masqmail
view src/conf.c @ 161:6dd3a289989b
listen per default on localhost:25 now
this is a typical setup
for the security POV it might be better to not listen
on any interface by default, but listening on local
interfaces seems to not be a problem
author | meillo@marmaro.de |
---|---|
date | Thu, 08 Jul 2010 11:53:07 +0200 |
parents | 586f001f5bbd |
children | 5b621742b2e7 |
line source
1 /* MasqMail
2 Copyright (C) 1999-2001 Oliver Kurth
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
17 */
19 #include <pwd.h>
20 #include <grp.h>
22 #include "masqmail.h"
24 masqmail_conf conf;
26 void
27 init_conf()
28 {
29 struct passwd *passwd;
30 struct group *group;
32 memset(&conf, 0, sizeof(masqmail_conf));
34 conf.orig_uid = getuid();
35 conf.orig_gid = getgid();
37 if ((passwd = getpwnam(DEF_MAIL_USER)))
38 conf.mail_uid = passwd->pw_uid;
39 else {
40 fprintf(stderr, "user %s not found! (terminating)\n", DEF_MAIL_USER);
41 exit(EXIT_FAILURE);
42 }
43 if ((group = getgrnam(DEF_MAIL_GROUP)))
44 conf.mail_gid = group->gr_gid;
45 else {
46 fprintf(stderr, "group %s not found! (terminating)\n", DEF_MAIL_GROUP);
47 exit(EXIT_FAILURE);
48 }
49 }
51 static gchar* true_strings[] = {
52 "yes", "on", "true", NULL
53 };
55 static gchar *false_strings[] = {
56 "no", "off", "false", NULL
57 };
59 static gboolean
60 parse_boolean(gchar * rval)
61 {
62 gchar **str;
64 DEBUG(6) fprintf(stderr, "parse_boolean: %s\n", rval);
66 str = true_strings;
67 while (*str) {
68 if (strncasecmp(*str, rval, strlen(*str)) == 0)
69 return TRUE;
70 str++;
71 }
73 str = false_strings;
74 while (*str) {
75 if (strncasecmp(*str, rval, strlen(*str)) == 0)
76 return FALSE;
77 str++;
78 }
80 fprintf(stderr, "cannot parse value '%s'\n", rval);
81 exit(EXIT_FAILURE);
82 }
84 /* make a list from each line in a file */
85 static GList*
86 parse_list_file(gchar * fname)
87 {
88 GList *list = NULL;
89 FILE *fptr;
91 if ((fptr = fopen(fname, "rt")) == NULL) {
92 logwrite(LOG_ALERT, "could not open %s for reading: %s\n", fname, strerror(errno));
93 exit(EXIT_FAILURE);
94 }
96 gchar buf[256];
98 while (!feof(fptr)) {
99 fgets(buf, 255, fptr);
100 if (buf[0] && (buf[0] != '#') && (buf[0] != '\n')) {
101 g_strchomp(buf);
102 DEBUG(6) fprintf(stderr,"parse_list_file: item = %s\n", buf);
103 list = g_list_append(list, g_strdup(buf));
104 }
105 }
106 fclose(fptr);
108 return list;
109 }
111 /* given a semicolon separated string, this function makes a GList out of it. */
112 GList*
113 parse_list(gchar * line, gboolean read_file)
114 {
115 GList *list = NULL;
116 gchar buf[256];
117 gchar *p, *q;
119 DEBUG(6) fprintf(stderr, "parsing list %s, file?:%d\n", line, read_file);
121 p = line;
122 while (*p != '\0') {
123 q = buf;
125 while (*p && (*p != ';') && (q < buf + 255))
126 *(q++) = *(p++);
127 *q = '\0';
129 if ((buf[0] == '/') && (read_file))
130 /* item is a filename, include its contents */
131 list = g_list_concat(list, parse_list_file(buf));
132 else
133 /* just a normal item */
134 list = g_list_append(list, g_strdup(buf));
136 DEBUG(6) fprintf(stderr, "item = %s\n", buf);
138 if (*p)
139 p++;
140 }
141 return list;
142 }
144 static GList*
145 parse_address_list(gchar * line, gboolean read_file)
146 {
147 GList *plain_list = parse_list(line, read_file);
148 GList *node;
149 GList *list = NULL;
151 foreach(plain_list, node) {
152 gchar *item = (gchar *) (node->data);
153 address *addr = create_address(item, TRUE);
154 if (addr)
155 list = g_list_append(list, addr);
156 g_free(item);
157 }
158 g_list_free(plain_list);
160 return list;
161 }
163 static GList*
