masqmail

view src/conf.c @ 156:ee2afbf92428

require host_name to be set in config file exit otherwise there is no portable way to determine the hostname (actually the hostname that masqmail should use) thus it must be set by the administrator
author meillo@marmaro.de
date Thu, 08 Jul 2010 09:49:05 +0200
parents b5ab9cb2f18a
children 586f001f5bbd
line source
1 /* MasqMail
2 Copyright (C) 1999-2001 Oliver Kurth
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
17 */
19 #include <pwd.h>
20 #include <grp.h>
22 #include "masqmail.h"
24 masqmail_conf conf;
26 void
27 init_conf()
28 {
29 struct passwd *passwd;
30 struct group *group;
32 memset(&conf, 0, sizeof(masqmail_conf));
34 conf.orig_uid = getuid();
35 conf.orig_gid = getgid();
37 if ((passwd = getpwnam(DEF_MAIL_USER)))
38 conf.mail_uid = passwd->pw_uid;
39 else {
40 fprintf(stderr, "user %s not found! (terminating)\n", DEF_MAIL_USER);
41 exit(EXIT_FAILURE);
42 }
43 if ((group = getgrnam(DEF_MAIL_GROUP)))
44 conf.mail_gid = group->gr_gid;
45 else {
46 fprintf(stderr, "group %s not found! (terminating)\n", DEF_MAIL_GROUP);
47 exit(EXIT_FAILURE);
48 }
49 }
51 static gchar* true_strings[] = {
52 "yes", "on", "true", NULL
53 };
55 static gchar *false_strings[] = {
56 "no", "off", "false", NULL
57 };
59 static gboolean
60 parse_boolean(gchar * rval)
61 {
62 gchar **str;
64 DEBUG(6) fprintf(stderr, "parse_boolean: %s\n", rval);
66 str = true_strings;
67 while (*str) {
68 if (strncasecmp(*str, rval, strlen(*str)) == 0)
69 return TRUE;
70 str++;
71 }
73 str = false_strings;
74 while (*str) {
75 if (strncasecmp(*str, rval, strlen(*str)) == 0)
76 return FALSE;
77 str++;
78 }
80 fprintf(stderr, "cannot parse value '%s'\n", rval);
81 exit(EXIT_FAILURE);
82 }
84 /* make a list from each line in a file */
85 static GList*
86 parse_list_file(gchar * fname)
87 {
88 GList *list = NULL;
89 FILE *fptr;
91 if ((fptr = fopen(fname, "rt")) == NULL) {
92 logwrite(LOG_ALERT, "could not open %s for reading: %s\n", fname, strerror(errno));
93 exit(EXIT_FAILURE);
94 }
96 gchar buf[256];
98 while (!feof(fptr)) {
99 fgets(buf, 255, fptr);
100 if (buf[0] && (buf[0] != '#') && (buf[0] != '\n')) {
101 g_strchomp(buf);
102 DEBUG(6) fprintf(stderr,"parse_list_file: item = %s\n", buf);
103 list = g_list_append(list, g_strdup(buf));
104 }
105 }
106 fclose(fptr);
108 return list;
109 }
111 /* given a semicolon separated string, this function makes a GList out of it. */
112 GList*
113 parse_list(gchar * line, gboolean read_file)
114 {
115 GList *list = NULL;
116 gchar buf[256];
117 gchar *p, *q;
119 DEBUG(6) fprintf(stderr, "parsing list %s, file?:%d\n", line, read_file);
121 p = line;
122 while (*p != '\0') {
123 q = buf;
125 while (*p && (*p != ';') && (q < buf + 255))
126 *(q++) = *(p++);
127 *q = '\0';
129 if ((buf[0] == '/') && (read_file))
130 /* item is a filename, include its contents */
131 list = g_list_concat(list, parse_list_file(buf));
132 else
133 /* just a normal item */
134 list = g_list_append(list, g_strdup(buf));
136 DEBUG(6) fprintf(stderr, "item = %s\n", buf);
138 if (*p)
139 p++;
140 }
141 return list;
142 }
144 static GList*
145 parse_address_list(gchar * line, gboolean read_file)
146 {
147 GList *plain_list = parse_list(line, read_file);
148 GList *node;
149 GList *list = NULL;
151 foreach(plain_list, node) {
152 gchar *item = (gchar *) (node->data);
153 address *addr = create_address(item, TRUE);
154 if (addr)
155 list = g_list_append(list, addr);
156 g_free(item);
157 }
158 g_list_free(plain_list);
160 return list;
161 }
163 static GList*
164 parse_resolve_list(gchar * line)
