]>
jfr.im git - irc/evilnet/x3.git/blob - src/sendmail.c
1 /* sendmail.c - mail sending utilities
2 * Copyright 2002-2004 srvx Development Team
4 * This file is part of x3.
6 * srvx is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with srvx; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
26 #ifdef HAVE_SYS_WAIT_H
30 #define KEY_PROHIBITED "prohibited"
32 static const struct message_entry msgtab
[] = {
33 { "MAILMSG_EMAIL_ALREADY_BANNED", "%s is already banned (%s)." },
34 { "MAILMSG_EMAIL_BANNED", "Email to %s has been forbidden." },
35 { "MAILMSG_EMAIL_NOT_BANNED", "Email to %s was not forbidden." },
36 { "MAILMSG_EMAIL_UNBANNED", "Email to %s is now allowed." },
37 { "MAILMSG_PROHIBITED_EMAIL", "%s: %s" },
38 { "MAILMSG_NO_PROHIBITED_EMAIL", "All email addresses are accepted." },
42 static dict_t prohibited_addrs
, prohibited_masks
;
43 struct module *sendmail_module
;
46 sendmail_prohibited_address(const char *addr
)
51 if (prohibited_addrs
&& (data
= dict_find(prohibited_addrs
, addr
, NULL
)))
54 for (it
= dict_first(prohibited_masks
); it
; it
= iter_next(it
))
55 if (match_ircglob(addr
, iter_key(it
)))
60 /* This function sends the given "paragraph" as flowed text, as
61 * defined in RFC 2646. It lets us only worry about line wrapping
62 * here, and not in the code that generates mail.
65 send_flowed_text(FILE *where
, const char *para
)
67 const char *eol
= strchr(para
, '\n');
71 /* Do we need to space-stuff the line? */
72 if ((*para
== ' ') || (*para
== '>') || !strncmp(para
, "From ", 5)) {
78 /* How much can we put on this line? */
79 if (!eol
&& (strlen(para
) < (80 - shift
))) {
80 /* End of paragraph; can put on one line. */
84 } else if (eol
&& (eol
< para
+ (80 - shift
))) {
85 /* Newline inside paragraph, no need to wrap. */
86 fprintf(where
, "%.*s\n", eol
- para
, para
);
90 /* Need to wrap. Where's the last space in the line? */
91 for (pos
=72-shift
; pos
&& (para
[pos
] != ' '); pos
--) ;
92 /* If we didn't find a space, look ahead instead. */
93 if (pos
== 0) pos
= strcspn(para
, " \n");
94 fprintf(where
, "%.*s\n", pos
+1, para
);
97 if (eol
&& (eol
< para
)) eol
= strchr(para
, '\n');
102 sendmail(struct userNode
*from
, struct handle_info
*to
, const char *subject
, const char *body
, int first_time
)
105 int infds
[2], outfds
[2];
106 const char *fromaddr
, *str
;
108 /* Grab some config items first. */
109 str
= conf_get_data("mail/enable", RECDB_QSTRING
);
110 if (!str
|| !enabled_string(str
))
112 fromaddr
= conf_get_data("mail/from_address", RECDB_QSTRING
);
114 /* How this works: We fork, and the child tries to send the mail.
115 * It does this by setting up a pipe pair, and forking again (the
116 * grandchild exec()'s the mailer program). The mid-level child
117 * sends the text to the grandchild's stdin, and then logs the
118 * success or failure.
123 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() to %s couldn't fork(): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
125 } else if (child
> 0) {
128 /* We're in a child now; must _exit() to die properly. */
129 if (pipe(infds
) < 0) {
130 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s couldn't pipe(infds): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
133 if (pipe(outfds
) < 0) {
134 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s couldn't pipe(outfds): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
139 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s couldn't fork(): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
141 } else if (child
> 0) {
142 /* Mid-level child; get ready to send the mail. */
143 FILE *out
= fdopen(infds
[1], "w");
144 struct string_list
*extras
;
148 /* Close the end of pipes we do not use. */
152 /* Do we have any "extra" headers to send? */
153 extras
= conf_get_data("mail/extra_headers", RECDB_STRING_LIST
);
155 for (nn
=0; nn
<extras
->used
; nn
++) {
156 fputs(extras
->list
[nn
], out
);
161 /* Content type? (format=flowed is a standard for plain text
162 * that lets the receiver reconstruct paragraphs, defined in
163 * RFC 2646. See comment above send_flowed_text() for more.)
