masqmail

view src/masqmail.c @ 84:ffeff2c33799

is_ingroup(): check for the primary group of a user too also some refactoring
author meillo@marmaro.de
date Sat, 19 Jun 2010 18:08:55 +0200
parents 3b344bf57162
children a917cb178ca7
line source
1 /* MasqMail
2 Copyright (C) 1999-2001 Oliver Kurth
3 Copyright (C) 2010 markus schnalke <meillo@marmaro.de>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program; if not, write to the Free Software
17 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18 */
20 #include <stdio.h>
21 #include <errno.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <unistd.h>
25 #include <sys/types.h>
26 #include <sys/socket.h>
27 #include <sys/time.h>
28 #include <netinet/in.h>
29 #include <netdb.h>
30 #include <syslog.h>
31 #include <signal.h>
33 #include <glib.h>
35 #include "masqmail.h"
37 /* mutually exclusive modes. Note that there is neither a 'get' mode
38 nor a 'queue daemon' mode. These, as well as the distinction beween
39 the two (non exclusive) daemon (queue and listen) modes are handled
40 by flags.*/
41 typedef enum _mta_mode {
42 MODE_ACCEPT = 0, /* accept message on stdin */
43 MODE_DAEMON, /* run as daemon */
44 MODE_RUNQUEUE, /* single queue run, online or offline */
45 MODE_GET_DAEMON, /* run as get (retrieve) daemon */
46 MODE_SMTP, /* accept SMTP on stdin */
47 MODE_LIST, /* list queue */
48 MODE_MCMD, /* do queue manipulation */
49 MODE_VERSION, /* show version */
50 MODE_BI, /* fake ;-) */
51 MODE_NONE /* to prevent default MODE_ACCEPT */
52 } mta_mode;
54 char *pidfile = NULL;
55 volatile int sigterm_in_progress = 0;
57 static void
58 sigterm_handler(int sig)
59 {
60 if (sigterm_in_progress)
61 raise(sig);
62 sigterm_in_progress = 1;
64 if (pidfile) {
65 uid_t uid;
66 uid = seteuid(0);
67 if (unlink(pidfile) != 0)
68 logwrite(LOG_WARNING, "could not delete pid file %s: %s\n", pidfile, strerror(errno));
69 seteuid(uid); /* we exit anyway after this, just to be sure */
70 }
72 signal(sig, SIG_DFL);
73 raise(sig);
74 }
76 #ifdef ENABLE_IDENT /* so far used for that only */
77 static gboolean
78 is_in_netlist(gchar * host, GList * netlist)
79 {
80 guint hostip = inet_addr(host);
81 struct in_addr addr;
83 addr.s_addr = hostip;
84 if (addr.s_addr != INADDR_NONE) {
85 GList *node;
86 foreach(netlist, node) {
87 struct in_addr *net = (struct in_addr *) (node->data);
88 if ((addr.s_addr & net->s_addr) == net->s_addr)
89 return TRUE;
90 }
91 }
92 return FALSE;
93 }
94 #endif
96 gchar*
97 get_optarg(char *argv[], gint argc, gint * argp, gint * pos)
98 {
99 if (argv[*argp][*pos])
100 return &(argv[*argp][*pos]);
101 else {
102 if (*argp + 1 < argc) {
103 if (argv[(*argp) + 1][0] != '-') {
104 (*argp)++;
105 *pos = 0;
106 return &(argv[*argp][*pos]);
107 }
108 }
109 }
110 return NULL;
111 }
113 gchar*
114 get_progname(gchar * arg0)
115 {
116 gchar *p = arg0 + strlen(arg0) - 1;
117 while (p > arg0) {
118 if (*p == '/')
119 return p + 1;
120 p--;
121 }
122 return p;
123 }
125 gboolean
126 write_pidfile(gchar * name)
127 {
128 FILE *fptr;
130 if ((fptr = fopen(name, "wt"))) {
131 fprintf(fptr, "%d\n", getpid());
132 fclose(fptr);
133 pidfile = strdup(name);
134 return TRUE;
135 }
136 logwrite(LOG_WARNING, "could not write pid file: %s\n", strerror(errno));
137 return FALSE;
138 }
140 static void
141 mode_daemon(gboolean do_listen, gint queue_interval, char *argv[])
142 {
143 guint pid;
145 /* daemon */
146 if (!conf.run_as_user) {
147 if ((conf.orig_uid != 0) && (conf.orig_uid != conf.mail_uid)) {
148 fprintf(stderr, "must be root or %s for daemon.\n", DEF_MAIL_USER);
149 exit(EXIT_FAILURE);
150 }
151 }
153 /* reparent to init only if init is not already the parent */
154 if (getppid() != 1) {
155 if ((pid = fork()) > 0) {
156 exit(EXIT_SUCCESS);
157 } else if (pid < 0) {
158 logwrite(LOG_ALERT, "could not fork!");
159 exit(EXIT_FAILURE);
160 }
161 }
163 signal(SIGTERM, sigterm_handler);
164 write_pidfile(PIDFILEDIR "/masqmail.pid");
166 conf.do_verbose = FALSE;
168 /* closing and reopening the log ensures that it is open afterwards
169 because it is possible that the log is assigned to fd 1 and gets
170 thus closes by fclose(stdout). Similar for the debugfile.