165 {
166 GList *list;
167 GList *list_node;
168 GList *res_list = NULL;
170 list = parse_list(line, FALSE);
171 if (!list) {
172 return NULL;
173 }
175 foreach(list, list_node) {
176 gchar *item = (gchar *) (list_node->data);
177 if (strcmp(item, "byname") == 0) {
178 res_list = g_list_append(res_list, resolve_byname);
179 #ifdef ENABLE_RESOLVER
180 } else if (strcmp(item, "dns_a") == 0) {
181 res_list = g_list_append(res_list, resolve_dns_a);
182 } else if (strcmp(item, "dns_mx") == 0) {
183 res_list = g_list_append(res_list, resolve_dns_mx);
184 #endif
185 } else {
186 logwrite(LOG_ALERT, "unknown resolver %s\n", item);
187 exit(EXIT_FAILURE);
188 }
189 g_free(item);
190 }
191 g_list_free(list);
192 return res_list;
193 }
195 static interface*
196 parse_interface(gchar * line, gint def_port)
197 {
198 gchar buf[256];
199 gchar *p, *q;
200 interface *iface;
202 DEBUG(6) fprintf(stderr, "parse_interface: %s\n", line);
204 p = line;
205 q = buf;
206 while ((*p != '\0') && (*p != ':') && (q < buf + 255))
207 *(q++) = *(p++);
208 *q = '\0';
210 iface = g_malloc(sizeof(interface));
211 iface->address = g_strdup(buf);
213 if (*p) {
214 p++;
215 iface->port = atoi(p);
216 } else
217 iface->port = def_port;
218 DEBUG(6) fprintf(stderr,"rval=%s, address:port=%s:%i\n",line, iface->address, iface->port);
220 return iface;
221 }
223 #ifdef ENABLE_IDENT /* so far used for that only */
224 static struct in_addr*
225 parse_network(gchar * line, gint def_port)
226 {
227 gchar buf[256];
228 gchar *p, *q;
229 struct in_addr addr, mask_addr, net_addr, *p_net_addr;
230 guint n;
232 DEBUG(6) fprintf(stderr, "parse_network: %s\n", line);
234 p = line;
235 q = buf;
236 while ((*p != '\0') && (*p != '/') && (q < buf + 255))
237 *(q++) = *(p++);
238 *q = '\0';
240 if ((addr.s_addr = inet_addr(buf)) == INADDR_NONE) {
241 fprintf(stderr, "'%s' is not a valid address (must be ip)\n", buf);
242 exit(EXIT_FAILURE);
243 }
245 if (*p) {
246 guint i;
247 p++;
248 i = atoi(p);
249 if ((i >= 0) && (i <= 32))
250 n = i ? ~((1 << (32 - i)) - 1) : 0;
251 else {
252 fprintf(stderr, "'%d' is not a valid net mask (must be >= 0 and <= 32)\n", i);
253 exit(EXIT_FAILURE);
254 }
255 } else
256 n = 0;
258 mask_addr.s_addr = htonl(n);
259 net_addr.s_addr = mask_addr.s_addr & addr.s_addr;
261 p_net_addr = g_malloc(sizeof(struct in_addr));
262 p_net_addr->s_addr = net_addr.s_addr;
263 return p_net_addr;
264 }
265 #endif
267 static gboolean
268 eat_comments(FILE * in)
269 {
270 gint c;
272 for (c = fgetc(in); (c == '#' || isspace(c)) && c != EOF;
273 c = fgetc(in)) {
274 if (c == '#') {
275 gint c;
276 for (c = fgetc(in); (c != '\n') && (c != EOF); c = fgetc(in));
277 }
278 }
279 if (c == EOF)
280 return FALSE;
281 ungetc(c, in);
282 return TRUE;
283 }
285 /* after parsing, eat trailing character until LF */
286 static gboolean
287 eat_line_trailing(FILE * in)
288 {
289 gint c;
291 for (c = fgetc(in); c != EOF && c != '\n'; c = fgetc(in));
292 if (c == EOF)
293 return FALSE;
294 return TRUE;
295 }
297 static gboolean
298 eat_spaces(FILE * in)
299 {
300 gint c;
302 for (c = fgetc(in); c != EOF && isspace(c); c = fgetc(in)) {
303 /* empty */
304 }
305 if (c == EOF)
306 return FALSE;
307 ungetc(c, in);
308 return TRUE;
309 }
311 static gboolean
312 read_lval(FILE * in, gchar * buf, gint size)
313 {
314 gint c;
315 gchar *ptr = buf;
317 DEBUG(6) fprintf(stderr, "read_lval()\n");
319 if (!eat_spaces(in))
320 return FALSE;
322 c = fgetc(in);
323 DEBUG(6) fprintf(stderr, "read_lval() 2\n");
324 while ((isalnum(c) || c == '_' || c == '-' || c == '.')