164 parse_resolve_list(gchar * line)
165 {
166 GList *list;
167 GList *list_node;
168 GList *res_list = NULL;
170 list = parse_list(line, FALSE);
171 if (!list) {
172 return NULL;
173 }
175 foreach(list, list_node) {
176 gchar *item = (gchar *) (list_node->data);
177 if (strcmp(item, "byname") == 0) {
178 res_list = g_list_append(res_list, resolve_byname);
179 #ifdef ENABLE_RESOLVER
180 } else if (strcmp(item, "dns_a") == 0) {
181 res_list = g_list_append(res_list, resolve_dns_a);
182 } else if (strcmp(item, "dns_mx") == 0) {
183 res_list = g_list_append(res_list, resolve_dns_mx);
184 #endif
185 } else {
186 logwrite(LOG_ALERT, "unknown resolver %s\n", item);
187 exit(EXIT_FAILURE);
188 }
189 g_free(item);
190 }
191 g_list_free(list);
192 return res_list;
193 }
195 static interface*
196 parse_interface(gchar * line, gint def_port)
197 {
198 gchar buf[256];
199 gchar *p, *q;
200 interface *iface;
202 DEBUG(6) fprintf(stderr, "parse_interface: %s\n", line);
204 p = line;
205 q = buf;
206 while ((*p != '\0') && (*p != ':') && (q < buf + 255))
207 *(q++) = *(p++);
208 *q = '\0';
210 iface = g_malloc(sizeof(interface));
211 iface->address = g_strdup(buf);
213 if (*p) {
214 p++;
215 iface->port = atoi(p);
216 } else
217 iface->port = def_port;
218 DEBUG(6) fprintf(stderr,"rval=%s, address:port=%s:%i\n",line, iface->address, iface->port);
220 return iface;
221 }
223 #ifdef ENABLE_IDENT /* so far used for that only */
224 static struct in_addr*
225 parse_network(gchar * line, gint def_port)
226 {
227 gchar buf[256];
228 gchar *p, *q;
229 struct in_addr addr, mask_addr, net_addr, *p_net_addr;
230 guint n;
232 DEBUG(6) fprintf(stderr, "parse_network: %s\n", line);
234 p = line;
235 q = buf;
236 while ((*p != '\0') && (*p != '/') && (q < buf + 255))
237 *(q++) = *(p++);
238 *q = '\0';
240 if ((addr.s_addr = inet_addr(buf)) == INADDR_NONE) {
241 fprintf(stderr, "'%s' is not a valid address (must be ip)\n", buf);
242 exit(EXIT_FAILURE);
243 }
245 if (*p) {
246 guint i;
247 p++;
248 i = atoi(p);
249 if ((i >= 0) && (i <= 32))
250 n = i ? ~((1 << (32 - i)) - 1) : 0;
251 else {
252 fprintf(stderr, "'%d' is not a valid net mask (must be >= 0 and <= 32)\n", i);
253 exit(EXIT_FAILURE);
254 }
255 } else
256 n = 0;
258 mask_addr.s_addr = htonl(n);
259 net_addr.s_addr = mask_addr.s_addr & addr.s_addr;
261 p_net_addr = g_malloc(sizeof(struct in_addr));
262 p_net_addr->s_addr = net_addr.s_addr;
263 return p_net_addr;
264 }
265 #endif
267 static gboolean
268 eat_comments(FILE * in)
269 {
270 gint c;
272 for (c = fgetc(in); (c == '#' || isspace(c)) && c != EOF;
273 c = fgetc(in)) {
274 if (c == '#') {
275 gint c;
276 for (c = fgetc(in); (c != '\n') && (c != EOF); c = fgetc(in));
277 }
278 }
279 if (c == EOF)
280 return FALSE;
281 ungetc(c, in);
282 return TRUE;
283 }
285 /* after parsing, eat trailing character until LF */
286 static gboolean
287 eat_line_trailing(FILE * in)
288 {
289 gint c;
291 for (c = fgetc(in); c != EOF && c != '\n'; c = fgetc(in));
292 if (c == EOF)
293 return FALSE;
294 return TRUE;
295 }
297 static gboolean
298 eat_spaces(FILE * in)
299 {
300 gint c;
302 for (c = fgetc(in); c != EOF && isspace(c); c = fgetc(in)) {
303 /* empty */
304 }
305 if (c == EOF)
306 return FALSE;
307 ungetc(c, in);
308 return TRUE;
309 }
311 static gboolean
312 read_lval(FILE * in, gchar * buf, gint size)
313 {
314 gint c;
315 gchar *ptr = buf;
317 DEBUG(6) fprintf(stderr, "read_lval()\n");
319 if (!eat_spaces(in))
320 return FALSE;
322 c = fgetc(in);
323 DEBUG(6) fprintf(stderr, "read_lval() 2\n");
324 while ((isalnum(c) || c == '_' || c == '-' || c == '.')
