masqmail

view src/conf.c @ 203:45acc5727493

removed --with-glib-static configure option linking glib statically is interesting if no other program uses it on today's systems glib is widely used if one cares on linking statically, he can link everything statically the special case for glib will not get special care anymore
author meillo@marmaro.de
date Fri, 16 Jul 2010 14:48:17 +0200
parents 6b4a101a2455
children 4fd237550525
line source
1 /* MasqMail
2 Copyright (C) 1999-2001 Oliver Kurth
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
17 */
19 #include <pwd.h>
20 #include <grp.h>
22 #include "masqmail.h"
24 masqmail_conf conf;
26 void
27 init_conf()
28 {
29 struct passwd *passwd;
30 struct group *group;
32 memset(&conf, 0, sizeof(masqmail_conf));
34 conf.orig_uid = getuid();
35 conf.orig_gid = getgid();
37 if ((passwd = getpwnam(DEF_MAIL_USER)))
38 conf.mail_uid = passwd->pw_uid;
39 else {
40 fprintf(stderr, "user %s not found! (terminating)\n", DEF_MAIL_USER);
41 exit(EXIT_FAILURE);
42 }
43 if ((group = getgrnam(DEF_MAIL_GROUP)))
44 conf.mail_gid = group->gr_gid;
45 else {
46 fprintf(stderr, "group %s not found! (terminating)\n", DEF_MAIL_GROUP);
47 exit(EXIT_FAILURE);
48 }
49 }
51 static gchar* true_strings[] = {
52 "yes", "on", "true", NULL
53 };
55 static gchar *false_strings[] = {
56 "no", "off", "false", NULL
57 };
59 static gboolean
60 parse_boolean(gchar * rval)
61 {
62 gchar **str;
64 DEBUG(6) fprintf(stderr, "parse_boolean: %s\n", rval);
66 str = true_strings;
67 while (*str) {
68 if (strncasecmp(*str, rval, strlen(*str)) == 0)
69 return TRUE;
70 str++;
71 }
73 str = false_strings;
74 while (*str) {
75 if (strncasecmp(*str, rval, strlen(*str)) == 0)
76 return FALSE;
77 str++;
78 }
80 fprintf(stderr, "cannot parse value '%s'\n", rval);
81 exit(EXIT_FAILURE);
82 }
84 /* make a list from each line in a file */
85 static GList*
86 parse_list_file(gchar * fname)
87 {
88 GList *list = NULL;
89 FILE *fptr;
91 if ((fptr = fopen(fname, "rt")) == NULL) {
92 logwrite(LOG_ALERT, "could not open %s for reading: %s\n", fname, strerror(errno));
93 exit(EXIT_FAILURE);
94 }
96 gchar buf[256];
98 while (!feof(fptr)) {
99 fgets(buf, 255, fptr);
100 if (buf[0] && (buf[0] != '#') && (buf[0] != '\n')) {
101 g_strchomp(buf);
102 DEBUG(6) fprintf(stderr,"parse_list_file: item = %s\n", buf);
103 list = g_list_append(list, g_strdup(buf));
104 }
105 }
106 fclose(fptr);
108 return list;
109 }
111 /* given a semicolon separated string, this function makes a GList out of it. */
112 GList*
113 parse_list(gchar * line, gboolean read_file)
114 {
115 GList *list = NULL;
116 gchar buf[256];
117 gchar *p, *q;
119 DEBUG(6) fprintf(stderr, "parsing list %s, file?:%d\n", line, read_file);
121 p = line;
122 while (*p != '\0') {
123 q = buf;
125 while (*p && (*p != ';') && (q < buf + 255))
126 *(q++) = *(p++);
127 *q = '\0';
129 if ((buf[0] == '/') && (read_file))
130 /* item is a filename, include its contents */
131 list = g_list_concat(list, parse_list_file(buf));
132 else
133 /* just a normal item */
134 list = g_list_append(list, g_strdup(buf));
136 DEBUG(6) fprintf(stderr, "item = %s\n", buf);
138 if (*p)
139 p++;
140 }
141 return list;
142 }
144 static GList*
145 parse_address_list(gchar * line, gboolean read_file)
146 {
147 GList *plain_list = parse_list(line, read_file);
148 GList *node;
149 GList *list = NULL;
151 foreach(plain_list, node) {
152 gchar *item = (gchar *) (node->data);
153 address *addr = create_address(item, TRUE);
154 if (addr)
155 list = g_list_append(list, addr);
156 g_free(item);
157 }
158 g_list_free(plain_list);
160 return list;
161 }