325 && (ptr < buf + size - 1)
326 && (c != EOF)) {
327 *ptr = c;
328 ptr++;
329 c = fgetc(in);
330 }
331 *ptr = '\0';
332 ungetc(c, in);
334 if (c == EOF) {
335 fprintf(stderr, "unexpected EOF after %s\n", buf);
336 return FALSE;
337 } else if (ptr >= buf + size - 1) {
338 fprintf(stderr, "lval too long\n");
339 }
341 eat_spaces(in);
343 DEBUG(6) fprintf(stderr, "lval = %s\n", buf);
345 return buf[0] != '\0';
346 }
348 static gboolean
349 read_rval(FILE * in, gchar * buf, gint size)
350 {
351 gint c;
352 gchar *ptr = buf;
354 DEBUG(6) fprintf(stderr, "read_rval()\n");
356 if (!eat_spaces(in))
357 return FALSE;
359 c = fgetc(in);
360 if (c != '\"') {
361 while ((isalnum(c) || c == '_' || c == '-' || c == '.'
362 || c == '/' || c == '@' || c == ';' || c == ':')
363 && (ptr < buf + size - 1)
364 && (c != EOF)) {
365 *ptr = c;
366 ptr++;
367 c = fgetc(in);
368 }
369 *ptr = '\0';
370 ungetc(c, in);
371 } else {
372 gboolean escape = FALSE;
373 c = fgetc(in);
374 while (((c != '\"') || escape) && (ptr < buf + size - 1)) {
375 if (c != '\n') { /* ignore line breaks */
376 if ((c == '\\') && (!escape)) {
377 escape = TRUE;
378 } else {
379 *ptr = c;
380 ptr++;
381 escape = FALSE;
382 }
383 }
384 c = fgetc(in);
385 }
386 *ptr = '\0';
387 }
389 eat_line_trailing(in);
391 DEBUG(6) fprintf(stderr, "rval = %s\n", buf);
393 return TRUE;
394 }
396 static gboolean
397 read_statement(FILE * in, gchar * lval, gint lsize, gchar * rval, gint rsize)
398 {
399 gint c;
401 DEBUG(6) fprintf(stderr, "read_statement()\n");
403 /* eat comments and empty lines: */
404 if (!eat_comments(in))
405 return FALSE;
407 if (!read_lval(in, lval, lsize)) {
408 return FALSE;
409 }
411 DEBUG(6) fprintf(stderr, " lval = %s\n", lval);
412 if ((c = fgetc(in) == '=')) {
413 if (read_rval(in, rval, rsize)) {
414 DEBUG(6) fprintf(stderr, " rval = %s\n", rval);
415 return TRUE;
416 }
417 } else {
418 DEBUG(6) fprintf(stderr," '=' expected after %s, char was '%c'\n", lval, c);
419 fprintf(stderr, "'=' expected after %s, char was '%c'\n", lval, c);
420 }
421 return FALSE;
422 }
424 gboolean
425 read_conf(gchar * filename)
426 {
427 FILE *in;
429 conf.log_max_pri = 7;
430 conf.remote_port = 25;
431 conf.do_relay = TRUE;
432 conf.alias_local_cmp = strcmp;
433 conf.max_defer_time = 86400 * 4; /* 4 days */
434 conf.max_msg_size = 0; /* no limit on msg size */
435 conf.spool_dir = SPOOL_DIR;
436 conf.local_hosts = parse_list("localhost", FALSE);
437 conf.mail_dir = "/var/mail";
439 if ((in = fopen(filename, "r")) == NULL) {
440 logwrite(LOG_ALERT, "could not open config file %s: %s\n", filename, strerror(errno));
441 return FALSE;
442 }
444 gchar lval[256], rval[2048];
445 while (read_statement(in, lval, 256, rval, 2048)) {
446 DEBUG(6) fprintf(stderr,"read_conf(): lval=%s\n", lval);
447 if (strcmp(lval, "debug_level") == 0)
448 conf.debug_level = atoi(rval);
449 else if (strcmp(lval, "run_as_user") == 0) {
450 if (!conf.run_as_user) /* you should not be able to reset that flag */
451 conf.run_as_user = parse_boolean(rval);
452 } else if (strcmp(lval, "use_syslog") == 0)
453 conf.use_syslog = parse_boolean(rval);
454 else if (strcmp(lval, "mail_dir") == 0)
455 conf.mail_dir = g_strdup(rval);
456 else if (strcmp(lval, "lock_dir") == 0)
457 conf.lock_dir = g_strdup(rval);
458 else if (strcmp(lval, "spool_dir") == 0)
459 conf.spool_dir = g_strdup(rval);
460 else if (strcmp(lval, "log_dir") == 0)
461 conf.log_dir = g_strdup(rval);
462 else if (strcmp(lval, "host_name") == 0) {
463 if (rval[0] != '/')
464 conf.host_name = g_strdup(rval);
465 else {
466 char buf[256];
467 FILE *fptr = fopen(rval, "rt");
468 if (fptr) {
469 logwrite(LOG_ALERT, "could not open %s: %s\n", rval, strerror(errno));