325 && (ptr < buf + size - 1)
326 && (c != EOF)) {
327 *ptr = c;
328 ptr++;
329 c = fgetc(in);
330 }
331 *ptr = '\0';
332 ungetc(c, in);
334 if (c == EOF) {
335 fprintf(stderr, "unexpected EOF after %s\n", buf);
336 return FALSE;
337 } else if (ptr >= buf + size - 1) {
338 fprintf(stderr, "lval too long\n");
339 }
341 eat_spaces(in);
343 DEBUG(6) fprintf(stderr, "lval = %s\n", buf);
345 return buf[0] != '\0';
346 }
348 static gboolean
349 read_rval(FILE * in, gchar * buf, gint size)
350 {
351 gint c;
352 gchar *ptr = buf;
354 DEBUG(6) fprintf(stderr, "read_rval()\n");
356 if (!eat_spaces(in))
357 return FALSE;
359 c = fgetc(in);
360 if (c != '\"') {
361 while ((isalnum(c) || c == '_' || c == '-' || c == '.'
362 || c == '/' || c == '@' || c == ';' || c == ':')
363 && (ptr < buf + size - 1)
364 && (c != EOF)) {
365 *ptr = c;
366 ptr++;
367 c = fgetc(in);
368 }
369 *ptr = '\0';
370 ungetc(c, in);
371 } else {
372 gboolean escape = FALSE;
373 c = fgetc(in);
374 while (((c != '\"') || escape) && (ptr < buf + size - 1)) {
375 if (c != '\n') { /* ignore line breaks */
376 if ((c == '\\') && (!escape)) {
377 escape = TRUE;
378 } else {
379 *ptr = c;
380 ptr++;
381 escape = FALSE;
382 }
383 }
384 c = fgetc(in);
385 }
386 *ptr = '\0';
387 }
389 eat_line_trailing(in);
391 DEBUG(6) fprintf(stderr, "rval = %s\n", buf);
393 return TRUE;
394 }
396 static gboolean
397 read_statement(FILE * in, gchar * lval, gint lsize, gchar * rval, gint rsize)
398 {
399 gint c;
401 DEBUG(6) fprintf(stderr, "read_statement()\n");
403 /* eat comments and empty lines: */
404 if (!eat_comments(in))
405 return FALSE;
407 if (!read_lval(in, lval, lsize)) {
408 return FALSE;
409 }
411 DEBUG(6) fprintf(stderr, " lval = %s\n", lval);
412 if ((c = fgetc(in) == '=')) {
413 if (read_rval(in, rval, rsize)) {
414 DEBUG(6) fprintf(stderr, " rval = %s\n", rval);
415 return TRUE;
416 }
417 } else {
418 DEBUG(6) fprintf(stderr," '=' expected after %s, char was '%c'\n", lval, c);
419 fprintf(stderr, "'=' expected after %s, char was '%c'\n", lval, c);
420 }
421 return FALSE;
422 }
424 gboolean
425 read_conf(gchar * filename)
426 {
427 FILE *in;
429 conf.log_max_pri = 7;
430 conf.remote_port = 25;
431 conf.do_relay = TRUE;
432 conf.alias_local_cmp = strcmp;
433 conf.max_defer_time = 86400 * 4; /* 4 days */
434 conf.max_msg_size = 0; /* no limit on msg size */
435 conf.spool_dir = SPOOL_DIR;
436 conf.mail_dir = "/var/mail";
437 conf.listen_addresses = g_list_append(NULL, parse_interface("localhost", 25));
439 if ((in = fopen(filename, "r")) == NULL) {
440 logwrite(LOG_ALERT, "could not open config file %s: %s\n", filename, strerror(errno));
441 return FALSE;
442 }
444 gchar lval[256], rval[2048];
445 while (read_statement(in, lval, 256, rval, 2048)) {
446 DEBUG(6) fprintf(stderr,"read_conf(): lval=%s\n", lval);
447 if (strcmp(lval, "debug_level") == 0)
448 conf.debug_level = atoi(rval);
449 else if (strcmp(lval, "run_as_user") == 0) {
450 if (!conf.run_as_user) /* you should not be able to reset that flag */
451 conf.run_as_user = parse_boolean(rval);
452 } else if (strcmp(lval, "use_syslog") == 0)
453 conf.use_syslog = parse_boolean(rval);
454 else if (strcmp(lval, "mail_dir") == 0)
455 conf.mail_dir = g_strdup(rval);
456 else if (strcmp(lval, "lock_dir") == 0)
457 conf.lock_dir = g_strdup(rval);
458 else if (strcmp(lval, "spool_dir") == 0)
459 conf.spool_dir = g_strdup(rval);
460 else if (strcmp(lval, "log_dir") == 0)
461 conf.log_dir = g_strdup(rval);
462 else if (strcmp(lval, "host_name") == 0) {
463 if (rval[0] != '/')
464 conf.host_name = g_strdup(rval);
465 else {
466 char buf[256];
467 FILE *fptr = fopen(rval, "rt");
468 if (fptr) {
469 logwrite(LOG_ALERT, "could not open %s: %s\n", rval, strerror(errno));
470 return FALSE;
471 }