163 static GList*
164 parse_resolve_list(gchar * line)
165 {
166 GList *list;
167 GList *list_node;
168 GList *res_list = NULL;
170 list = parse_list(line, FALSE);
171 if (!list) {
172 return NULL;
173 }
175 foreach(list, list_node) {
176 gchar *item = (gchar *) (list_node->data);
177 if (strcmp(item, "byname") == 0) {
178 res_list = g_list_append(res_list, resolve_byname);
179 #ifdef ENABLE_RESOLVER
180 } else if (strcmp(item, "dns_a") == 0) {
181 res_list = g_list_append(res_list, resolve_dns_a);
182 } else if (strcmp(item, "dns_mx") == 0) {
183 res_list = g_list_append(res_list, resolve_dns_mx);
184 #endif
185 } else {
186 logwrite(LOG_ALERT, "unknown resolver %s\n", item);
187 exit(EXIT_FAILURE);
188 }
189 g_free(item);
190 }
191 g_list_free(list);
192 return res_list;
193 }
195 static interface*
196 parse_interface(gchar * line, gint def_port)
197 {
198 gchar buf[256];
199 gchar *p, *q;
200 interface *iface;
202 DEBUG(6) fprintf(stderr, "parse_interface: %s\n", line);
204 p = line;
205 q = buf;
206 while ((*p != '\0') && (*p != ':') && (q < buf + 255))
207 *(q++) = *(p++);
208 *q = '\0';
210 iface = g_malloc(sizeof(interface));
211 iface->address = g_strdup(buf);
213 if (*p) {
214 p++;
215 iface->port = atoi(p);
216 } else
217 iface->port = def_port;
218 DEBUG(6) fprintf(stderr,"rval=%s, address:port=%s:%i\n",line, iface->address, iface->port);
220 return iface;
221 }
223 #ifdef ENABLE_IDENT /* so far used for that only */
224 static struct in_addr*
225 parse_network(gchar * line, gint def_port)
226 {
227 gchar buf[256];
228 gchar *p, *q;
229 struct in_addr addr, mask_addr, net_addr, *p_net_addr;
230 guint n;
232 DEBUG(6) fprintf(stderr, "parse_network: %s\n", line);
234 p = line;
235 q = buf;
236 while ((*p != '\0') && (*p != '/') && (q < buf + 255))
237 *(q++) = *(p++);
238 *q = '\0';
240 if ((addr.s_addr = inet_addr(buf)) == INADDR_NONE) {
241 fprintf(stderr, "'%s' is not a valid address (must be ip)\n", buf);
242 exit(EXIT_FAILURE);
243 }
245 if (*p) {
246 guint i;
247 p++;
248 i = atoi(p);
249 if ((i >= 0) && (i <= 32))
250 n = i ? ~((1 << (32 - i)) - 1) : 0;
251 else {
252 fprintf(stderr, "'%d' is not a valid net mask (must be >= 0 and <= 32)\n", i);
253 exit(EXIT_FAILURE);
254 }
255 } else
256 n = 0;
258 mask_addr.s_addr = htonl(n);
259 net_addr.s_addr = mask_addr.s_addr & addr.s_addr;
261 p_net_addr = g_malloc(sizeof(struct in_addr));
262 p_net_addr->s_addr = net_addr.s_addr;
263 return p_net_addr;
264 }
265 #endif
267 static gboolean
268 eat_comments(FILE * in)
269 {
270 gint c;
272 for (c = fgetc(in); (c == '#' || isspace(c)) && c != EOF;
273 c = fgetc(in)) {
274 if (c == '#') {
275 gint c;
276 for (c = fgetc(in); (c != '\n') && (c != EOF); c = fgetc(in));
277 }
278 }
279 if (c == EOF)
280 return FALSE;
281 ungetc(c, in);
282 return TRUE;
283 }
285 /* after parsing, eat trailing character until LF */
286 static gboolean
287 eat_line_trailing(FILE * in)
288 {
289 gint c;
291 for (c = fgetc(in); c != EOF && c != '\n'; c = fgetc(in));
292 if (c == EOF)
293 return FALSE;
294 return TRUE;
295 }
297 static gboolean
298 eat_spaces(FILE * in)
299 {
300 gint c;
302 for (c = fgetc(in); c != EOF && isspace(c); c = fgetc(in)) {
303 /* empty */
304 }
305 if (c == EOF)
306 return FALSE;
307 ungetc(c, in);
308 return TRUE;
309 }
311 static gboolean
312 read_lval(FILE * in, gchar * buf, gint size)
313 {
314 gint c;
315 gchar *ptr = buf;
317 DEBUG(6) fprintf(stderr, "read_lval()\n");
319 if (!eat_spaces(in))
320 return FALSE;
322 c = fgetc(in);
323 DEBUG(6) fprintf(stderr, "read_lval() 2\n");
324 while ((isalnum(c) || c == '_' || c == '-' || c == '.')
