = atol(rval);
588 DEBUG(9) fprintf(stderr,"rval=%s, conf.max_msg_size=%ld\n",
589 rval, conf.max_msg_size);
590 }
591 else
592 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
593 }
594 fclose(in);
596 if (!conf.host_name) {
597 logwrite(LOG_ALERT, "`host_name' MUST be set in masqmail.conf. See man page\n");
598 return FALSE;
599 }
601 if (conf.errmsg_file == NULL)
602 conf.errmsg_file = g_strdup(DATA_DIR "/tpl/failmsg.tpl");
603 if (conf.warnmsg_file == NULL)
604 conf.warnmsg_file = g_strdup(DATA_DIR "/tpl/warnmsg.tpl");
606 if (conf.lock_dir == NULL)
607 conf.lock_dir = g_strdup_printf("%s/lock/", conf.spool_dir);
609 if (conf.mbox_default == NULL)
610 conf.mbox_default = g_strdup("mbox");
612 if (conf.warn_intervals == NULL)
613 conf.warn_intervals = parse_list("1h;4h;8h;1d;2d;3d", FALSE);
615 if (!conf.local_hosts) {
616 char* shortname = strdup(conf.host_name);
617 char* p = strchr(shortname, '.');
618 if (p) {
619 *p = '\0';
620 }
621 /* we don't care if shortname and conf.host_name are the same */
622 char* local_hosts_str = g_strdup_printf("localhost;%s;%s", shortname, conf.host_name);
623 conf.local_hosts = parse_list(local_hosts_str, FALSE);
624 free(shortname);
625 free(local_hosts_str);
626 }
629 return TRUE;
630 }
632 connect_route*
633 read_route(gchar * filename, gboolean is_local_net)
634 {
635 gboolean ok = FALSE;
636 FILE *in;
638 connect_route *route = g_malloc(sizeof(connect_route));
639 memset(route, 0, sizeof(connect_route));
641 DEBUG(5) debugf("read_route, filename = %s\n", filename);
643 route->filename = g_strdup(filename);
644 route->name = g_strdup(filename); /* quick hack */
646 route->expand_h_sender_address = TRUE;
648 route->is_local_net = is_local_net;
650 route->do_pipelining = TRUE;
652 if ((in = fopen(route->filename, "r")) == NULL) {
653 logwrite(LOG_ALERT, "could not open route file %s: %s\n", route->filename, strerror(errno));
654 g_free(route);
655 return NULL;
656 }
658 gchar lval[256], rval[2048];
659 while (read_statement(in, lval, 256, rval, 2048)) {
660 if (strcmp(lval, "mail_host") == 0)
661 route->mail_host = parse_interface(rval, 25);
662 else if (strcmp(lval, "helo_name") == 0)
663 route->helo_name = g_strdup(rval);
664 else if (strcmp(lval, "wrapper") == 0)
665 route->wrapper = g_strdup(rval);
666 else if (strcmp(lval, "connect_error_fail") == 0)
667 route->connect_error_fail = parse_boolean(rval);
668 else if (strcmp(lval, "do_correct_helo") == 0)
669 route->do_correct_helo = parse_boolean(rval);
670 else if (strcmp(lval, "instant_helo") == 0)
671 route->instant_helo = parse_boolean(rval);
672 else if (strcmp(lval, "do_pipelining") == 0)
673 route->do_pipelining = parse_boolean(rval);
675 else if (strcmp(lval, "allowed_senders") == 0)
676 route->allowed_senders = parse_address_glob_list(rval, TRUE);
677 else if (strcmp(lval, "denied_senders") == 0)
678 route->denied_senders = parse_address_glob_list(rval, TRUE);
679 else if (strcmp(lval, "allowed_recipients") == 0)
680 route->allowed_recipients = parse_address_glob_list(rval, TRUE);
681 else if (strcmp(lval, "denied_recipients") == 0)
682 route->denied_recipients = parse_address_glob_list(rval, TRUE);
684 else if (strcmp(lval, "set_h_from_domain") == 0)
685 route->set_h_from_domain = g_strdup(rval);
686 else if (strcmp(lval, "set_h_reply_to_domain") == 0)
687 route->set_h_reply_to_domain = g_strdup(rval);