171 */
172 logclose();
173 fclose(stdin);
174 fclose(stdout);
175 fclose(stderr);
176 logopen();
178 listen_port(do_listen ? conf.listen_addresses : NULL, queue_interval, argv);
179 }
181 #ifdef ENABLE_POP3
182 static void
183 mode_get_daemon(gint get_interval, char *argv[])
184 {
185 guint pid;
187 /* daemon */
188 if (!conf.run_as_user) {
189 if ((conf.orig_uid != 0) && (conf.orig_uid != conf.mail_uid)) {
190 fprintf(stderr, "must be root or %s for daemon.\n", DEF_MAIL_USER);
191 exit(EXIT_FAILURE);
192 }
193 }
195 /* reparent to init only if init is not already the parent */
196 if (getppid() != 1) {
197 if ((pid = fork()) > 0) {
198 exit(EXIT_SUCCESS);
199 } else if (pid < 0) {
200 logwrite(LOG_ALERT, "could not fork!");
201 exit(EXIT_FAILURE);
202 }
203 }
205 signal(SIGTERM, sigterm_handler);
206 write_pidfile(PIDFILEDIR "/masqmail-get.pid");
208 conf.do_verbose = FALSE;
210 /* closing and reopening the log ensures that it is open afterwards
211 because it is possible that the log is assigned to fd 1 and gets
212 thus closes by fclose(stdout). Similar for the debugfile.
213 */
214 logclose();
215 fclose(stdin);
216 fclose(stdout);
217 fclose(stderr);
218 logopen();
220 get_daemon(get_interval, argv);
221 }
222 #endif
224 #ifdef ENABLE_SMTP_SERVER
225 static void
226 mode_smtp()
227 {
228 /* accept smtp message on stdin */
229 /* write responses to stderr. */
231 struct sockaddr_in saddr;
232 gchar *peername = NULL;
233 int dummy = sizeof(saddr);
235 conf.do_verbose = FALSE;
237 if (!conf.run_as_user) {
238 seteuid(conf.orig_uid);
239 setegid(conf.orig_gid);
240 }
242 DEBUG(5) debugf("accepting smtp message on stdin\n");
244 if (getpeername(0, (struct sockaddr *) (&saddr), &dummy) == 0) {
245 peername = g_strdup(inet_ntoa(saddr.sin_addr));
246 } else if (errno != ENOTSOCK)
247 exit(EXIT_FAILURE);
249 smtp_in(stdin, stderr, peername, NULL);
250 }
251 #endif
253 static void
254 mode_accept(address * return_path, gchar * full_sender_name, guint accept_flags, char **addresses, int addr_cnt)
255 {
256 /* accept message on stdin */
257 accept_error err;
258 message *msg = create_message();
259 gint i;
261 if (return_path && !is_privileged_user(conf.orig_uid)) {
262 fprintf(stderr, "must be in root, %s or in group %s for setting return path.\n", DEF_MAIL_USER, DEF_MAIL_GROUP);
263 exit(EXIT_FAILURE);
264 }
266 if (!conf.run_as_user) {
267 seteuid(conf.orig_uid);
268 setegid(conf.orig_gid);
269 }
271 DEBUG(5) debugf("accepting message on stdin\n");
273 msg->received_prot = PROT_LOCAL;
274 for (i = 0; i < addr_cnt; i++) {
275 if (addresses[i][0] != '|')
276 msg->rcpt_list = g_list_append(msg->rcpt_list, create_address_qualified(addresses[i], TRUE, conf.host_name));
277 else {
278 logwrite(LOG_ALERT, "no pipe allowed as recipient address: %s\n", addresses[i]);
279 exit(EXIT_FAILURE);
280 }
281 }
283 /* -f option */
284 msg->return_path = return_path;
286 /* -F option */
287 msg->full_sender_name = full_sender_name;
289 if ((err = accept_message(stdin, msg, accept_flags)) == AERR_OK) {
290 if (spool_write(msg, TRUE)) {
291 pid_t pid;
292 logwrite(LOG_NOTICE, "%s <= %s with %s\n", msg->uid, addr_string(msg->return_path), prot_names[PROT_LOCAL]);
294 if (!conf.do_queue) {
295 if ((pid = fork()) == 0) {
296 conf.do_verbose = FALSE;