325 && (ptr < buf + size - 1)
326 && (c != EOF)) {
327 *ptr = c;
328 ptr++;
329 c = fgetc(in);
330 }
331 *ptr = '\0';
332 ungetc(c, in);
334 if (c == EOF) {
335 fprintf(stderr, "unexpected EOF after %s\n", buf);
336 return FALSE;
337 } else if (ptr >= buf + size - 1) {
338 fprintf(stderr, "lval too long\n");
339 }
341 eat_spaces(in);
343 DEBUG(6) fprintf(stderr, "lval = %s\n", buf);
345 return buf[0] != '\0';
346 }
348 static gboolean
349 read_rval(FILE * in, gchar * buf, gint size)
350 {
351 gint c;
352 gchar *ptr = buf;
354 DEBUG(6) fprintf(stderr, "read_rval()\n");
356 if (!eat_spaces(in))
357 return FALSE;
359 c = fgetc(in);
360 if (c != '\"') {
361 while ((isalnum(c) || c == '_' || c == '-' || c == '.'
362 || c == '/' || c == '@' || c == ';' || c == ':')
363 && (ptr < buf + size - 1)
364 && (c != EOF)) {
365 *ptr = c;
366 ptr++;
367 c = fgetc(in);
368 }
369 *ptr = '\0';
370 ungetc(c, in);
371 } else {
372 gboolean escape = FALSE;
373 c = fgetc(in);
374 while (((c != '\"') || escape) && (ptr < buf + size - 1)) {
375 if (c != '\n') { /* ignore line breaks */
376 if ((c == '\\') && (!escape)) {
377 escape = TRUE;
378 } else {
379 *ptr = c;
380 ptr++;
381 escape = FALSE;
382 }
383 }
384 c = fgetc(in);
385 }
386 *ptr = '\0';
387 }
389 eat_line_trailing(in);
391 DEBUG(6) fprintf(stderr, "rval = %s\n", buf);
393 return TRUE;
394 }
396 static gboolean
397 read_statement(FILE * in, gchar * lval, gint lsize, gchar * rval, gint rsize)
398 {
399 gint c;
401 DEBUG(6) fprintf(stderr, "read_statement()\n");
403 /* eat comments and empty lines: */
404 if (!eat_comments(in))
405 return FALSE;
407 if (!read_lval(in, lval, lsize)) {
408 return FALSE;
409 }
411 DEBUG(6) fprintf(stderr, " lval = %s\n", lval);
412 if ((c = fgetc(in) == '=')) {
413 if (read_rval(in, rval, rsize)) {
414 DEBUG(6) fprintf(stderr, " rval = %s\n", rval);
415 return TRUE;
416 }
417 } else {
418 DEBUG(6) fprintf(stderr," '=' expected after %s, char was '%c'\n", lval, c);
419 fprintf(stderr, "'=' expected after %s, char was '%c'\n", lval, c);
420 }
421 return FALSE;
422 }
424 gboolean
425 read_conf(gchar * filename)
426 {
427 FILE *in;
429 conf.log_max_pri = 7;
430 conf.do_relay = TRUE;
431 conf.alias_local_cmp = strcmp;
432 conf.max_defer_time = 86400 * 4; /* 4 days */
433 conf.max_msg_size = 0; /* no limit on msg size */
434 conf.spool_dir = SPOOL_DIR;
435 conf.mail_dir = "/var/mail";
436 conf.listen_addresses = g_list_append(NULL, parse_interface("localhost", 25));
438 if ((in = fopen(filename, "r")) == NULL) {
439 logwrite(LOG_ALERT, "could not open config file %s: %s\n", filename, strerror(errno));
440 return FALSE;
441 }
443 gchar lval[256], rval[2048];
444 while (read_statement(in, lval, 256, rval, 2048)) {
445 DEBUG(6) fprintf(stderr,"read_conf(): lval=%s\n", lval);
446 if (strcmp(lval, "debug_level") == 0)
447 conf.debug_level = atoi(rval);
448 else if (strcmp(lval, "run_as_user") == 0) {
449 if (!conf.run_as_user) /* you should not be able to reset that flag */
450 conf.run_as_user = parse_boolean(rval);
451 } else if (strcmp(lval, "use_syslog") == 0)