688 else if (strcmp(lval, "set_return_path_domain") == 0)
689 route->set_return_path_domain = g_strdup(rval);
690 else if (strcmp(lval, "map_return_path_addresses") == 0) {
691 GList *node, *list;
693 list = parse_list(rval, TRUE);
694 foreach(list, node) {
695 gchar *item = (gchar *) (node->data);
696 table_pair *pair = parse_table_pair(item, ':');
697 address *addr = create_address((gchar *) (pair->value), TRUE);
698 g_free(pair->value);
699 pair->value = (gpointer *) addr;
700 route->map_return_path_addresses = g_list_append(route->map_return_path_addresses, pair);
701 g_free(item);
702 }
703 g_list_free(list);
704 } else if (strcmp(lval, "map_h_from_addresses") == 0) {
705 GList *list, *node;
707 list = parse_list(rval, TRUE);
708 foreach(list, node) {
709 gchar *item = (gchar *) (node->data);
710 table_pair *pair = parse_table_pair(item, ':');
711 route->map_h_from_addresses = g_list_append(route->map_h_from_addresses, pair);
712 g_free(item);
713 }
714 g_list_free(list);
715 } else if (strcmp(lval, "map_h_reply_to_addresses") == 0) {
716 GList *list, *node;
718 list = parse_list(rval, TRUE);
719 foreach(list, node) {
720 gchar *item = (gchar *) (node->data);
721 table_pair *pair = parse_table_pair(item, ':');
722 route->map_h_reply_to_addresses = g_list_append(route->map_h_reply_to_addresses, pair);
723 g_free(item);
724 }
725 g_list_free(list);
726 } else if (strcmp(lval, "map_h_mail_followup_to_addresses") == 0) {
727 GList *list, *node;
729 list = parse_list(rval, TRUE);
730 foreach(list, node) {
731 gchar *item = (gchar *) (node->data);
732 table_pair *pair = parse_table_pair(item, ':');
733 route->map_h_mail_followup_to_addresses = g_list_append(route->map_h_mail_followup_to_addresses, pair);
734 g_free(item);
735 }
736 g_list_free(list);
737 } else if (strcmp(lval, "expand_h_sender_domain") == 0) {
738 route->expand_h_sender_domain = parse_boolean(rval);
739 } else if (strcmp(lval, "expand_h_sender_address") == 0) {
740 route->expand_h_sender_address = parse_boolean(rval);
741 } else if (strcmp(lval, "resolve_list") == 0)
742 route->resolve_list = parse_resolve_list(rval);
743 else if (strcmp(lval, "do_ssl") == 0) {
744 /* we ignore this. This option is used by sqilconf */
745 ;
746 }
747 #ifdef ENABLE_AUTH
748 else if (strcmp(lval, "auth_name") == 0) {
749 route->auth_name = g_strdup(rval);
750 } else if (strcmp(lval, "auth_login") == 0) {
751 route->auth_login = g_strdup(rval);
752 } else if (strcmp(lval, "auth_secret") == 0) {
753 route->auth_secret = g_strdup(rval);
754 }
755 #else
756 else if ((strcmp(lval, "auth_name") == 0)
757 || (strcmp(lval, "auth_login") == 0)
758 || (strcmp(lval, "auth_secret") == 0)) {
759 logwrite(LOG_WARNING, "%s ignored: not compiled with auth support.\n", lval);
760 }
761 #endif
762 else if (strcmp(lval, "pipe") == 0) {
763 route->pipe = g_strdup(rval);
764 } else if (strcmp(lval, "pipe_fromline") == 0) {
765 route->pipe_fromline = parse_boolean(rval);
766 } else if (strcmp(lval, "pipe_fromhack") == 0) {
767 route->pipe_fromhack = parse_boolean(rval);
768 } else if (strcmp(lval, "last_route") == 0) {
769 route->last_route = parse_boolean(rval);
770 } else
771 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
772 }
774 if (!route->resolve_list) {
775 #ifdef ENABLE_RESOLVER
776 if (!is_local_net) {
777 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_mx);