472 fgets(buf, 255, fptr);
473 g_strchomp(buf);
474 conf.host_name = g_strdup(buf);
475 fclose(fptr);
476 }
477 } else if (strcmp(lval, "remote_port") == 0) {
478 logwrite(LOG_WARNING, "the remote_port option is now deprecated. Use 'mail_host' in the\n"
479 "route configuration instead. See man masqmail.route\n");
480 conf.remote_port = atoi(rval);
481 } else if (strcmp(lval, "local_hosts") == 0)
482 conf.local_hosts = parse_list(rval, FALSE);
483 else if (strcmp(lval, "local_addresses") == 0)
484 conf.local_addresses = parse_list(rval, TRUE);
485 else if (strcmp(lval, "not_local_addresses") == 0)
486 conf.not_local_addresses = parse_list(rval, TRUE);
487 else if (strcmp(lval, "local_nets") == 0)
488 conf.local_nets = parse_list(rval, FALSE);
489 else if (strcmp(lval, "do_save_envelope_to") == 0)
490 conf.do_save_envelope_to = parse_boolean(rval);
491 else if (strcmp(lval, "defer_all") == 0)
492 conf.defer_all = parse_boolean(rval);
493 else if (strcmp(lval, "do_relay") == 0)
494 conf.do_relay = parse_boolean(rval);
495 else if (strcmp(lval, "alias_file") == 0) {
496 conf.alias_file = g_strdup(rval);
497 } else if (strcmp(lval, "alias_local_caseless") == 0) {
498 conf.alias_local_cmp = parse_boolean(rval) ? strcasecmp : strcmp;
499 } else if (strcmp(lval, "mbox_default") == 0) {
500 conf.mbox_default = g_strdup(rval);
501 } else if (strcmp(lval, "mbox_users") == 0) {
502 conf.mbox_users = parse_list(rval, TRUE);
503 } else if (strcmp(lval, "mda_users") == 0) {
504 conf.mda_users = parse_list(rval, TRUE);
505 } else if (strcmp(lval, "maildir_users") == 0) {
506 conf.maildir_users = parse_list(rval, TRUE);
507 } else if (strcmp(lval, "mda") == 0) {
508 conf.mda = g_strdup(rval);
509 } else if (strcmp(lval, "mda_fromline") == 0) {
510 conf.mda_fromline = parse_boolean(rval);
511 } else if (strcmp(lval, "mda_fromhack") == 0) {
512 conf.mda_fromhack = parse_boolean(rval);
513 } else if (strcmp(lval, "pipe_fromline") == 0) {
514 conf.pipe_fromline = parse_boolean(rval);
515 } else if (strcmp(lval, "pipe_fromhack") == 0) {
516 conf.pipe_fromhack = parse_boolean(rval);
517 } else if (strcmp(lval, "listen_addresses") == 0) {
518 GList *node;
519 GList *tmp_list = parse_list(rval, FALSE);
521 conf.listen_addresses = NULL;
522 foreach(tmp_list, node) {
523 conf.listen_addresses = g_list_append(conf.listen_addresses, parse_interface((gchar *) (node-> data), 25));
524 g_free(node->data);
525 }
526 g_list_free(tmp_list);
527 } else if (strcmp(lval, "ident_trusted_nets") == 0) {
528 #ifdef ENABLE_IDENT
529 GList *node;
530 GList *tmp_list = parse_list(rval, FALSE);
532 conf.ident_trusted_nets = NULL;
533 foreach(tmp_list, node) {
534 conf.ident_trusted_nets = g_list_append(conf.ident_trusted_nets, parse_network((gchar *) (node->data), 25));
535 g_free(node->data);
536 }
537 g_list_free(tmp_list);
538 #else
539 logwrite(LOG_WARNING, "%s ignored: not compiled with ident support\n", lval);
540 #endif
541 } else if ((strncmp(lval, "connect_route.", 14) == 0)
542 || (strncmp(lval, "online_routes.", 14) == 0)) {
543 GList *file_list = parse_list(rval, FALSE);
544 table_pair *pair = create_pair(&(lval[14]), file_list);
545 conf.connect_routes = g_list_append(conf.connect_routes, pair);
546 } else if (strcmp(lval, "local_net_route") == 0) {
547 conf.local_net_routes = parse_list(rval, FALSE);
548 } else if (strcmp(lval, "online_detect") == 0)
549 conf.online_detect = g_strdup(rval);
550 else if (strcmp(lval, "online_file") == 0)
551 conf.online_file = g_strdup(rval);
552 else if (strcmp(lval, "online_pipe") == 0)
553 conf.online_pipe = g_strdup(rval);
554 else if (strcmp(lval, "mserver_iface") == 0)
555 conf.mserver_iface = parse_interface(rval, 224);
556 else if (strcmp(lval, "do_queue") == 0)
557 conf.do_queue = parse_boolean(rval);
