]>
jfr.im git - irc/evilnet/x3.git/blob - src/sendmail.c
1 /* sendmail.c - mail sending utilities
2 * Copyright 2002-2004 srvx Development Team
4 * This file is part of x3.
6 * srvx is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with srvx; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
26 #ifdef HAVE_SYS_WAIT_H
30 #define KEY_PROHIBITED "prohibited"
32 static const struct message_entry msgtab
[] = {
33 { "MAILMSG_EMAIL_ALREADY_BANNED", "%s is already banned (%s)." },
34 { "MAILMSG_EMAIL_BANNED", "Email to %s has been forbidden." },
35 { "MAILMSG_EMAIL_NOT_BANNED", "Email to %s was not forbidden." },
36 { "MAILMSG_EMAIL_UNBANNED", "Email to %s is now allowed." },
37 { "MAILMSG_PROHIBITED_EMAIL_HEADER", "$bBanned Email Address Masks$b" },
38 { "MAILMSG_PROHIBITED_EMAIL", "%s: %s" },
39 { "MAILMSG_PROHIBITED_EMAIL_END", "-------End of Banned Address Masks------" },
40 { "MAILMSG_NO_PROHIBITED_EMAIL", "All email addresses are accepted." },
44 static dict_t prohibited_addrs
, prohibited_masks
;
45 struct module *sendmail_module
;
48 sendmail_prohibited_address(const char *addr
)
53 if (prohibited_addrs
&& (data
= dict_find(prohibited_addrs
, addr
, NULL
)))
56 for (it
= dict_first(prohibited_masks
); it
; it
= iter_next(it
))
57 if (match_ircglob(addr
, iter_key(it
)))
62 /* This function sends the given "paragraph" as flowed text, as
63 * defined in RFC 2646. It lets us only worry about line wrapping
64 * here, and not in the code that generates mail.
67 send_flowed_text(FILE *where
, const char *para
)
69 const char *eol
= strchr(para
, '\n');
73 /* Do we need to space-stuff the line? */
74 if ((*para
== ' ') || (*para
== '>') || !strncmp(para
, "From ", 5)) {
80 /* How much can we put on this line? */
81 if (!eol
&& (strlen(para
) < (80 - shift
))) {
82 /* End of paragraph; can put on one line. */
86 } else if (eol
&& (eol
< para
+ (80 - shift
))) {
87 /* Newline inside paragraph, no need to wrap. */
88 fprintf(where
, "%.*s\n", eol
- para
, para
);
92 /* Need to wrap. Where's the last space in the line? */
93 for (pos
=72-shift
; pos
&& (para
[pos
] != ' '); pos
--) ;
94 /* If we didn't find a space, look ahead instead. */
95 if (pos
== 0) pos
= strcspn(para
, " \n");
96 fprintf(where
, "%.*s\n", pos
+1, para
);
99 if (eol
&& (eol
< para
)) eol
= strchr(para
, '\n');
104 sendmail(struct userNode
*from
, struct handle_info
*to
, const char *subject
, const char *body
, int first_time
)
107 int infds
[2], outfds
[2];
108 const char *fromaddr
, *str
;
110 /* Grab some config items first. */
111 str
= conf_get_data("mail/enable", RECDB_QSTRING
);
112 if (!str
|| !enabled_string(str
))
114 fromaddr
= conf_get_data("mail/from_address", RECDB_QSTRING
);
116 /* How this works: We fork, and the child tries to send the mail.
117 * It does this by setting up a pipe pair, and forking again (the
118 * grandchild exec()'s the mailer program). The mid-level child
119 * sends the text to the grandchild's stdin, and then logs the
120 * success or failure.
125 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() to %s couldn't fork(): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
127 } else if (child
> 0) {
130 /* We're in a child now; must _exit() to die properly. */
131 if (pipe(infds
) < 0) {
132 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s couldn't pipe(infds): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
135 if (pipe(outfds
) < 0) {
136 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s couldn't pipe(outfds): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
141 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s couldn't fork(): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
143 } else if (child
> 0) {
144 /* Mid-level child; get ready to send the mail. */
145 FILE *out
= fdopen(infds
[1], "w");
146 struct string_list
*extras
;
150 /* Close the end of pipes we do not use. */
154 /* Do we have any "extra" headers to send? */
155 extras
= conf_get_data("mail/extra_headers", RECDB_STRING_LIST
);
157 for (nn
=0; nn
<extras
->used
; nn
++) {
158 fputs(extras
->list
[nn
], out
);
163 /* Content type? (format=flowed is a standard for plain text
164 * that lets the receiver reconstruct paragraphs, defined in
165 * RFC 2646. See comment above send_flowed_text() for more.)