470 return FALSE;
471 }
472 fgets(buf, 255, fptr);
473 g_strchomp(buf);
474 conf.host_name = g_strdup(buf);
475 fclose(fptr);
476 }
477 } else if (strcmp(lval, "remote_port") == 0) {
478 logwrite(LOG_WARNING, "the remote_port option is now deprecated. Use 'mail_host' in the\n"
479 "route configuration instead. See man masqmail.route\n");
480 conf.remote_port = atoi(rval);
481 } else if (strcmp(lval, "local_hosts") == 0)
482 conf.local_hosts = parse_list(rval, FALSE);
483 else if (strcmp(lval, "local_addresses") == 0)
484 conf.local_addresses = parse_list(rval, TRUE);
485 else if (strcmp(lval, "not_local_addresses") == 0)
486 conf.not_local_addresses = parse_list(rval, TRUE);
487 else if (strcmp(lval, "local_nets") == 0)
488 conf.local_nets = parse_list(rval, FALSE);
489 else if (strcmp(lval, "do_save_envelope_to") == 0)
490 conf.do_save_envelope_to = parse_boolean(rval);
491 else if (strcmp(lval, "defer_all") == 0)
492 conf.defer_all = parse_boolean(rval);
493 else if (strcmp(lval, "do_relay") == 0)
494 conf.do_relay = parse_boolean(rval);
495 else if (strcmp(lval, "alias_file") == 0) {
496 conf.alias_file = g_strdup(rval);
497 } else if (strcmp(lval, "alias_local_caseless") == 0) {
498 conf.alias_local_cmp = parse_boolean(rval) ? strcasecmp : strcmp;
499 } else if (strcmp(lval, "mbox_default") == 0) {
500 conf.mbox_default = g_strdup(rval);
501 } else if (strcmp(lval, "mbox_users") == 0) {
502 conf.mbox_users = parse_list(rval, TRUE);
503 } else if (strcmp(lval, "mda_users") == 0) {
504 conf.mda_users = parse_list(rval, TRUE);
505 } else if (strcmp(lval, "maildir_users") == 0) {
506 conf.maildir_users = parse_list(rval, TRUE);
507 } else if (strcmp(lval, "mda") == 0) {
508 conf.mda = g_strdup(rval);
509 } else if (strcmp(lval, "mda_fromline") == 0) {
510 conf.mda_fromline = parse_boolean(rval);
511 } else if (strcmp(lval, "mda_fromhack") == 0) {
512 conf.mda_fromhack = parse_boolean(rval);
513 } else if (strcmp(lval, "pipe_fromline") == 0) {
514 conf.pipe_fromline = parse_boolean(rval);
515 } else if (strcmp(lval, "pipe_fromhack") == 0) {
516 conf.pipe_fromhack = parse_boolean(rval);
517 } else if (strcmp(lval, "listen_addresses") == 0) {
518 GList *node;
519 GList *tmp_list = parse_list(rval, FALSE);
521 conf.listen_addresses = NULL;
522 foreach(tmp_list, node) {
523 conf.listen_addresses = g_list_append(conf.listen_addresses, parse_interface((gchar *) (node-> data), 25));
524 g_free(node->data);
525 }
526 g_list_free(tmp_list);
527 } else if (strcmp(lval, "ident_trusted_nets") == 0) {
528 #ifdef ENABLE_IDENT
529 GList *node;
530 GList *tmp_list = parse_list(rval, FALSE);
532 conf.ident_trusted_nets = NULL;
533 foreach(tmp_list, node) {
534 conf.ident_trusted_nets = g_list_append(conf.ident_trusted_nets, parse_network((gchar *) (node->data), 25));
535 g_free(node->data);
536 }
537 g_list_free(tmp_list);
538 #else
539 logwrite(LOG_WARNING, "%s ignored: not compiled with ident support\n", lval);
540 #endif
541 } else if ((strncmp(lval, "connect_route.", 14) == 0)
542 || (strncmp(lval, "online_routes.", 14) == 0)) {
543 GList *file_list = parse_list(rval, FALSE);
544 table_pair *pair = create_pair(&(lval[14]), file_list);
545 conf.connect_routes = g_list_append(conf.connect_routes, pair);
546 } else if (strcmp(lval, "local_net_route") == 0) {
547 conf.local_net_routes = parse_list(rval, FALSE);
548 } else if (strcmp(lval, "online_detect") == 0)
549 conf.online_detect = g_strdup(rval);
550 else if (strcmp(lval, "online_file") == 0)
551 conf.online_file = g_strdup(rval);
552 else if (strcmp(lval, "online_pipe") == 0)
553 conf.online_pipe = g_strdup(rval);
554 else if (strcmp(lval, "mserver_iface") == 0)