452 conf.use_syslog = parse_boolean(rval);
453 else if (strcmp(lval, "mail_dir") == 0)
454 conf.mail_dir = g_strdup(rval);
455 else if (strcmp(lval, "lock_dir") == 0)
456 conf.lock_dir = g_strdup(rval);
457 else if (strcmp(lval, "spool_dir") == 0)
458 conf.spool_dir = g_strdup(rval);
459 else if (strcmp(lval, "log_dir") == 0)
460 conf.log_dir = g_strdup(rval);
461 else if (strcmp(lval, "host_name") == 0) {
462 if (rval[0] != '/')
463 conf.host_name = g_strdup(rval);
464 else {
465 char buf[256];
466 FILE *fptr = fopen(rval, "rt");
467 if (fptr) {
468 logwrite(LOG_ALERT, "could not open %s: %s\n", rval, strerror(errno));
469 return FALSE;
470 }
471 fgets(buf, 255, fptr);
472 g_strchomp(buf);
473 conf.host_name = g_strdup(buf);
474 fclose(fptr);
475 }
476 } else if (strcmp(lval, "local_hosts") == 0)
477 conf.local_hosts = parse_list(rval, FALSE);
478 else if (strcmp(lval, "local_addresses") == 0)
479 conf.local_addresses = parse_list(rval, TRUE);
480 else if (strcmp(lval, "not_local_addresses") == 0)
481 conf.not_local_addresses = parse_list(rval, TRUE);
482 else if (strcmp(lval, "local_nets") == 0)
483 conf.local_nets = parse_list(rval, FALSE);
484 else if (strcmp(lval, "do_save_envelope_to") == 0)
485 conf.do_save_envelope_to = parse_boolean(rval);
486 else if (strcmp(lval, "defer_all") == 0)
487 conf.defer_all = parse_boolean(rval);
488 else if (strcmp(lval, "do_relay") == 0)
489 conf.do_relay = parse_boolean(rval);
490 else if (strcmp(lval, "alias_file") == 0) {
491 conf.alias_file = g_strdup(rval);
492 } else if (strcmp(lval, "alias_local_caseless") == 0) {
493 conf.alias_local_cmp = parse_boolean(rval) ? strcasecmp : strcmp;
494 } else if (strcmp(lval, "mbox_default") == 0) {
495 conf.mbox_default = g_strdup(rval);
496 } else if (strcmp(lval, "mbox_users") == 0) {
497 conf.mbox_users = parse_list(rval, TRUE);
498 } else if (strcmp(lval, "mda_users") == 0) {
499 conf.mda_users = parse_list(rval, TRUE);
500 } else if (strcmp(lval, "maildir_users") == 0) {
501 conf.maildir_users = parse_list(rval, TRUE);
502 } else if (strcmp(lval, "mda") == 0) {
503 conf.mda = g_strdup(rval);
504 } else if (strcmp(lval, "mda_fromline") == 0) {
505 conf.mda_fromline = parse_boolean(rval);
506 } else if (strcmp(lval, "mda_fromhack") == 0) {
507 conf.mda_fromhack = parse_boolean(rval);
508 } else if (strcmp(lval, "pipe_fromline") == 0) {
509 conf.pipe_fromline = parse_boolean(rval);
510 } else if (strcmp(lval, "pipe_fromhack") == 0) {
511 conf.pipe_fromhack = parse_boolean(rval);
512 } else if (strcmp(lval, "listen_addresses") == 0) {
513 GList *node;
514 GList *tmp_list = parse_list(rval, FALSE);
516 conf.listen_addresses = NULL;
517 foreach(tmp_list, node) {
518 conf.listen_addresses = g_list_append(conf.listen_addresses, parse_interface((gchar *) (node-> data), 25));
519 g_free(node->data);
520 }
521 g_list_free(tmp_list);
522 } else if (strcmp(lval, "ident_trusted_nets") == 0) {
523 #ifdef ENABLE_IDENT
524 GList *node;
525 GList *tmp_list = parse_list(rval, FALSE);
527 conf.ident_trusted_nets = NULL;
528 foreach(tmp_list, node) {