297 fclose(stdin);
298 fclose(stdout);
299 fclose(stderr);
300 if (deliver(msg)) {
301 exit(EXIT_SUCCESS);
302 } else
303 exit(EXIT_FAILURE);
304 } else if (pid < 0) {
305 logwrite(LOG_ALERT, "could not fork for delivery, id = %s", msg->uid);
306 }
307 }
308 } else {
309 fprintf(stderr, "Could not write spool file\n");
310 exit(EXIT_FAILURE);
311 }
312 } else {
313 switch (err) {
314 case AERR_EOF:
315 fprintf(stderr, "unexpected EOF.\n");
316 exit(EXIT_FAILURE);
317 case AERR_NORCPT:
318 fprintf(stderr, "no recipients.\n");
319 exit(EXIT_FAILURE);
320 default:
321 /* should never happen: */
322 fprintf(stderr, "Unknown error (%d)\r\n", err);
323 exit(EXIT_FAILURE);
324 }
325 exit(EXIT_FAILURE);
326 }
327 }
329 int
330 main(int argc, char *argv[])
331 {
332 /* cmd line flags */
333 gchar *conf_file = CONF_FILE;
334 gint arg = 1;
335 gboolean do_get = FALSE;
336 gboolean do_get_online = FALSE;
338 gboolean do_listen = FALSE;
339 gboolean do_runq = FALSE;
340 gboolean do_runq_online = FALSE;
342 gboolean do_queue = FALSE;
344 gboolean do_verbose = FALSE;
345 gint debug_level = -1;
347 mta_mode mta_mode = MODE_ACCEPT;
349 gint queue_interval = 0;
350 gint get_interval = 0;
351 gboolean opt_t = FALSE;
352 gboolean opt_i = FALSE;
353 gboolean opt_odb = FALSE;
354 gboolean opt_oem = FALSE;
355 gboolean exit_failure = FALSE;
357 gchar *M_cmd = NULL;
359 gint exit_code = EXIT_SUCCESS;
360 gchar *route_name = NULL;
361 gchar *get_name = NULL;
362 gchar *progname;
363 gchar *f_address = NULL;
364 gchar *full_sender_name = NULL;
365 address *return_path = NULL; /* may be changed by -f option */
367 progname = get_progname(argv[0]);
369 if (strcmp(progname, "mailq") == 0) {
370 mta_mode = MODE_LIST;
371 } else if (strcmp(progname, "mailrm") == 0) {
372 mta_mode = MODE_MCMD;
373 M_cmd = "rm";
374 } else if (strcmp(progname, "runq") == 0) {
375 mta_mode = MODE_RUNQUEUE;
376 do_runq = TRUE;
377 } else if (strcmp(progname, "rmail") == 0) {
378 mta_mode = MODE_ACCEPT;
379 opt_i = TRUE;
380 } else if (strcmp(progname, "smtpd") == 0 || strcmp(progname, "in.smtpd") == 0) {
381 mta_mode = MODE_SMTP;
382 }
384 /* parse cmd line */
385 while (arg < argc) {
386 gint pos = 0;
387 if ((argv[arg][pos] == '-') && (argv[arg][pos + 1] != '-')) {
388 pos++;
389 switch (argv[arg][pos++]) {
390 case 'b':
391 switch (argv[arg][pos++]) {
392 case 'd':
393 do_listen = TRUE;
394 mta_mode = MODE_DAEMON;
395 break;
396 case 'i':
397 /* ignored */
398 mta_mode = MODE_BI;
399 break;
400 case 's':
401 mta_mode = MODE_SMTP;
402 break;
403 case 'p':
404 mta_mode = MODE_LIST;
405 break;
406 case 'V':
407 mta_mode = MODE_VERSION;
408 break;
409 default:
410 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
411 exit(EXIT_FAILURE);
412 }
413 break;
414 case 'B':
415 /* we ignore this and throw the argument away */
416 get_optarg(argv, argc, &arg, &pos);
417 break;
418 case 'C':
419 if (!(conf_file = get_optarg(argv, argc, &arg, &pos))) {
420 fprintf(stderr, "-C requires a filename as argument.\n");
421 exit(EXIT_FAILURE);
422 }
423 break;
424 case 'F':
425 {
426 full_sender_name = get_optarg(argv, argc, &arg, &pos);
427 if (!full_sender_name) {
428 fprintf(stderr, "-F requires a name as an argument\n");
429 exit(EXIT_FAILURE);
430 }
431 }
432 break;