555 conf.mserver_iface = parse_interface(rval, 224);
556 else if (strcmp(lval, "do_queue") == 0)
557 conf.do_queue = parse_boolean(rval);
558 else if (strncmp(lval, "get.", 4) == 0) {
559 #ifdef ENABLE_POP3
560 table_pair *pair = create_pair_string(&(lval[4]), rval);
561 conf.get_names = g_list_append(conf.get_names, pair);
562 #else
563 logwrite(LOG_WARNING, "get.<name> ignored: not compiled with pop support\n");
564 #endif
565 } else if (strncmp(lval, "online_gets.", 12) == 0) {
566 #ifdef ENABLE_POP3
567 GList *file_list = parse_list(rval, FALSE);
568 table_pair *pair = create_pair(&(lval[12]), file_list);
569 conf.online_gets = g_list_append(conf.online_gets, pair);
570 #else
571 logwrite(LOG_WARNING, "online_gets.<name> ignored: not compiled with pop support\n");
572 #endif
573 } else if (strcmp(lval, "errmsg_file") == 0)
574 conf.errmsg_file = g_strdup(rval);
575 else if (strcmp(lval, "warnmsg_file") == 0)
576 conf.warnmsg_file = g_strdup(rval);
577 else if (strcmp(lval, "warn_intervals") == 0)
578 conf.warn_intervals = parse_list(rval, FALSE);
579 else if (strcmp(lval, "max_defer_time") == 0) {
580 gint dummy;
581 gint ival = time_interval(rval, &dummy);
582 if (ival < 0)
583 logwrite(LOG_WARNING, "invalid time interval for 'max_defer_time': %s\n", rval);
584 else
585 conf.max_defer_time = ival;
586 } else if (strcmp(lval, "log_user") == 0)
587 conf.log_user = g_strdup(rval);
588 else if(strcmp(lval, "max_msg_size") == 0) {
589 conf.max_msg_size = atol(rval);
590 DEBUG(6) fprintf(stderr,"rval=%s, conf.max_msg_size=%ld\n",
591 rval, conf.max_msg_size);
592 }
593 else
594 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
595 }
596 fclose(in);
598 if (!conf.host_name) {
599 logwrite(LOG_ALERT, "`host_name' MUST be set in masqmail.conf. See man page\n");
600 return FALSE;
601 }
603 if (conf.errmsg_file == NULL)
604 conf.errmsg_file = g_strdup(DATA_DIR "/tpl/failmsg.tpl");
605 if (conf.warnmsg_file == NULL)
606 conf.warnmsg_file = g_strdup(DATA_DIR "/tpl/warnmsg.tpl");
608 if (conf.lock_dir == NULL)
609 conf.lock_dir = g_strdup_printf("%s/lock/", conf.spool_dir);
611 if (conf.mbox_default == NULL)
612 conf.mbox_default = g_strdup("mbox");
614 if (conf.warn_intervals == NULL)
615 conf.warn_intervals = parse_list("1h;4h;8h;1d;2d;3d", FALSE);
617 return TRUE;
618 }
620 connect_route*
621 read_route(gchar * filename, gboolean is_local_net)
622 {
623 gboolean ok = FALSE;
624 FILE *in;
626 connect_route *route = g_malloc(sizeof(connect_route));
627 memset(route, 0, sizeof(connect_route));
629 DEBUG(5) debugf("read_route, filename = %s\n", filename);
631 route->filename = g_strdup(filename);
632 route->name = g_strdup(filename); /* quick hack */
634 route->protocol = g_strdup("smtp");
635 route->expand_h_sender_address = TRUE;
637 route->is_local_net = is_local_net;
639 route->do_pipelining = TRUE;
641 if ((in = fopen(route->filename, "r")) == NULL) {
642 logwrite(LOG_ALERT, "could not open route file %s: %s\n", route->filename, strerror(errno));
643 g_free(route);
644 return NULL;
645 }
647 gchar lval[256], rval[2048];
648 while (read_statement(in, lval, 256, rval, 2048)) {
649 if (strcmp(lval, "protocol") == 0)
650 route->protocol = g_strdup(rval);
651 else if (strcmp(lval, "mail_host") == 0)
652 route->mail_host = parse_interface(rval, conf.remote_port);
653 else if (strcmp(lval, "helo_name") == 0)
654 route->helo_name = g_strdup(rval);
655 else if (strcmp(lval, "wrapper") == 0)
656 route->wrapper = g_strdup(rval);
657 else if (strcmp(lval, "connect_error_fail") == 0)
658 route->connect_error_fail = parse_boolean(rval);
659 else if (strcmp(lval, "do_correct_helo") == 0)
660 route->do_correct_helo = parse_boolean(rval);