558 else if (strncmp(lval, "get.", 4) == 0) {
559 #ifdef ENABLE_POP3
560 table_pair *pair = create_pair_string(&(lval[4]), rval);
561 conf.get_names = g_list_append(conf.get_names, pair);
562 #else
563 logwrite(LOG_WARNING, "get.<name> ignored: not compiled with pop support\n");
564 #endif
565 } else if (strncmp(lval, "online_gets.", 12) == 0) {
566 #ifdef ENABLE_POP3
567 GList *file_list = parse_list(rval, FALSE);
568 table_pair *pair = create_pair(&(lval[12]), file_list);
569 conf.online_gets = g_list_append(conf.online_gets, pair);
570 #else
571 logwrite(LOG_WARNING, "online_gets.<name> ignored: not compiled with pop support\n");
572 #endif
573 } else if (strcmp(lval, "errmsg_file") == 0)
574 conf.errmsg_file = g_strdup(rval);
575 else if (strcmp(lval, "warnmsg_file") == 0)
576 conf.warnmsg_file = g_strdup(rval);
577 else if (strcmp(lval, "warn_intervals") == 0)
578 conf.warn_intervals = parse_list(rval, FALSE);
579 else if (strcmp(lval, "max_defer_time") == 0) {
580 gint dummy;
581 gint ival = time_interval(rval, &dummy);
582 if (ival < 0)
583 logwrite(LOG_WARNING, "invalid time interval for 'max_defer_time': %s\n", rval);
584 else
585 conf.max_defer_time = ival;
586 } else if (strcmp(lval, "log_user") == 0)
587 conf.log_user = g_strdup(rval);
588 else if(strcmp(lval, "max_msg_size") == 0) {
589 conf.max_msg_size = atol(rval);
590 DEBUG(6) fprintf(stderr,"rval=%s, conf.max_msg_size=%ld\n",
591 rval, conf.max_msg_size);
592 }
593 else
594 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
595 }
596 fclose(in);
598 if (!conf.host_name) {
599 logwrite(LOG_ALERT, "`host_name' MUST be set in masqmail.conf. See man page\n");
600 return FALSE;
601 }
603 if (conf.errmsg_file == NULL)
604 conf.errmsg_file = g_strdup(DATA_DIR "/tpl/failmsg.tpl");
605 if (conf.warnmsg_file == NULL)
606 conf.warnmsg_file = g_strdup(DATA_DIR "/tpl/warnmsg.tpl");
608 if (conf.lock_dir == NULL)
609 conf.lock_dir = g_strdup_printf("%s/lock/", conf.spool_dir);
611 if (conf.mbox_default == NULL)
612 conf.mbox_default = g_strdup("mbox");
614 if (conf.warn_intervals == NULL)
615 conf.warn_intervals = parse_list("1h;4h;8h;1d;2d;3d", FALSE);
617 if (!conf.local_hosts) {
618 char* shortname = strdup(conf.host_name);
619 char* p = strchr(shortname, '.');
620 if (p) {
621 *p = '\0';
622 }
623 /* we don't care if shortname and conf.host_name are the same */
624 char* local_hosts_str = g_strdup_printf("localhost;%s;%s", shortname, conf.host_name);
625 conf.local_hosts = parse_list(local_hosts_str, FALSE);
626 free(shortname);
627 free(local_hosts_str);
628 }
631 return TRUE;
632 }
634 connect_route*
635 read_route(gchar * filename, gboolean is_local_net)
636 {
637 gboolean ok = FALSE;
638 FILE *in;
640 connect_route *route = g_malloc(sizeof(connect_route));
641 memset(route, 0, sizeof(connect_route));
643 DEBUG(5) debugf("read_route, filename = %s\n", filename);
645 route->filename = g_strdup(filename);
646 route->name = g_strdup(filename); /* quick hack */
648 route->protocol = g_strdup("smtp");
649 route->expand_h_sender_address = TRUE;
651 route->is_local_net = is_local_net;
653 route->do_pipelining = TRUE;
655 if ((in = fopen(route->filename, "r")) == NULL) {
656 logwrite(LOG_ALERT, "could not open route file %s: %s\n", route->filename, strerror(errno));
657 g_free(route);
658 return NULL;
659 }
661 gchar lval[256], rval[2048];
662 while (read_statement(in, lval, 256, rval, 2048)) {
663 if (strcmp(lval, "protocol") == 0)
664 route->protocol = g_strdup(rval);
665 else if (strcmp(lval, "mail_host") == 0)
666 route->mail_host = parse_interface(rval, conf.remote_port);
667 else if (strcmp(lval, "helo_name") == 0)
668 route->helo_name = g_strdup(rval);
669 else if (strcmp(lval, "wrapper") == 0)
670 route->wrapper = g_strdup(rval);