433 case 'd':
434 if (getuid() == 0) {
435 char *lvl = get_optarg(argv, argc, &arg, &pos);
436 if (lvl)
437 debug_level = atoi(lvl);
438 else {
439 fprintf(stderr, "-d requires a number as an argument.\n");
440 exit(EXIT_FAILURE);
441 }
442 } else {
443 fprintf(stderr, "only root may set the debug level.\n");
444 exit(EXIT_FAILURE);
445 }
446 break;
447 case 'f':
448 /* set return path */
449 {
450 gchar *address;
451 address = get_optarg(argv, argc, &arg, &pos);
452 if (address) {
453 f_address = g_strdup(address);
454 } else {
455 fprintf(stderr, "-f requires an address as an argument\n");
456 exit(EXIT_FAILURE);
457 }
458 }
459 break;
460 case 'g':
461 do_get = TRUE;
462 if (!mta_mode)
463 mta_mode = MODE_NONE; /* to prevent default MODE_ACCEPT */
464 if (argv[arg][pos] == 'o') {
465 pos++;
466 do_get_online = TRUE;
467 /* can be NULL, then we use online detection method */
468 route_name = get_optarg(argv, argc, &arg, &pos);
470 if (route_name != NULL) {
471 if (isdigit(route_name[0])) {
472 get_interval = time_interval(route_name, &pos);
473 route_name = get_optarg(argv, argc, &arg, &pos);
474 mta_mode = MODE_GET_DAEMON;
475 do_get = FALSE;
476 }
477 }
478 } else {
479 if ((optarg = get_optarg(argv, argc, &arg, &pos))) {
480 get_name = get_optarg(argv, argc, &arg, &pos);
481 }
482 }
483 break;
484 case 'i':
485 if (argv[arg][pos] == 0) {
486 opt_i = TRUE;
487 exit_failure = FALSE; /* may override -oem */
488 } else {
489 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
490 exit(EXIT_FAILURE);
491 }
492 break;
493 case 'M':
494 {
495 mta_mode = MODE_MCMD;
496 M_cmd = g_strdup(&(argv[arg][pos]));
497 }
498 break;
499 case 'o':
500 switch (argv[arg][pos++]) {
501 case 'e':
502 if (argv[arg][pos++] == 'm') /* -oem */
503 if (!opt_i)
504 exit_failure = TRUE;
505 opt_oem = TRUE;
506 break;
507 case 'd':
508 if (argv[arg][pos] == 'b') /* -odb */
509 opt_odb = TRUE;
510 else if (argv[arg][pos] == 'q') /* -odq */
511 do_queue = TRUE;
512 break;
513 case 'i':
514 opt_i = TRUE;
515 exit_failure = FALSE; /* may override -oem */
516 break;
517 }
518 break;
520 case 'q':
521 {
522 gchar *optarg;
524 do_runq = TRUE;
525 mta_mode = MODE_RUNQUEUE;
526 if (argv[arg][pos] == 'o') {
527 pos++;
528 do_runq = FALSE;
529 do_runq_online = TRUE;
530 /* can be NULL, then we use online detection method */
531 route_name = get_optarg(argv, argc, &arg, &pos);
532 } else
533 if ((optarg = get_optarg(argv, argc, &arg, &pos))) {
534 mta_mode = MODE_DAEMON;
535 queue_interval = time_interval(optarg, &pos);
536 }
537 }
538 break;
539 case 't':
540 if (argv[arg][pos] == 0) {
541 opt_t = TRUE;
542 } else {
543 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
544 exit(EXIT_FAILURE);
545 }
546 break;
547 case 'v':
548 do_verbose = TRUE;
549 break;
550 default:
551 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
552 exit(EXIT_FAILURE);
553 }
554 } else {
555 if (argv[arg][pos + 1] == '-') {
556 if (argv[arg][pos + 2] != '\0') {
557 fprintf(stderr, "unrecognized option '%s'\n", argv[arg]);
558 exit(EXIT_FAILURE);
559 }
560 arg++;
561 }
562 break;
563 }
564 arg++;
565 }
567 if (mta_mode == MODE_VERSION) {
568 gchar *with_resolver = "";
569 gchar *with_smtp_server = "";
570 gchar *with_pop3 = "";
571 gchar *with_auth = "";