165 if (!(str
= conf_get_data("mail/charset", RECDB_QSTRING
))) str
= "us-ascii";
166 fprintf(out
, "Content-Type: text/plain; charset=%s; format=flowed\n", str
);
168 /* Send From, To and Subject headers */
169 if (!fromaddr
) fromaddr
= "admin@poorly.configured.network";
170 fprintf(out
, "From: %s <%s>\n", from
->nick
, fromaddr
);
171 fprintf(out
, "To: \"%s\" <%s>\n", to
->handle
, to
->email_addr
);
172 fprintf(out
, "Subject: %s\n", subject
);
175 fputs("\n", out
); /* terminate headers */
176 extras
= conf_get_data((first_time
?"mail/body_prefix_first":"mail/body_prefix"), RECDB_STRING_LIST
);
178 for (nn
=0; nn
<extras
->used
; nn
++) {
179 send_flowed_text(out
, extras
->list
[nn
]);
183 send_flowed_text(out
, body
);
184 extras
= conf_get_data((first_time
?"mail/body_suffix_first":"mail/body_suffix"), RECDB_STRING_LIST
);
187 for (nn
=0; nn
<extras
->used
; nn
++)
188 send_flowed_text(out
, extras
->list
[nn
]);
191 /* Close file (sending mail) and check for return code */
195 rv
= wait4(child
, &res
, 0, NULL
);
196 } while ((rv
== -1) && (errno
== EINTR
));
198 /* accept the wait() result */
200 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() child to %s: Bad wait() return code %d: %s (%d)", to
->email_addr
, rv
, strerror(errno
), errno
);
204 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() grandchild to %s: Exited with code %d", to
->email_addr
, res
);
207 log_module(MAIN_LOG
, LOG_INFO
, "sendmail() sent email to %s <%s>: %s", to
->handle
, to
->email_addr
, subject
);
211 /* Grandchild; dup2 the fds and exec the mailer. */
212 const char *argv
[10], *mpath
;
213 unsigned int argc
= 0;
215 /* Close the end of pipes we do not use. */
219 dup2(infds
[0], STDIN_FILENO
);
220 dup2(outfds
[1], STDOUT_FILENO
);
221 mpath
= conf_get_data("mail/mailer", RECDB_QSTRING
);
222 if (!mpath
) mpath
= "/usr/sbin/sendmail";
223 argv
[argc
++] = mpath
;
226 argv
[argc
++] = fromaddr
;
228 argv
[argc
++] = to
->email_addr
;
230 if (execv(mpath
, (char**)argv
) < 0) {
231 log_module(MAIN_LOG
, LOG_ERROR
, "sendmail() grandchild to %s couldn't execv(): %s (%d)", to
->email_addr
, strerror(errno
), errno
);
238 sendmail_ban_address(struct userNode
*user
, struct userNode
*bot
, const char *addr
, const char *reason
) {
242 target
= strpbrk(addr
, "*?") ? prohibited_masks
: prohibited_addrs
;
243 if ((str
= dict_find(target
, addr
, NULL
))) {
245 send_message(user
, bot
, "MAILMSG_EMAIL_ALREADY_BANNED", addr
, str
);
248 dict_insert(target
, strdup(addr
), strdup(reason
));
249 if (user
) send_message(user
, bot
, "MAILMSG_EMAIL_BANNED", addr
);
253 static MODCMD_FUNC(cmd_banemail
) {
254 char *reason
= unsplit_string(argv
+2, argc
-2, NULL
);
255 return sendmail_ban_address(user
, cmd
->parent
->bot
, argv
[1], reason
);
258 static MODCMD_FUNC(cmd_unbanemail
) {
263 target
= strpbrk(addr
, "*?") ? prohibited_masks
: prohibited_addrs
;
264 if (dict_remove(target
, addr
))
265 reply("MAILMSG_EMAIL_UNBANNED", addr
);
267 reply("MAILMSG_EMAIL_NOT_BANNED", addr
);
271 static MODCMD_FUNC(cmd_stats_email
) {
275 for (it
=dict_first(prohibited_addrs
); it
; it
=iter_next(it
)) {
276 reply("MAILMSG_PROHIBITED_EMAIL", iter_key(it
), (const char*)iter_data(it
));
279 for (it
=dict_first(prohibited_masks
); it
; it
=iter_next(it
)) {
280 reply("MAILMSG_PROHIBITED_EMAIL", iter_key(it
), (const char*)iter_data(it
));
284 reply("MAILMSG_NO_PROHIBITED_EMAIL");
289 sendmail_saxdb_read(struct dict
*db
) {
291 struct record_data
*rd
;
294 if ((subdb
= database_get_data(db
, KEY_PROHIBITED
, RECDB_OBJECT
))) {
295 for (it
= dict_first(subdb
); it
; it
= iter_next(it
)) {
297 if (rd
->type
== RECDB_QSTRING
)
298 sendmail_ban_address(NULL
, NULL
, iter_key(it
), rd
->d
.qstring
);
305 sendmail_saxdb_write(struct saxdb_context
*ctx
) {
308 saxdb_start_record(ctx
, KEY_PROHIBITED
, 0);
309 for (it
= dict_first(prohibited_masks
); it
; it
= iter_next(it
))
310 saxdb_write_string(ctx
, iter_key(it
), iter_data(it
));
311 for (it
= dict_first(prohibited_addrs
); it
; it
= iter_next(it
))
312 saxdb_write_string(ctx
, iter_key(it
), iter_data(it
));
313 saxdb_end_record(ctx
);
318 sendmail_cleanup(void)
320 dict_delete(prohibited_addrs
);
321 dict_delete(prohibited_masks
);
327 prohibited_addrs
= dict_new();
328 dict_set_free_keys(prohibited_addrs
, free
);
329 dict_set_free_data(prohibited_addrs
, free
);
330 prohibited_masks
= dict_new();
331 dict_set_free_keys(prohibited_masks
, free
);
332 dict_set_free_data(prohibited_masks
, free
);
333 reg_exit_func(sendmail_cleanup
);
334 saxdb_register("sendmail", sendmail_saxdb_read
, sendmail_saxdb_write
);
335 sendmail_module
= module_register("sendmail", MAIN_LOG
, "sendmail.help", NULL
);
336 modcmd_register(sendmail_module
, "banemail", cmd_banemail
, 3, 0, "level", "601", NULL
);
337 modcmd_register(sendmail_module
, "stats email", cmd_stats_email
, 0, 0, "flags", "+oper", NULL
);
338 modcmd_register(sendmail_module
, "unbanemail", cmd_unbanemail
, 2, 0, "level", "601", NULL
);
339 message_register_table(msgtab
);