671 else if (strcmp(lval, "connect_error_fail") == 0)
672 route->connect_error_fail = parse_boolean(rval);
673 else if (strcmp(lval, "do_correct_helo") == 0)
674 route->do_correct_helo = parse_boolean(rval);
675 else if (strcmp(lval, "do_pipelining") == 0)
676 route->do_pipelining = parse_boolean(rval);
677 else if (strcmp(lval, "allowed_return_paths") == 0)
678 route->allowed_return_paths = parse_address_list(rval, TRUE);
679 else if (strcmp(lval, "allowed_mail_locals") == 0)
680 route->allowed_mail_locals = parse_list(rval, TRUE);
681 else if (strcmp(lval, "not_allowed_return_paths") == 0)
682 route->not_allowed_return_paths = parse_address_list(rval, TRUE);
683 else if (strcmp(lval, "not_allowed_mail_locals") == 0)
684 route->not_allowed_mail_locals = parse_list(rval, TRUE);
685 else if (strcmp(lval, "allowed_rcpt_domains") == 0)
686 route->allowed_rcpt_domains = parse_list(rval, TRUE);
687 else if (strcmp(lval, "not_allowed_rcpt_domains") == 0)
688 route->not_allowed_rcpt_domains = parse_list(rval, TRUE);
689 else if (strcmp(lval, "set_h_from_domain") == 0)
690 route->set_h_from_domain = g_strdup(rval);
691 else if (strcmp(lval, "set_h_reply_to_domain") == 0)
692 route->set_h_reply_to_domain = g_strdup(rval);
693 else if (strcmp(lval, "set_return_path_domain") == 0)
694 route->set_return_path_domain = g_strdup(rval);
695 else if (strcmp(lval, "map_return_path_addresses") == 0) {
696 GList *node, *list;
698 list = parse_list(rval, TRUE);
699 foreach(list, node) {
700 gchar *item = (gchar *) (node->data);
701 table_pair *pair = parse_table_pair(item, ':');
702 address *addr = create_address((gchar *) (pair->value), TRUE);
703 g_free(pair->value);
704 pair->value = (gpointer *) addr;
705 route->map_return_path_addresses = g_list_append(route->map_return_path_addresses, pair);
706 g_free(item);
707 }
708 g_list_free(list);
709 } else if (strcmp(lval, "map_h_from_addresses") == 0) {
710 GList *list, *node;
712 list = parse_list(rval, TRUE);
713 foreach(list, node) {
714 gchar *item = (gchar *) (node->data);
715 table_pair *pair = parse_table_pair(item, ':');
716 route->map_h_from_addresses = g_list_append(route->map_h_from_addresses, pair);
717 g_free(item);
718 }
719 g_list_free(list);
720 } else if (strcmp(lval, "map_h_reply_to_addresses") == 0) {
721 GList *list, *node;
723 list = parse_list(rval, TRUE);
724 foreach(list, node) {
725 gchar *item = (gchar *) (node->data);
726 table_pair *pair = parse_table_pair(item, ':');
727 route->map_h_reply_to_addresses = g_list_append(route->map_h_reply_to_addresses, pair);
728 g_free(item);
729 }
730 g_list_free(list);
731 } else if (strcmp(lval, "map_h_mail_followup_to_addresses") == 0) {
732 GList *list, *node;
734 list = parse_list(rval, TRUE);
735 foreach(list, node) {
736 gchar *item = (gchar *) (node->data);
737 table_pair *pair = parse_table_pair(item, ':');
738 route->map_h_mail_followup_to_addresses = g_list_append(route->map_h_mail_followup_to_addresses, pair);
739 g_free(item);
740 }
741 g_list_free(list);
742 } else if (strcmp(lval, "expand_h_sender_domain") == 0) {
743 route->expand_h_sender_domain = parse_boolean(rval);
744 } else if (strcmp(lval, "expand_h_sender_address") == 0) {
745 route->expand_h_sender_address = parse_boolean(rval);
746 } else if (strcmp(lval, "resolve_list") == 0)
747 route->resolve_list = parse_resolve_list(rval);
748 else if (strcmp(lval, "do_ssl") == 0) {
749 /* we ignore this. This option is used by sqilconf */
750 ;
751 }
752 #ifdef ENABLE_AUTH
753 else if (strcmp(lval, "auth_name") == 0) {
754 route->auth_name = g_strdup(rval);
755 } else if (strcmp(lval, "auth_login") == 0) {
756 route->auth_login = g_strdup(rval);
757 } else if (strcmp(lval, "auth_secret") == 0) {
758 route->auth_secret = g_strdup(rval);