529 conf.ident_trusted_nets = g_list_append(conf.ident_trusted_nets, parse_network((gchar *) (node->data), 25));
530 g_free(node->data);
531 }
532 g_list_free(tmp_list);
533 #else
534 logwrite(LOG_WARNING, "%s ignored: not compiled with ident support\n", lval);
535 #endif
536 } else if ((strncmp(lval, "connect_route.", 14) == 0)
537 || (strncmp(lval, "online_routes.", 14) == 0)) {
538 GList *file_list = parse_list(rval, FALSE);
539 table_pair *pair = create_pair(&(lval[14]), file_list);
540 conf.connect_routes = g_list_append(conf.connect_routes, pair);
541 } else if (strcmp(lval, "local_net_route") == 0) {
542 conf.local_net_routes = parse_list(rval, FALSE);
543 } else if (strcmp(lval, "online_detect") == 0)
544 conf.online_detect = g_strdup(rval);
545 else if (strcmp(lval, "online_file") == 0)
546 conf.online_file = g_strdup(rval);
547 else if (strcmp(lval, "online_pipe") == 0)
548 conf.online_pipe = g_strdup(rval);
549 else if (strcmp(lval, "do_queue") == 0)
550 conf.do_queue = parse_boolean(rval);
551 else if (strcmp(lval, "errmsg_file") == 0)
552 conf.errmsg_file = g_strdup(rval);
553 else if (strcmp(lval, "warnmsg_file") == 0)
554 conf.warnmsg_file = g_strdup(rval);
555 else if (strcmp(lval, "warn_intervals") == 0)
556 conf.warn_intervals = parse_list(rval, FALSE);
557 else if (strcmp(lval, "max_defer_time") == 0) {
558 gint dummy;
559 gint ival = time_interval(rval, &dummy);
560 if (ival < 0)
561 logwrite(LOG_WARNING, "invalid time interval for 'max_defer_time': %s\n", rval);
562 else
563 conf.max_defer_time = ival;
564 } else if (strcmp(lval, "log_user") == 0)
565 conf.log_user = g_strdup(rval);
566 else if(strcmp(lval, "max_msg_size") == 0) {
567 conf.max_msg_size = atol(rval);
568 DEBUG(6) fprintf(stderr,"rval=%s, conf.max_msg_size=%ld\n",
569 rval, conf.max_msg_size);
570 }
571 else
572 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
573 }
574 fclose(in);
576 if (!conf.host_name) {
577 logwrite(LOG_ALERT, "`host_name' MUST be set in masqmail.conf. See man page\n");
578 return FALSE;
579 }
581 if (conf.errmsg_file == NULL)
582 conf.errmsg_file = g_strdup(DATA_DIR "/tpl/failmsg.tpl");
583 if (conf.warnmsg_file == NULL)
584 conf.warnmsg_file = g_strdup(DATA_DIR "/tpl/warnmsg.tpl");
586 if (conf.lock_dir == NULL)
587 conf.lock_dir = g_strdup_printf("%s/lock/", conf.spool_dir);
589 if (conf.mbox_default == NULL)
590 conf.mbox_default = g_strdup("mbox");
592 if (conf.warn_intervals == NULL)
593 conf.warn_intervals = parse_list("1h;4h;8h;1d;2d;3d", FALSE);
595 if (!conf.local_hosts) {
596 char* shortname = strdup(conf.host_name);
597 char* p = strchr(shortname, '.');
598 if (p) {
599 *p = '\0';
600 }
601 /* we don't care if shortname and conf.host_name are the same */
602 char* local_hosts_str = g_strdup_printf("localhost;%s;%s", shortname, conf.host_name);
603 conf.local_hosts = parse_list(local_hosts_str, FALSE);
604 free(shortname);
605 free(local_hosts_str);
606 }
609 return TRUE;
610 }
612 connect_route*
613 read_route(gchar * filename, gboolean is_local_net)
614 {
615 gboolean ok = FALSE;
616 FILE *in;