167 if (!(str
= conf_get_data("mail/charset", RECDB_QSTRING
))) str
= "us-ascii";
168 fprintf(out
, "Content-Type: text/plain; charset=%s; format=flowed\n", str
);
170 /* Send From, To and Subject headers */
171 if (!fromaddr
) fromaddr
= "admin@poorly.configured.network";
172 fprintf(out
, "From: %s <%s>\n", from
->nick
, fromaddr
);
173 fprintf(out
, "To: \"%s\" <%s>\n", to
->handle
, to
->email_addr
);
174 fprintf(out
, "Subject: %s\n", subject
);
177 fputs("\n", out
); /* terminate headers */
178 extras
= conf_get_data((first_time
?"mail/body_prefix_first":"mail/body_prefix"), RECDB_STRING_LIST
);
180 for (nn
=0; nn
<extras
->used
; nn
++) {
181 send_flowed_text(out
, extras
->list
[nn
]);
185 send_flowed_text(out
, body
);
186 extras
= conf_get_data((first_time
?"mail/body_suffix_first":"mail/body_suffix"), RECDB_STRING_LIST
);
189 for (nn
=0; nn
<extras
->used
; nn
++)
190 send_flowed_text(out
, extras
->list
[nn
]);
193 /* Close file (sending mail) and check for return code */
197 rv
= wait4(child
, &res
, 0, NULL
);
198 } while ((rv
== -1) && (errno
== EINTR
));
200 /* accept the wait() result */
202 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s: Bad wait() return code %d: %s (%d)", to
->email_addr
, rv
, strerror(errno
), errno
);
206 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() grandchild to %s: Exited with code %d", to
->email_addr
, res
);
209 log_module(MAIN_LOG
, LOG_INFO
, "sendmail() sent email to %s <%s>: %s", to
->handle
, to
->email_addr
, subject
);
213 /* Grandchild; dup2 the fds and exec the mailer. */
214 const char *argv
[10], *mpath
;
215 unsigned int argc
= 0;
217 /* Close the end of pipes we do not use. */
221 dup2(infds
[0], STDIN_FILENO
);
222 dup2(outfds
[1], STDOUT_FILENO
);
223 mpath
= conf_get_data("mail/mailer", RECDB_QSTRING
);
224 if (!mpath
) mpath
= "/usr/sbin/sendmail";
225 argv
[argc
++] = mpath
;
228 argv
[argc
++] = fromaddr
;
230 argv
[argc
++] = to
->email_addr
;
232 if (execv(mpath
, (char**)argv
) < 0) {
233 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() grandchild to %s couldn't execv(): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
240 sendmail_ban_address(struct userNode
*user
, struct userNode
*bot
, const char *addr
, const char *reason
) {
244 target
= strpbrk(addr
, "*?") ? prohibited_masks
: prohibited_addrs
;
245 if ((str
= dict_find(target
, addr
, NULL
))) {
247 send_message(user
, bot
, "MAILMSG_EMAIL_ALREADY_BANNED", addr
, str
);
250 dict_insert(target
, strdup(addr
), strdup(reason
));
251 if (user
) send_message(user
, bot
, "MAILMSG_EMAIL_BANNED", addr
);
255 static MODCMD_FUNC(cmd_banemail
) {
256 char *reason
= unsplit_string(argv
+2, argc
-2, NULL
);
257 return sendmail_ban_address(user
, cmd
->parent
->bot
, argv
[1], reason
);
260 static MODCMD_FUNC(cmd_unbanemail
) {
265 target
= strpbrk(addr
, "*?") ? prohibited_masks
: prohibited_addrs
;
266 if (dict_remove(target
, addr
))
267 reply("MAILMSG_EMAIL_UNBANNED", addr
);
269 reply("MAILMSG_EMAIL_NOT_BANNED", addr
);
273 static MODCMD_FUNC(cmd_stats_email
) {
277 reply("MAILMSG_PROHIBITED_EMAIL_HEADER");
279 for (it
=dict_first(prohibited_addrs
); it
; it
=iter_next(it
)) {
280 reply("MAILMSG_PROHIBITED_EMAIL", iter_key(it
), (const char*)iter_data(it
));
283 for (it
=dict_first(prohibited_masks
); it
; it
=iter_next(it
)) {
284 reply("MAILMSG_PROHIBITED_EMAIL", iter_key(it
), (const char*)iter_data(it
));
288 reply("MAILMSG_NO_PROHIBITED_EMAIL");
290 reply("MAILMSG_PROHIBITED_EMAIL_END");
295 sendmail_saxdb_read(struct dict
*db
) {
297 struct record_data
*rd
;
300 if ((subdb
= database_get_data(db
, KEY_PROHIBITED
, RECDB_OBJECT
))) {
301 for (it
= dict_first(subdb
); it
; it
= iter_next(it
)) {
303 if (rd
->type
== RECDB_QSTRING
)
304 sendmail_ban_address(NULL
, NULL
, iter_key(it
), rd
->d
.qstring
);
311 sendmail_saxdb_write(struct saxdb_context
*ctx
) {
314 saxdb_start_record(ctx
, KEY_PROHIBITED
, 0);
315 for (it
= dict_first(prohibited_masks
); it
; it
= iter_next(it
))
316 saxdb_write_string(ctx
, iter_key(it
), iter_data(it
));
317 for (it
= dict_first(prohibited_addrs
); it
; it
= iter_next(it
))
318 saxdb_write_string(ctx
, iter_key(it
), iter_data(it
));
319 saxdb_end_record(ctx
);
324 sendmail_cleanup(void)
326 dict_delete(prohibited_addrs
);
327 dict_delete(prohibited_masks
);
333 prohibited_addrs
= dict_new();
334 dict_set_free_keys(prohibited_addrs
, free
);
335 dict_set_free_data(prohibited_addrs
, free
);
336 prohibited_masks
= dict_new();
337 dict_set_free_keys(prohibited_masks
, free
);
338 dict_set_free_data(prohibited_masks
, free
);
339 reg_exit_func(sendmail_cleanup
);
340 saxdb_register("sendmail", sendmail_saxdb_read
, sendmail_saxdb_write
);
341 sendmail_module
= module_register("sendmail", MAIN_LOG
, "sendmail.help", NULL
);
342 modcmd_register(sendmail_module
, "banemail", cmd_banemail
, 3, 0, "level", "601", NULL
);
343 modcmd_register(sendmail_module
, "stats email", cmd_stats_email
, 0, 0, "flags", "+oper", NULL
);
344 modcmd_register(sendmail_module
, "unbanemail", cmd_unbanemail
, 2, 0, "level", "601", NULL
);
345 message_register_table(msgtab
);