759 }
760 #else
761 else if ((strcmp(lval, "auth_name") == 0)
762 || (strcmp(lval, "auth_login") == 0)
763 || (strcmp(lval, "auth_secret") == 0)) {
764 logwrite(LOG_WARNING, "%s ignored: not compiled with auth support.\n", lval);
765 }
766 #endif
767 else if (strcmp(lval, "pop3_login") == 0) {
768 #ifdef ENABLE_POP3
769 route->pop3_login = g_strdup(rval);
770 #else
771 logwrite(LOG_WARNING, "pop3_login ignored: not compiled with pop support.\n");
772 #endif
773 } else if (strcmp(lval, "pipe") == 0) {
774 route->pipe = g_strdup(rval);
775 } else if (strcmp(lval, "pipe_fromline") == 0) {
776 route->pipe_fromline = parse_boolean(rval);
777 } else if (strcmp(lval, "pipe_fromhack") == 0) {
778 route->pipe_fromhack = parse_boolean(rval);
779 } else if (strcmp(lval, "last_route") == 0) {
780 route->last_route = parse_boolean(rval);
781 } else
782 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
783 }
785 if (route->resolve_list == NULL) {
786 if (is_local_net) {
787 route->resolve_list = g_list_append(NULL, resolve_byname);
788 } else {
789 #ifdef ENABLE_RESOLVER
790 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_mx);
791 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_a);
792 #endif
793 route->resolve_list = g_list_append(route->resolve_list, resolve_byname);
794 }
795 }
796 fclose(in);
797 ok = TRUE;
799 /* warn user about misconfigurations: */
800 if ((route->map_h_from_addresses != NULL) && (route->set_h_from_domain != NULL)) {
801 logwrite(LOG_WARNING, "'map_h_from_addresses' overrides 'set_h_from_domain'\n");
802 g_free(route->set_h_from_domain);
803 route->set_h_from_domain = NULL;
804 }
805 if ((route->map_h_reply_to_addresses != NULL) && (route->set_h_reply_to_domain != NULL)) {
806 logwrite(LOG_WARNING, "'map_h_reply_to_addresses' overrides 'set_h_reply_to_domain'\n");
807 g_free(route->set_h_reply_to_domain);
808 route->set_h_reply_to_domain = NULL;
809 }
811 if (!ok) {
812 g_free(route);
813 route = NULL;
814 }
816 return route;
817 }
819 static void
820 _g_list_free_all(GList * list)
821 {
822 GList *node;
823 if (list) {
824 foreach(list, node)
825 g_free(node->data);
826 g_list_free(list);
827 }
828 }
830 void
831 destroy_route(connect_route * r)
832 {
833 if (r->filename)
834 g_free(r->filename);
835 if (r->protocol)
836 g_free(r->protocol);
837 if (r->mail_host) {
838 g_free(r->mail_host->address);
839 g_free(r->mail_host);
840 }
841 if (r->wrapper)
842 g_free(r->wrapper);
843 if (r->helo_name)
844 g_free(r->helo_name);
845 _g_list_free_all(r->allowed_mail_locals);
846 _g_list_free_all(r->not_allowed_mail_locals);
847 _g_list_free_all(r->allowed_rcpt_domains);
848 _g_list_free_all(r->not_allowed_rcpt_domains);
849 if (r->set_h_from_domain)
850 g_free(r->set_h_from_domain);
851 if (r->set_h_reply_to_domain)
852 g_free(r->set_h_reply_to_domain);
853 if (r->set_return_path_domain)
854 g_free(r->set_return_path_domain);
855 if (r->map_h_reply_to_addresses)
856 destroy_table(r->map_h_reply_to_addresses);
857 if (r->resolve_list)
858 g_list_free(r->resolve_list);
859 #ifdef ENABLE_AUTH
860 if (r->auth_name)
861 g_free(r->auth_name);
862 if (r->auth_login)
863 g_free(r->auth_login);
864 if (r->auth_secret)
865 g_free(r->auth_secret);
866 #endif
867 #ifdef ENABLE_POP3
868 if (r->pop3_login)
869 g_free(r->pop3_login);
870 #endif
871 if (r->pipe)
872 g_free(r->pipe);
873 g_free(r);
874 }
876 GList*
877 read_route_list(GList * rf_list, gboolean is_local_net)
878 {
879 GList *list = NULL;
880 GList *node;
881 uid_t saved_uid, saved_gid;
883 if (!conf.run_as_user) {
884 set_euidgid(0, 0, &saved_uid, &saved_gid);
885 }
887 foreach(rf_list, node) {
888 gchar *fname = (gchar *) (node->data);
889 connect_route *route = read_route(fname, is_local_net);
890 if (route)