661 else if (strcmp(lval, "do_pipelining") == 0)
662 route->do_pipelining = parse_boolean(rval);
663 else if (strcmp(lval, "allowed_return_paths") == 0)
664 route->allowed_return_paths = parse_address_list(rval, TRUE);
665 else if (strcmp(lval, "allowed_mail_locals") == 0)
666 route->allowed_mail_locals = parse_list(rval, TRUE);
667 else if (strcmp(lval, "not_allowed_return_paths") == 0)
668 route->not_allowed_return_paths = parse_address_list(rval, TRUE);
669 else if (strcmp(lval, "not_allowed_mail_locals") == 0)
670 route->not_allowed_mail_locals = parse_list(rval, TRUE);
671 else if (strcmp(lval, "allowed_rcpt_domains") == 0)
672 route->allowed_rcpt_domains = parse_list(rval, TRUE);
673 else if (strcmp(lval, "not_allowed_rcpt_domains") == 0)
674 route->not_allowed_rcpt_domains = parse_list(rval, TRUE);
675 else if (strcmp(lval, "set_h_from_domain") == 0)
676 route->set_h_from_domain = g_strdup(rval);
677 else if (strcmp(lval, "set_h_reply_to_domain") == 0)
678 route->set_h_reply_to_domain = g_strdup(rval);
679 else if (strcmp(lval, "set_return_path_domain") == 0)
680 route->set_return_path_domain = g_strdup(rval);
681 else if (strcmp(lval, "map_return_path_addresses") == 0) {
682 GList *node, *list;
684 list = parse_list(rval, TRUE);
685 foreach(list, node) {
686 gchar *item = (gchar *) (node->data);
687 table_pair *pair = parse_table_pair(item, ':');
688 address *addr = create_address((gchar *) (pair->value), TRUE);
689 g_free(pair->value);
690 pair->value = (gpointer *) addr;
691 route->map_return_path_addresses = g_list_append(route->map_return_path_addresses, pair);
692 g_free(item);
693 }
694 g_list_free(list);
695 } else if (strcmp(lval, "map_h_from_addresses") == 0) {
696 GList *list, *node;
698 list = parse_list(rval, TRUE);
699 foreach(list, node) {
700 gchar *item = (gchar *) (node->data);
701 table_pair *pair = parse_table_pair(item, ':');
702 route->map_h_from_addresses = g_list_append(route->map_h_from_addresses, pair);
703 g_free(item);
704 }
705 g_list_free(list);
706 } else if (strcmp(lval, "map_h_reply_to_addresses") == 0) {
707 GList *list, *node;
709 list = parse_list(rval, TRUE);
710 foreach(list, node) {
711 gchar *item = (gchar *) (node->data);
712 table_pair *pair = parse_table_pair(item, ':');
713 route->map_h_reply_to_addresses = g_list_append(route->map_h_reply_to_addresses, pair);
714 g_free(item);
715 }
716 g_list_free(list);
717 } else if (strcmp(lval, "map_h_mail_followup_to_addresses") == 0) {
718 GList *list, *node;
720 list = parse_list(rval, TRUE);
721 foreach(list, node) {
722 gchar *item = (gchar *) (node->data);
723 table_pair *pair = parse_table_pair(item, ':');
724 route->map_h_mail_followup_to_addresses = g_list_append(route->map_h_mail_followup_to_addresses, pair);
725 g_free(item);
726 }
727 g_list_free(list);
728 } else if (strcmp(lval, "expand_h_sender_domain") == 0) {
729 route->expand_h_sender_domain = parse_boolean(rval);
730 } else if (strcmp(lval, "expand_h_sender_address") == 0) {
731 route->expand_h_sender_address = parse_boolean(rval);
732 } else if (strcmp(lval, "resolve_list") == 0)
733 route->resolve_list = parse_resolve_list(rval);
734 else if (strcmp(lval, "do_ssl") == 0) {
735 /* we ignore this. This option is used by sqilconf */
736 ;
737 }
738 #ifdef ENABLE_AUTH
739 else if (strcmp(lval, "auth_name") == 0) {
740 route->auth_name = g_strdup(rval);
741 } else if (strcmp(lval, "auth_login") == 0) {
742 route->auth_login = g_strdup(rval);
743 } else if (strcmp(lval, "auth_secret") == 0) {
744 route->auth_secret = g_strdup(rval);
745 }
746 #else
747 else if ((strcmp(lval, "auth_name") == 0)
748 || (strcmp(lval, "auth_login") == 0)
749 || (strcmp(lval, "auth_secret") == 0)) {