618 connect_route *route = g_malloc(sizeof(connect_route));
619 memset(route, 0, sizeof(connect_route));
621 DEBUG(5) debugf("read_route, filename = %s\n", filename);
623 route->filename = g_strdup(filename);
624 route->name = g_strdup(filename); /* quick hack */
626 route->protocol = g_strdup("smtp");
627 route->expand_h_sender_address = TRUE;
629 route->is_local_net = is_local_net;
631 route->do_pipelining = TRUE;
633 if ((in = fopen(route->filename, "r")) == NULL) {
634 logwrite(LOG_ALERT, "could not open route file %s: %s\n", route->filename, strerror(errno));
635 g_free(route);
636 return NULL;
637 }
639 gchar lval[256], rval[2048];
640 while (read_statement(in, lval, 256, rval, 2048)) {
641 if (strcmp(lval, "protocol") == 0)
642 route->protocol = g_strdup(rval);
643 else if (strcmp(lval, "mail_host") == 0)
644 route->mail_host = parse_interface(rval, 25);
645 else if (strcmp(lval, "helo_name") == 0)
646 route->helo_name = g_strdup(rval);
647 else if (strcmp(lval, "wrapper") == 0)
648 route->wrapper = g_strdup(rval);
649 else if (strcmp(lval, "connect_error_fail") == 0)
650 route->connect_error_fail = parse_boolean(rval);
651 else if (strcmp(lval, "do_correct_helo") == 0)
652 route->do_correct_helo = parse_boolean(rval);
653 else if (strcmp(lval, "do_pipelining") == 0)
654 route->do_pipelining = parse_boolean(rval);
655 else if (strcmp(lval, "allowed_return_paths") == 0)
656 route->allowed_return_paths = parse_address_list(rval, TRUE);
657 else if (strcmp(lval, "allowed_mail_locals") == 0)
658 route->allowed_mail_locals = parse_list(rval, TRUE);
659 else if (strcmp(lval, "not_allowed_return_paths") == 0)
660 route->not_allowed_return_paths = parse_address_list(rval, TRUE);
661 else if (strcmp(lval, "not_allowed_mail_locals") == 0)
662 route->not_allowed_mail_locals = parse_list(rval, TRUE);
663 else if (strcmp(lval, "allowed_rcpt_domains") == 0)
664 route->allowed_rcpt_domains = parse_list(rval, TRUE);
665 else if (strcmp(lval, "not_allowed_rcpt_domains") == 0)
666 route->not_allowed_rcpt_domains = parse_list(rval, TRUE);
667 else if (strcmp(lval, "set_h_from_domain") == 0)
668 route->set_h_from_domain = g_strdup(rval);
669 else if (strcmp(lval, "set_h_reply_to_domain") == 0)
670 route->set_h_reply_to_domain = g_strdup(rval);
671 else if (strcmp(lval, "set_return_path_domain") == 0)
672 route->set_return_path_domain = g_strdup(rval);
673 else if (strcmp(lval, "map_return_path_addresses") == 0) {
674 GList *node, *list;
676 list = parse_list(rval, TRUE);
677 foreach(list, node) {
678 gchar *item = (gchar *) (node->data);
679 table_pair *pair = parse_table_pair(item, ':');
680 address *addr = create_address((gchar *) (pair->value), TRUE);
681 g_free(pair->value);
682 pair->value = (gpointer *) addr;
683 route->map_return_path_addresses = g_list_append(route->map_return_path_addresses, pair);
684 g_free(item);
685 }
686 g_list_free(list);
687 } else if (strcmp(lval, "map_h_from_addresses") == 0) {
688 GList *list, *node;
690 list = parse_list(rval, TRUE);
691 foreach(list, node) {
692 gchar *item = (gchar *) (node->data);