778 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_a);
779 }
780 #endif
781 route->resolve_list = g_list_append(route->resolve_list, resolve_byname);
782 }
783 fclose(in);
784 ok = TRUE;
786 /* warn user about misconfigurations: */
787 if ((route->map_h_from_addresses != NULL) && (route->set_h_from_domain != NULL)) {
788 logwrite(LOG_WARNING, "'map_h_from_addresses' overrides 'set_h_from_domain'\n");
789 g_free(route->set_h_from_domain);
790 route->set_h_from_domain = NULL;
791 }
792 if ((route->map_h_reply_to_addresses != NULL) && (route->set_h_reply_to_domain != NULL)) {
793 logwrite(LOG_WARNING, "'map_h_reply_to_addresses' overrides 'set_h_reply_to_domain'\n");
794 g_free(route->set_h_reply_to_domain);
795 route->set_h_reply_to_domain = NULL;
796 }
798 if (!ok) {
799 g_free(route);
800 route = NULL;
801 }
803 return route;
804 }
806 static void
807 _g_list_free_all(GList * list)
808 {
809 GList *node;
810 if (list) {
811 foreach(list, node)
812 g_free(node->data);
813 g_list_free(list);
814 }
815 }
817 void
818 destroy_route(connect_route * r)
819 {
820 if (r->filename)
821 g_free(r->filename);
822 if (r->mail_host) {
823 g_free(r->mail_host->address);
824 g_free(r->mail_host);
825 }
826 if (r->wrapper)
827 g_free(r->wrapper);
828 if (r->helo_name)
829 g_free(r->helo_name);
830 _g_list_free_all(r->allowed_senders);
831 _g_list_free_all(r->denied_senders);
832 _g_list_free_all(r->allowed_recipients);
833 _g_list_free_all(r->denied_recipients);
834 if (r->set_h_from_domain)
835 g_free(r->set_h_from_domain);
836 if (r->set_h_reply_to_domain)
837 g_free(r->set_h_reply_to_domain);
838 if (r->set_return_path_domain)
839 g_free(r->set_return_path_domain);
840 if (r->map_h_reply_to_addresses)
841 destroy_table(r->map_h_reply_to_addresses);
842 if (r->resolve_list)
843 g_list_free(r->resolve_list);
844 #ifdef ENABLE_AUTH
845 if (r->auth_name)
846 g_free(r->auth_name);
847 if (r->auth_login)
848 g_free(r->auth_login);
849 if (r->auth_secret)
850 g_free(r->auth_secret);
851 #endif
852 if (r->pipe)
853 g_free(r->pipe);
854 g_free(r);
855 }
857 GList*
858 read_route_list(GList * rf_list, gboolean is_local_net)
859 {
860 GList *list = NULL;
861 GList *node;
862 uid_t saved_uid, saved_gid;
864 if (!conf.run_as_user) {
865 set_euidgid(0, 0, &saved_uid, &saved_gid);
866 }
868 foreach(rf_list, node) {
869 gchar *fname = (gchar *) (node->data);
870 connect_route *route = read_route(fname, is_local_net);
871 if (route)
872 list = g_list_append(list, route);
873 else
874 logwrite(LOG_ALERT, "could not read route configuration %s\n", fname);
875 }
877 /* set uid and gid back */
878 if (!conf.run_as_user) {
879 set_euidgid(saved_uid, saved_gid, NULL, NULL);
880 }
882 return list;
883 }
885 void
886 destroy_route_list(GList * list)
887 {
888 GList *node;
890 foreach(list, node) {
891 connect_route *route = (connect_route *) (node->data);
892 destroy_route(route);
893 }
894 g_list_free(list);
895 }
897 connect_route*
898 create_local_route()
899 {
900 connect_route *route;
902 route = g_malloc(sizeof(connect_route));
903 if (!route) {
904 return NULL;
905 }
906 memset(route, 0, sizeof(connect_route));
907 route->is_local_net = TRUE;
908 route->name = g_strdup("default local_net_route");
909 route->expand_h_sender_address = TRUE;
910 route->resolve_list = g_list_append(NULL, resolve_byname);
911 route->connect_error_fail = TRUE;
912 return route;
913 }