1 /* sendmail.c - mail sending utilities
2 * Copyright 2002-2004 srvx Development Team
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version. Important limitations are
8 * listed in the COPYING file that accompanies this software.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, email srvx-maintainers@srvx.net.
24 #ifdef HAVE_SYS_WAIT_H
28 #define KEY_PROHIBITED "prohibited"
30 static const struct message_entry msgtab[] = {
31 { "MAILMSG_EMAIL_ALREADY_BANNED", "%s is already banned (%s)." },
32 { "MAILMSG_EMAIL_BANNED", "Email to %s has been forbidden." },
33 { "MAILMSG_EMAIL_NOT_BANNED", "Email to %s was not forbidden." },
34 { "MAILMSG_EMAIL_UNBANNED", "Email to %s is now allowed." },
35 { "MAILMSG_PROHIBITED_EMAIL", "%s: %s" },
36 { "MAILMSG_NO_PROHIBITED_EMAIL", "All email addresses are accepted." },
40 static dict_t prohibited_addrs, prohibited_masks;
41 struct module *sendmail_module;
44 sendmail_prohibited_address(const char *addr)
49 if (prohibited_addrs && (data = dict_find(prohibited_addrs, addr, NULL)))
52 for (it = dict_first(prohibited_masks); it; it = iter_next(it))
53 if (match_ircglob(addr, iter_key(it)))
58 /* This function sends the given "paragraph" as flowed text, as
59 * defined in RFC 2646. It lets us only worry about line wrapping
60 * here, and not in the code that generates mail.
63 send_flowed_text(FILE *where, const char *para)
65 const char *eol = strchr(para, '\n');
69 /* Do we need to space-stuff the line? */
70 if ((*para == ' ') || (*para == '>') || !strncmp(para, "From ", 5)) {
76 /* How much can we put on this line? */
77 if (!eol && (strlen(para) < (80 - shift))) {
78 /* End of paragraph; can put on one line. */
82 } else if (eol && (eol < para + (80 - shift))) {
83 /* Newline inside paragraph, no need to wrap. */
84 fprintf(where, "%.*s\n", eol - para, para);
88 /* Need to wrap. Where's the last space in the line? */
89 for (pos=72-shift; pos && (para[pos] != ' '); pos--) ;
90 /* If we didn't find a space, look ahead instead. */
91 if (pos == 0) pos = strcspn(para, " \n");
92 fprintf(where, "%.*s\n", pos+1, para);
95 if (eol && (eol < para)) eol = strchr(para, '\n');
100 sendmail(struct userNode *from, struct handle_info *to, const char *subject, const char *body, int first_time)
103 int infds[2], outfds[2];
104 const char *fromaddr, *str;
106 /* Grab some config items first. */
107 str = conf_get_data("mail/enable", RECDB_QSTRING);
108 if (!str || !enabled_string(str))
110 fromaddr = conf_get_data("mail/from_address", RECDB_QSTRING);
112 /* How this works: We fork, and the child tries to send the mail.
113 * It does this by setting up a pipe pair, and forking again (the
114 * grandchild exec()'s the mailer program). The mid-level child
115 * sends the text to the grandchild's stdin, and then logs the
116 * success or failure.
121 log_module(MAIN_LOG, LOG_ERROR, "sendmail() to %s couldn't fork(): %s (%d)", to->email_addr, strerror(errno), errno);
123 } else if (child > 0) {
126 /* We're in a child now; must _exit() to die properly. */
127 if (pipe(infds) < 0) {
128 log_module(MAIN_LOG, LOG_ERROR, "sendmail() child to %s couldn't pipe(infds): %s (%d)", to->email_addr, strerror(errno), errno);
131 if (pipe(outfds) < 0) {
132 log_module(MAIN_LOG, LOG_ERROR, "sendmail() child to %s couldn't pipe(outfds): %s (%d)", to->email_addr, strerror(errno), errno);
137 log_module(MAIN_LOG, LOG_ERROR, "sendmail() child to %s couldn't fork(): %s (%d)", to->email_addr, strerror(errno), errno);
139 } else if (child > 0) {
140 /* Mid-level child; get ready to send the mail. */
141 FILE *out = fdopen(infds[1], "w");
142 struct string_list *extras;
146 /* Close the end of pipes we do not use. */
150 /* Do we have any "extra" headers to send? */
151 extras = conf_get_data("mail/extra_headers", RECDB_STRING_LIST);
153 for (nn=0; nn<extras->used; nn++) {
154 fputs(extras->list[nn], out);
159 /* Content type? (format=flowed is a standard for plain text
160 * that lets the receiver reconstruct paragraphs, defined in
161 * RFC 2646. See comment above send_flowed_text() for more.)