693 table_pair *pair = parse_table_pair(item, ':');
694 route->map_h_from_addresses = g_list_append(route->map_h_from_addresses, pair);
695 g_free(item);
696 }
697 g_list_free(list);
698 } else if (strcmp(lval, "map_h_reply_to_addresses") == 0) {
699 GList *list, *node;
701 list = parse_list(rval, TRUE);
702 foreach(list, node) {
703 gchar *item = (gchar *) (node->data);
704 table_pair *pair = parse_table_pair(item, ':');
705 route->map_h_reply_to_addresses = g_list_append(route->map_h_reply_to_addresses, pair);
706 g_free(item);
707 }
708 g_list_free(list);
709 } else if (strcmp(lval, "map_h_mail_followup_to_addresses") == 0) {
710 GList *list, *node;
712 list = parse_list(rval, TRUE);
713 foreach(list, node) {
714 gchar *item = (gchar *) (node->data);
715 table_pair *pair = parse_table_pair(item, ':');
716 route->map_h_mail_followup_to_addresses = g_list_append(route->map_h_mail_followup_to_addresses, pair);
717 g_free(item);
718 }
719 g_list_free(list);
720 } else if (strcmp(lval, "expand_h_sender_domain") == 0) {
721 route->expand_h_sender_domain = parse_boolean(rval);
722 } else if (strcmp(lval, "expand_h_sender_address") == 0) {
723 route->expand_h_sender_address = parse_boolean(rval);
724 } else if (strcmp(lval, "resolve_list") == 0)
725 route->resolve_list = parse_resolve_list(rval);
726 else if (strcmp(lval, "do_ssl") == 0) {
727 /* we ignore this. This option is used by sqilconf */
728 ;
729 }
730 #ifdef ENABLE_AUTH
731 else if (strcmp(lval, "auth_name") == 0) {
732 route->auth_name = g_strdup(rval);
733 } else if (strcmp(lval, "auth_login") == 0) {
734 route->auth_login = g_strdup(rval);
735 } else if (strcmp(lval, "auth_secret") == 0) {
736 route->auth_secret = g_strdup(rval);
737 }
738 #else
739 else if ((strcmp(lval, "auth_name") == 0)
740 || (strcmp(lval, "auth_login") == 0)
741 || (strcmp(lval, "auth_secret") == 0)) {
742 logwrite(LOG_WARNING, "%s ignored: not compiled with auth support.\n", lval);
743 }
744 #endif
745 else if (strcmp(lval, "pipe") == 0) {
746 route->pipe = g_strdup(rval);
747 } else if (strcmp(lval, "pipe_fromline") == 0) {
748 route->pipe_fromline = parse_boolean(rval);
749 } else if (strcmp(lval, "pipe_fromhack") == 0) {
750 route->pipe_fromhack = parse_boolean(rval);
751 } else if (strcmp(lval, "last_route") == 0) {
752 route->last_route = parse_boolean(rval);
753 } else
754 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
755 }
757 if (route->resolve_list == NULL) {
758 if (is_local_net) {
759 route->resolve_list = g_list_append(NULL, resolve_byname);
760 } else {
761 #ifdef ENABLE_RESOLVER
762 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_mx);
763 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_a);
764 #endif
765 route->resolve_list = g_list_append(route->resolve_list, resolve_byname);
766 }
767 }
768 fclose(in);
769 ok = TRUE;
771 /* warn user about misconfigurations: */
772 if ((route->map_h_from_addresses != NULL) && (route->set_h_from_domain != NULL)) {
773 logwrite(LOG_WARNING, "'map_h_from_addresses' overrides 'set_h_from_domain'\n");