750 logwrite(LOG_WARNING, "%s ignored: not compiled with auth support.\n", lval);
751 }
752 #endif
753 else if (strcmp(lval, "pop3_login") == 0) {
754 #ifdef ENABLE_POP3
755 route->pop3_login = g_strdup(rval);
756 #else
757 logwrite(LOG_WARNING, "pop3_login ignored: not compiled with pop support.\n");
758 #endif
759 } else if (strcmp(lval, "pipe") == 0) {
760 route->pipe = g_strdup(rval);
761 } else if (strcmp(lval, "pipe_fromline") == 0) {
762 route->pipe_fromline = parse_boolean(rval);
763 } else if (strcmp(lval, "pipe_fromhack") == 0) {
764 route->pipe_fromhack = parse_boolean(rval);
765 } else if (strcmp(lval, "last_route") == 0) {
766 route->last_route = parse_boolean(rval);
767 } else
768 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
769 }
771 if (route->resolve_list == NULL) {
772 if (is_local_net) {
773 route->resolve_list = g_list_append(NULL, resolve_byname);
774 } else {
775 #ifdef ENABLE_RESOLVER
776 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_mx);
777 route->resolve_list = g_list_append(route->resolve_list, resolve_dns_a);
778 #endif
779 route->resolve_list = g_list_append(route->resolve_list, resolve_byname);
780 }
781 }
782 fclose(in);
783 ok = TRUE;
785 /* warn user about misconfigurations: */
786 if ((route->map_h_from_addresses != NULL) && (route->set_h_from_domain != NULL)) {
787 logwrite(LOG_WARNING, "'map_h_from_addresses' overrides 'set_h_from_domain'\n");
788 g_free(route->set_h_from_domain);
789 route->set_h_from_domain = NULL;
790 }
791 if ((route->map_h_reply_to_addresses != NULL) && (route->set_h_reply_to_domain != NULL)) {
792 logwrite(LOG_WARNING, "'map_h_reply_to_addresses' overrides 'set_h_reply_to_domain'\n");
793 g_free(route->set_h_reply_to_domain);
794 route->set_h_reply_to_domain = NULL;
795 }
797 if (!ok) {
798 g_free(route);
799 route = NULL;
800 }
802 return route;
803 }
805 static void
806 _g_list_free_all(GList * list)
807 {
808 GList *node;
809 if (list) {
810 foreach(list, node)
811 g_free(node->data);
812 g_list_free(list);
813 }
814 }
816 void
817 destroy_route(connect_route * r)
818 {
819 if (r->filename)
820 g_free(r->filename);
821 if (r->protocol)
822 g_free(r->protocol);
823 if (r->mail_host) {
824 g_free(r->mail_host->address);
825 g_free(r->mail_host);
826 }
827 if (r->wrapper)
828 g_free(r->wrapper);
829 if (r->helo_name)
830 g_free(r->helo_name);
831 _g_list_free_all(r->allowed_mail_locals);
832 _g_list_free_all(r->not_allowed_mail_locals);
833 _g_list_free_all(r->allowed_rcpt_domains);
834 _g_list_free_all(r->not_allowed_rcpt_domains);
835 if (r->set_h_from_domain)
836 g_free(r->set_h_from_domain);
837 if (r->set_h_reply_to_domain)
838 g_free(r->set_h_reply_to_domain);
839 if (r->set_return_path_domain)
840 g_free(r->set_return_path_domain);
841 if (r->map_h_reply_to_addresses)
842 destroy_table(r->map_h_reply_to_addresses);
843 if (r->resolve_list)
844 g_list_free(r->resolve_list);
845 #ifdef ENABLE_AUTH
846 if (r->auth_name)
847 g_free(r->auth_name);
848 if (r->auth_login)
849 g_free(r->auth_login);
850 if (r->auth_secret)
851 g_free(r->auth_secret);
852 #endif
853 #ifdef ENABLE_POP3
854 if (r->pop3_login)
855 g_free(r->pop3_login);
856 #endif
857 if (r->pipe)
858 g_free(r->pipe);
859 g_free(r);
860 }
862 GList*
863 read_route_list(GList * rf_list, gboolean is_local_net)
864 {
865 GList *list = NULL;
866 GList *node;
867 uid_t saved_uid, saved_gid;
869 if (!conf.run_as_user) {
870 set_euidgid(0, 0, &saved_uid, &saved_gid);
871 }
873 foreach(rf_list, node) {
874 gchar *fname = (gchar *) (node->data);
875 connect_route *route = read_route(fname, is_local_net);
876 if (route)
877 list = g_list_append(list, route);
878 else