572 gchar *with_maildir = "";
573 gchar *with_ident = "";
574 gchar *with_mserver = "";
576 #ifdef ENABLE_RESOLVER
577 with_resolver = " +resolver";
578 #endif
579 #ifdef ENABLE_SMTP_SERVER
580 with_smtp_server = " +smtp-server";
581 #endif
582 #ifdef ENABLE_POP3
583 with_pop3 = " +pop3";
584 #endif
585 #ifdef ENABLE_AUTH
586 with_auth = " +auth";
587 #endif
588 #ifdef ENABLE_MAILDIR
589 with_maildir = " +maildir";
590 #endif
591 #ifdef ENABLE_IDENT
592 with_ident = " +ident";
593 #endif
594 #ifdef ENABLE_MSERVER
595 with_mserver = " +mserver";
596 #endif
598 printf("%s %s%s%s%s%s%s%s%s\n", PACKAGE, VERSION, with_resolver, with_smtp_server,
599 with_pop3, with_auth, with_maildir, with_ident, with_mserver);
601 exit(EXIT_SUCCESS);
602 }
604 /* initialize random generator */
605 srand(time(NULL));
606 /* ignore SIGPIPE signal */
607 signal(SIGPIPE, SIG_IGN);
609 /* close all possibly open file descriptors, except std{in,out,err} */
610 {
611 int i, max_fd = sysconf(_SC_OPEN_MAX);
613 if (max_fd <= 0)
614 max_fd = 64;
615 for (i = 3; i < max_fd; i++)
616 close(i);
617 }
619 init_conf();
621 /* if we are not privileged, and the config file was changed we
622 implicetely set the the run_as_user flag and give up all
623 privileges.
625 So it is possible for a user to run his own daemon without
626 breaking security.
627 */
628 if (strcmp(conf_file, CONF_FILE) != 0) {
629 if (conf.orig_uid != 0) {
630 conf.run_as_user = TRUE;
631 seteuid(conf.orig_uid);
632 setegid(conf.orig_gid);
633 setuid(conf.orig_uid);
634 setgid(conf.orig_gid);
635 }
636 }
638 read_conf(conf_file);
640 if (do_queue)
641 conf.do_queue = TRUE;
642 if (do_verbose)
643 conf.do_verbose = TRUE;
644 if (debug_level >= 0) /* if >= 0, it was given by argument */
645 conf.debug_level = debug_level;
647 /* It appears that changing to / ensures that we are never in
648 a directory which we cannot access. This situation could be
649 possible after changing identity.
650 Maybe we should only change to / if we not run as user, to
651 allow relative paths for log files in test setups for
652 instance.
653 */
654 chdir("/");
656 if (!conf.run_as_user) {
657 if (setgid(0) != 0) {
658 fprintf(stderr, "could not set gid to 0. Is the setuid bit set? : %s\n", strerror(errno));
659 exit(EXIT_FAILURE);
660 }
661 if (setuid(0) != 0) {
662 fprintf(stderr, "could not gain root privileges. Is the setuid bit set? : %s\n", strerror(errno));
663 exit(EXIT_FAILURE);
664 }
665 }
667 if (!logopen()) {
668 fprintf(stderr, "could not open log file\n");
669 exit(EXIT_FAILURE);
670 }
672 DEBUG(1) debugf("masqmail %s starting\n", VERSION);
674 DEBUG(5) {
675 gchar **str = argv;
676 debugf("args: \n");
677 while (*str) {
678 debugf("%s \n", *str);
679 str++;
680 }
681 }
682 DEBUG(5) debugf("queue_interval = %d\n", queue_interval);
684 if (f_address) {
685 return_path = create_address_qualified(f_address, TRUE, conf.host_name);
686 g_free(f_address);
687 if (!return_path) {
688 fprintf(stderr, "invalid RFC821 address: %s\n", f_address);
689 exit(EXIT_FAILURE);
690 }
691 }
693 if (do_get) {
694 #ifdef ENABLE_POP3
695 if ((mta_mode == MODE_NONE) || (mta_mode == MODE_RUNQUEUE)) {
696 set_identity(conf.orig_uid, "getting mail");
697 if (do_get_online) {
698 if (route_name != NULL) {
699 conf.online_detect = g_strdup("argument");