163 if (!(str = conf_get_data("mail/charset", RECDB_QSTRING))) str = "us-ascii";
164 fprintf(out, "Content-Type: text/plain; charset=%s; format=flowed\n", str);
166 /* Send From, To and Subject headers */
167 if (!fromaddr) fromaddr = "admin@poorly.configured.network";
168 fprintf(out, "From: %s <%s>\n", from->nick, fromaddr);
169 fprintf(out, "To: \"%s\" <%s>\n", to->handle, to->email_addr);
170 fprintf(out, "Subject: %s\n", subject);
173 fputs("\n", out); /* terminate headers */
174 extras = conf_get_data((first_time?"mail/body_prefix_first":"mail/body_prefix"), RECDB_STRING_LIST);
176 for (nn=0; nn<extras->used; nn++) {
177 send_flowed_text(out, extras->list[nn]);
181 send_flowed_text(out, body);
182 extras = conf_get_data((first_time?"mail/body_suffix_first":"mail/body_suffix"), RECDB_STRING_LIST);
185 for (nn=0; nn<extras->used; nn++)
186 send_flowed_text(out, extras->list[nn]);
189 /* Close file (sending mail) and check for return code */
193 rv = wait4(child, &res, 0, NULL);
194 } while ((rv == -1) && (errno == EINTR));
196 /* accept the wait() result */
198 log_module(MAIN_LOG, LOG_ERROR, "sendmail() child to %s: Bad wait() return code %d: %s (%d)", to->email_addr, rv, strerror(errno), errno);
202 log_module(MAIN_LOG, LOG_ERROR, "sendmail() grandchild to %s: Exited with code %d", to->email_addr, res);
205 log_module(MAIN_LOG, LOG_INFO, "sendmail() sent email to %s <%s>: %s", to->handle, to->email_addr, subject);
209 /* Grandchild; dup2 the fds and exec the mailer. */
210 const char *argv[10], *mpath;
211 unsigned int argc = 0;
213 /* Close the end of pipes we do not use. */
217 dup2(infds[0], STDIN_FILENO);
218 dup2(outfds[1], STDOUT_FILENO);
219 mpath = conf_get_data("mail/mailer", RECDB_QSTRING);
220 if (!mpath) mpath = "/usr/sbin/sendmail";
221 argv[argc++] = mpath;
224 argv[argc++] = fromaddr;
226 argv[argc++] = to->email_addr;
228 if (execv(mpath, (char**)argv) < 0) {
229 log_module(MAIN_LOG, LOG_ERROR, "sendmail() grandchild to %s couldn't execv(): %s (%d)", to->email_addr, strerror(errno), errno);
236 sendmail_ban_address(struct userNode *user, struct userNode *bot, const char *addr, const char *reason) {
240 target = strpbrk(addr, "*?") ? prohibited_masks : prohibited_addrs;
241 if ((str = dict_find(target, addr, NULL))) {
243 send_message(user, bot, "MAILMSG_EMAIL_ALREADY_BANNED", addr, str);
246 dict_insert(target, strdup(addr), strdup(reason));
247 if (user) send_message(user, bot, "MAILMSG_EMAIL_BANNED", addr);
251 static MODCMD_FUNC(cmd_banemail) {
252 char *reason = unsplit_string(argv+2, argc-2, NULL);
253 return sendmail_ban_address(user, cmd->parent->bot, argv[1], reason);
256 static MODCMD_FUNC(cmd_unbanemail) {
261 target = strpbrk(addr, "*?") ? prohibited_masks : prohibited_addrs;
262 if (dict_remove(target, addr))
263 reply("MAILMSG_EMAIL_UNBANNED", addr);
265 reply("MAILMSG_EMAIL_NOT_BANNED", addr);
269 static MODCMD_FUNC(cmd_stats_email) {
273 for (it=dict_first(prohibited_addrs); it; it=iter_next(it)) {
274 reply("MAILMSG_PROHIBITED_EMAIL", iter_key(it), (const char*)iter_data(it));
277 for (it=dict_first(prohibited_masks); it; it=iter_next(it)) {
278 reply("MAILMSG_PROHIBITED_EMAIL", iter_key(it), (const char*)iter_data(it));
282 reply("MAILMSG_NO_PROHIBITED_EMAIL");
287 sendmail_saxdb_read(struct dict *db) {
289 struct record_data *rd;
292 if ((subdb = database_get_data(db, KEY_PROHIBITED, RECDB_OBJECT))) {
293 for (it = dict_first(subdb); it; it = iter_next(it)) {
295 if (rd->type == RECDB_QSTRING)
296 sendmail_ban_address(NULL, NULL, iter_key(it), rd->d.qstring);
303 sendmail_saxdb_write(struct saxdb_context *ctx) {
306 saxdb_start_record(ctx, KEY_PROHIBITED, 0);
307 for (it = dict_first(prohibited_masks); it; it = iter_next(it))
308 saxdb_write_string(ctx, iter_key(it), iter_data(it));
309 for (it = dict_first(prohibited_addrs); it; it = iter_next(it))
310 saxdb_write_string(ctx, iter_key(it), iter_data(it));
311 saxdb_end_record(ctx);
316 sendmail_cleanup(void)
318 dict_delete(prohibited_addrs);
319 dict_delete(prohibited_masks);
325 prohibited_addrs = dict_new();
326 dict_set_free_keys(prohibited_addrs, free);
327 dict_set_free_data(prohibited_addrs, free);
328 prohibited_masks = dict_new();
329 dict_set_free_keys(prohibited_masks, free);
330 dict_set_free_data(prohibited_masks, free);
331 reg_exit_func(sendmail_cleanup);
332 saxdb_register("sendmail", sendmail_saxdb_read, sendmail_saxdb_write);
333 sendmail_module = module_register("sendmail", MAIN_LOG, "sendmail.help", NULL);
334 modcmd_register(sendmail_module, "banemail", cmd_banemail, 3, 0, "level", "601", NULL);
335 modcmd_register(sendmail_module, "stats email", cmd_stats_email, 0, 0, "flags", "+oper", NULL);
336 modcmd_register(sendmail_module, "unbanemail", cmd_unbanemail, 2, 0, "level", "601", NULL);
337 message_register_table(msgtab);