891 list = g_list_append(list, route);
892 else
893 logwrite(LOG_ALERT, "could not read route configuration %s\n", fname);
894 }
896 /* set uid and gid back */
897 if (!conf.run_as_user) {
898 set_euidgid(saved_uid, saved_gid, NULL, NULL);
899 }
901 return list;
902 }
904 void
905 destroy_route_list(GList * list)
906 {
907 GList *node;
909 foreach(list, node) {
910 connect_route *route = (connect_route *) (node->data);
911 destroy_route(route);
912 }
913 g_list_free(list);
914 }
916 #ifdef ENABLE_POP3
918 get_conf*
919 read_get_conf(gchar * filename)
920 {
921 FILE *in;
923 get_conf *gc = g_malloc(sizeof(get_conf));
924 memset(gc, 0, sizeof(get_conf));
926 gc->server_port = 110;
928 if ((in = fopen(filename, "r")) == NULL) {
929 logwrite(LOG_ALERT, "could not open get file %s: %s\n", filename, strerror(errno));
930 g_free(gc);
931 return NULL;
932 }
934 gchar lval[256], rval[2048];
935 while (read_statement(in, lval, 256, rval, 2048)) {
936 if (strcmp(lval, "protocol") == 0)
937 gc->protocol = g_strdup(rval);
938 else if (strcmp(lval, "server") == 0)
939 gc->server_name = g_strdup(rval);
940 else if (strcmp(lval, "port") == 0)
941 gc->server_port = atoi(rval);
942 else if (strcmp(lval, "wrapper") == 0)
943 gc->wrapper = g_strdup(rval);
944 else if (strcmp(lval, "user") == 0)
945 gc->login_user = g_strdup(rval);
946 else if (strcmp(lval, "pass") == 0)
947 gc->login_pass = g_strdup(rval);
948 else if (strcmp(lval, "address") == 0)
949 gc->address = create_address_qualified(rval, TRUE, conf.host_name);
950 else if (strcmp(lval, "return_path") == 0)
951 gc->return_path = create_address_qualified(rval, TRUE, conf.host_name);
952 else if (strcmp(lval, "do_ssl") == 0)
953 /* we ignore this. This option is used by sqilconf */
954 ;
955 else if (strcmp(lval, "do_keep") == 0)
956 gc->do_keep = parse_boolean(rval);
957 else if (strcmp(lval, "do_uidl") == 0)
958 gc->do_uidl = parse_boolean(rval);
959 else if (strcmp(lval, "do_uidl_dele") == 0)
960 gc->do_uidl_dele = parse_boolean(rval);
961 else if (strcmp(lval, "max_size") == 0)
962 gc->max_size = atoi(rval);
963 else if (strcmp(lval, "max_size_delete") == 0)
964 gc->max_size_delete = parse_boolean(rval);
965 else if (strcmp(lval, "max_count") == 0)
966 gc->max_count = atoi(rval);
967 else if (strcmp(lval, "resolve_list") == 0)
968 gc->resolve_list = parse_resolve_list(rval);
969 else
970 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
971 }
972 fclose(in);
974 if (gc->resolve_list == NULL) {
975 #ifdef ENABLE_RESOLVER
976 gc->resolve_list = g_list_append(NULL, resolve_dns_a);
977 #endif
978 gc->resolve_list = g_list_append(NULL, resolve_byname);
979 }
981 if (gc->protocol == NULL)
982 gc->protocol = g_strdup("pop3");
983 return gc;
984 }
986 void
987 destroy_get_conf(get_conf * gc)
988 {
989 if (gc->protocol)
990 g_free(gc->protocol);
991 if (gc->server_name)
992 g_free(gc->server_name);
993 if (gc->login_user)
994 g_free(gc->login_user);
995 if (gc->login_pass)
996 g_free(gc->login_pass);
997 if (gc->wrapper)
998 g_free(gc->wrapper);
999 if (gc->address)
1000 destroy_address(gc->address);
1001 if (gc->return_path)
1002 destroy_address(gc->return_path);
1003 if (gc->resolve_list)
1004 g_list_free(gc->resolve_list);
1005 g_free(gc);
1006 }
1008 #endif
1010 connect_route*
1011 create_local_route()
1012 {
1013 connect_route *route;
1015 route = g_malloc(sizeof(connect_route));
1016 if (!route) {
1017 return NULL;
1018 }
1019 memset(route, 0, sizeof(connect_route));
1020 route->protocol = g_strdup("smtp");
1021 route->is_local_net = TRUE;
1022 route->name = g_strdup("local_net (default)");
1023 route->expand_h_sender_address = TRUE;
1024 route->resolve_list = g_list_append(NULL, resolve_byname);
1025 route->connect_error_fail = TRUE;
1026 return route;
1027 }