700 set_online_name(route_name);
701 }
702 get_online();
703 } else {
704 if (get_name)
705 get_from_name(get_name);
706 else
707 get_all();
708 }
709 } else {
710 logwrite(LOG_ALERT, "get (-g) only allowed alone or together with queue run (-q)\n");
711 }
712 #else
713 fprintf(stderr, "get (pop) support not compiled in\n");
714 #endif
715 }
717 switch (mta_mode) {
718 case MODE_DAEMON:
719 mode_daemon(do_listen, queue_interval, argv);
720 break;
721 case MODE_RUNQUEUE:
722 {
723 /* queue runs */
724 set_identity(conf.orig_uid, "queue run");
726 if (do_runq)
727 exit_code = queue_run() ? EXIT_SUCCESS : EXIT_FAILURE;
729 if (do_runq_online) {
730 if (route_name != NULL) {
731 conf.online_detect = g_strdup("argument");
732 set_online_name(route_name);
733 }
734 exit_code =
735 queue_run_online() ? EXIT_SUCCESS : EXIT_FAILURE;
736 }
737 }
738 break;
739 case MODE_GET_DAEMON:
740 #ifdef ENABLE_POP3
741 if (route_name != NULL) {
742 conf.online_detect = g_strdup("argument");
743 set_online_name(route_name);
744 }
745 mode_get_daemon(get_interval, argv);
746 #endif
747 break;
749 case MODE_SMTP:
750 #ifdef ENABLE_SMTP_SERVER
751 mode_smtp();
752 #else
753 fprintf(stderr, "smtp server support not compiled in\n");
754 #endif
755 break;
757 case MODE_LIST:
758 queue_list();
759 break;
761 case MODE_BI:
762 exit(EXIT_SUCCESS);
763 break; /* well... */
765 case MODE_MCMD:
766 if (strcmp(M_cmd, "rm") == 0) {
767 gboolean ok = FALSE;
769 set_euidgid(conf.mail_uid, conf.mail_gid, NULL, NULL);
771 if (is_privileged_user(conf.orig_uid)) {
772 for (; arg < argc; arg++) {
773 if (queue_delete(argv[arg]))
774 ok = TRUE;
775 }
776 } else {
777 struct passwd *pw = getpwuid(conf.orig_uid);
778 if (pw) {
779 for (; arg < argc; arg++) {
780 message *msg = msg_spool_read(argv[arg], FALSE);
781 #ifdef ENABLE_IDENT
782 if (((msg->received_host == NULL) && (msg->received_prot == PROT_LOCAL))
783 || is_in_netlist(msg->received_host, conf.ident_trusted_nets)) {
784 #else
785 if ((msg->received_host == NULL) && (msg->received_prot == PROT_LOCAL)) {
786 #endif
787 if (msg->ident) {
788 if (strcmp(pw->pw_name, msg->ident) == 0) {
789 if (queue_delete(argv[arg]))
790 ok = TRUE;
791 } else {
792 fprintf(stderr, "you do not own message id %s\n", argv[arg]);
793 }
794 } else
795 fprintf(stderr, "message %s does not have an ident.\n", argv[arg]);
796 } else {
797 fprintf(stderr, "message %s was not received locally or from a trusted network.\n", argv[arg]);
798 }
799 }
800 } else {
801 fprintf(stderr, "could not find a passwd entry for uid %d: %s\n", conf.orig_uid, strerror(errno));
802 }
803 }
804 exit(ok ? EXIT_SUCCESS : EXIT_FAILURE);
805 } else {
806 fprintf(stderr, "unknown command %s\n", M_cmd);
807 exit(EXIT_FAILURE);
808 }
809 break;
811 case MODE_ACCEPT:
812 {
813 guint accept_flags = (opt_t ? ACC_DEL_RCPTS | ACC_DEL_BCC | ACC_RCPT_FROM_HEAD : ACC_HEAD_FROM_RCPT)
814 | (opt_i ? ACC_NODOT_TERM : ACC_NODOT_RELAX);
815 mode_accept(return_path, full_sender_name, accept_flags, &(argv[arg]), argc - arg);
816 exit(exit_failure ? EXIT_FAILURE : EXIT_SUCCESS);
817 }
818 break;
819 case MODE_NONE:
820 break;
821 default:
822 fprintf(stderr, "unknown mode: %d\n", mta_mode);
823 break;
824 }
826 logclose();
828 exit(exit_code);
829 }