774 g_free(route->set_h_from_domain);
775 route->set_h_from_domain = NULL;
776 }
777 if ((route->map_h_reply_to_addresses != NULL) && (route->set_h_reply_to_domain != NULL)) {
778 logwrite(LOG_WARNING, "'map_h_reply_to_addresses' overrides 'set_h_reply_to_domain'\n");
779 g_free(route->set_h_reply_to_domain);
780 route->set_h_reply_to_domain = NULL;
781 }
783 if (!ok) {
784 g_free(route);
785 route = NULL;
786 }
788 return route;
789 }
791 static void
792 _g_list_free_all(GList * list)
793 {
794 GList *node;
795 if (list) {
796 foreach(list, node)
797 g_free(node->data);
798 g_list_free(list);
799 }
800 }
802 void
803 destroy_route(connect_route * r)
804 {
805 if (r->filename)
806 g_free(r->filename);
807 if (r->protocol)
808 g_free(r->protocol);
809 if (r->mail_host) {
810 g_free(r->mail_host->address);
811 g_free(r->mail_host);
812 }
813 if (r->wrapper)
814 g_free(r->wrapper);
815 if (r->helo_name)
816 g_free(r->helo_name);
817 _g_list_free_all(r->allowed_mail_locals);
818 _g_list_free_all(r->not_allowed_mail_locals);
819 _g_list_free_all(r->allowed_rcpt_domains);
820 _g_list_free_all(r->not_allowed_rcpt_domains);
821 if (r->set_h_from_domain)
822 g_free(r->set_h_from_domain);
823 if (r->set_h_reply_to_domain)
824 g_free(r->set_h_reply_to_domain);
825 if (r->set_return_path_domain)
826 g_free(r->set_return_path_domain);
827 if (r->map_h_reply_to_addresses)
828 destroy_table(r->map_h_reply_to_addresses);
829 if (r->resolve_list)
830 g_list_free(r->resolve_list);
831 #ifdef ENABLE_AUTH
832 if (r->auth_name)
833 g_free(r->auth_name);
834 if (r->auth_login)
835 g_free(r->auth_login);
836 if (r->auth_secret)
837 g_free(r->auth_secret);
838 #endif
839 if (r->pipe)
840 g_free(r->pipe);
841 g_free(r);
842 }
844 GList*
845 read_route_list(GList * rf_list, gboolean is_local_net)
846 {
847 GList *list = NULL;
848 GList *node;
849 uid_t saved_uid, saved_gid;
851 if (!conf.run_as_user) {
852 set_euidgid(0, 0, &saved_uid, &saved_gid);
853 }
855 foreach(rf_list, node) {
856 gchar *fname = (gchar *) (node->data);
857 connect_route *route = read_route(fname, is_local_net);
858 if (route)
859 list = g_list_append(list, route);
860 else
861 logwrite(LOG_ALERT, "could not read route configuration %s\n", fname);
862 }
864 /* set uid and gid back */
865 if (!conf.run_as_user) {
866 set_euidgid(saved_uid, saved_gid, NULL, NULL);
867 }
869 return list;
870 }
872 void
873 destroy_route_list(GList * list)
874 {
875 GList *node;
877 foreach(list, node) {
878 connect_route *route = (connect_route *) (node->data);
879 destroy_route(route);
880 }
881 g_list_free(list);
882 }
884 connect_route*
885 create_local_route()
886 {
887 connect_route *route;
889 route = g_malloc(sizeof(connect_route));
890 if (!route) {
891 return NULL;
892 }
893 memset(route, 0, sizeof(connect_route));
894 route->protocol = g_strdup("smtp");
895 route->is_local_net = TRUE;
896 route->name = g_strdup("local_net (default)");
897 route->expand_h_sender_address = TRUE;
898 route->resolve_list = g_list_append(NULL, resolve_byname);
899 route->connect_error_fail = TRUE;
900 return route;
901 }