879 logwrite(LOG_ALERT, "could not read route configuration %s\n", fname);
880 }
882 /* set uid and gid back */
883 if (!conf.run_as_user) {
884 set_euidgid(saved_uid, saved_gid, NULL, NULL);
885 }
887 return list;
888 }
890 void
891 destroy_route_list(GList * list)
892 {
893 GList *node;
895 foreach(list, node) {
896 connect_route *route = (connect_route *) (node->data);
897 destroy_route(route);
898 }
899 g_list_free(list);
900 }
902 #ifdef ENABLE_POP3
904 get_conf*
905 read_get_conf(gchar * filename)
906 {
907 FILE *in;
909 get_conf *gc = g_malloc(sizeof(get_conf));
910 memset(gc, 0, sizeof(get_conf));
912 gc->server_port = 110;
914 if ((in = fopen(filename, "r")) == NULL) {
915 logwrite(LOG_ALERT, "could not open get file %s: %s\n", filename, strerror(errno));
916 g_free(gc);
917 return NULL;
918 }
920 gchar lval[256], rval[2048];
921 while (read_statement(in, lval, 256, rval, 2048)) {
922 if (strcmp(lval, "protocol") == 0)
923 gc->protocol = g_strdup(rval);
924 else if (strcmp(lval, "server") == 0)
925 gc->server_name = g_strdup(rval);
926 else if (strcmp(lval, "port") == 0)
927 gc->server_port = atoi(rval);
928 else if (strcmp(lval, "wrapper") == 0)
929 gc->wrapper = g_strdup(rval);
930 else if (strcmp(lval, "user") == 0)
931 gc->login_user = g_strdup(rval);
932 else if (strcmp(lval, "pass") == 0)
933 gc->login_pass = g_strdup(rval);
934 else if (strcmp(lval, "address") == 0)
935 gc->address = create_address_qualified(rval, TRUE, conf.host_name);
936 else if (strcmp(lval, "return_path") == 0)
937 gc->return_path = create_address_qualified(rval, TRUE, conf.host_name);
938 else if (strcmp(lval, "do_ssl") == 0)
939 /* we ignore this. This option is used by sqilconf */
940 ;
941 else if (strcmp(lval, "do_keep") == 0)
942 gc->do_keep = parse_boolean(rval);
943 else if (strcmp(lval, "do_uidl") == 0)
944 gc->do_uidl = parse_boolean(rval);
945 else if (strcmp(lval, "do_uidl_dele") == 0)
946 gc->do_uidl_dele = parse_boolean(rval);
947 else if (strcmp(lval, "max_size") == 0)
948 gc->max_size = atoi(rval);
949 else if (strcmp(lval, "max_size_delete") == 0)
950 gc->max_size_delete = parse_boolean(rval);
951 else if (strcmp(lval, "max_count") == 0)
952 gc->max_count = atoi(rval);
953 else if (strcmp(lval, "resolve_list") == 0)
954 gc->resolve_list = parse_resolve_list(rval);
955 else
956 logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval);
957 }
958 fclose(in);
960 if (gc->resolve_list == NULL) {
961 #ifdef ENABLE_RESOLVER
962 gc->resolve_list = g_list_append(NULL, resolve_dns_a);
963 #endif
964 gc->resolve_list = g_list_append(NULL, resolve_byname);
965 }
967 if (gc->protocol == NULL)
968 gc->protocol = g_strdup("pop3");
969 return gc;
970 }
972 void
973 destroy_get_conf(get_conf * gc)
974 {
975 if (gc->protocol)
976 g_free(gc->protocol);
977 if (gc->server_name)
978 g_free(gc->server_name);
979 if (gc->login_user)
980 g_free(gc->login_user);
981 if (gc->login_pass)
982 g_free(gc->login_pass);
983 if (gc->wrapper)
984 g_free(gc->wrapper);
985 if (gc->address)
986 destroy_address(gc->address);
987 if (gc->return_path)
988 destroy_address(gc->return_path);
989 if (gc->resolve_list)
990 g_list_free(gc->resolve_list);
991 g_free(gc);
992 }
994 #endif
996 connect_route*
997 create_local_route()
998 {
999 connect_route *route;
1001 route = g_malloc(sizeof(connect_route));
1002 if (!route) {
1003 return NULL;
1005 memset(route, 0, sizeof(connect_route));
1006 route->protocol = g_strdup("smtp");
1007 route->is_local_net = TRUE;
1008 route->name = g_strdup("local_net (default)");
1009 route->expand_h_sender_address = TRUE;
1010 route->resolve_list = g_list_append(NULL, resolve_byname);
1011 route->connect_error_fail = TRUE;
1012 return route;