mail.local.c revision 1.23.4.1 1 1.23.4.1 skrll /* $NetBSD: mail.local.c,v 1.23.4.1 2008/06/03 20:47:12 skrll Exp $ */
2 1.10 mrg
3 1.1 cgd /*-
4 1.11 mrg * Copyright (c) 1990, 1993, 1994
5 1.11 mrg * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.22 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.11 mrg #include <sys/cdefs.h>
33 1.1 cgd #ifndef lint
34 1.11 mrg __COPYRIGHT("@(#) Copyright (c) 1990, 1993, 1994\n\
35 1.11 mrg The Regents of the University of California. All rights reserved.\n");
36 1.11 mrg #if 0
37 1.11 mrg static char sccsid[] = "@(#)mail.local.c 8.22 (Berkeley) 6/21/95";
38 1.11 mrg #else
39 1.23.4.1 skrll __RCSID("$NetBSD: mail.local.c,v 1.23.4.1 2008/06/03 20:47:12 skrll Exp $");
40 1.11 mrg #endif
41 1.1 cgd #endif /* not lint */
42 1.1 cgd
43 1.1 cgd #include <sys/param.h>
44 1.1 cgd #include <sys/stat.h>
45 1.1 cgd #include <sys/socket.h>
46 1.11 mrg
47 1.1 cgd #include <netinet/in.h>
48 1.11 mrg
49 1.11 mrg #include <errno.h>
50 1.1 cgd #include <fcntl.h>
51 1.11 mrg #include <pwd.h>
52 1.1 cgd #include <netdb.h>
53 1.20 wiz #include <stdarg.h>
54 1.1 cgd #include <stdio.h>
55 1.1 cgd #include <stdlib.h>
56 1.1 cgd #include <string.h>
57 1.11 mrg #include <syslog.h>
58 1.11 mrg #include <time.h>
59 1.11 mrg #include <unistd.h>
60 1.23.4.1 skrll #include <sysexits.h>
61 1.11 mrg
62 1.1 cgd
63 1.23.4.1 skrll #include "pathnames.h"
64 1.1 cgd
65 1.2 deraadt int deliver __P((int, char *, int));
66 1.23.4.1 skrll void logerr __P((int, const char *, ...))
67 1.17 is __attribute__((__format__(__printf__, 2, 3)));
68 1.23.4.1 skrll void logwarn __P((const char *, ...))
69 1.23.4.1 skrll __attribute__((__format__(__printf__, 1, 2)));
70 1.1 cgd void notifybiff __P((char *));
71 1.15 mycroft int store __P((const char *));
72 1.1 cgd void usage __P((void));
73 1.11 mrg int main __P((int, char **));
74 1.1 cgd
75 1.11 mrg int
76 1.1 cgd main(argc, argv)
77 1.1 cgd int argc;
78 1.1 cgd char **argv;
79 1.1 cgd {
80 1.1 cgd struct passwd *pw;
81 1.11 mrg int ch, fd, eval, lockfile = 0;
82 1.1 cgd uid_t uid;
83 1.15 mycroft const char *from;
84 1.1 cgd
85 1.11 mrg /* use a reasonable umask */
86 1.11 mrg (void) umask(0077);
87 1.11 mrg
88 1.1 cgd openlog("mail.local", LOG_PERROR, LOG_MAIL);
89 1.1 cgd
90 1.1 cgd from = NULL;
91 1.13 enami while ((ch = getopt(argc, argv, "ldf:r:")) != -1)
92 1.14 enami switch (ch) {
93 1.1 cgd case 'd': /* backward compatible */
94 1.1 cgd break;
95 1.1 cgd case 'f':
96 1.1 cgd case 'r': /* backward compatible */
97 1.1 cgd if (from)
98 1.23.4.1 skrll logerr(EX_USAGE, "multiple -f options");
99 1.1 cgd from = optarg;
100 1.1 cgd break;
101 1.2 deraadt case 'l':
102 1.2 deraadt lockfile++;
103 1.2 deraadt break;
104 1.1 cgd case '?':
105 1.1 cgd default:
106 1.1 cgd usage();
107 1.1 cgd }
108 1.1 cgd argc -= optind;
109 1.1 cgd argv += optind;
110 1.1 cgd
111 1.1 cgd if (!*argv)
112 1.1 cgd usage();
113 1.1 cgd
114 1.1 cgd /*
115 1.1 cgd * If from not specified, use the name from getlogin() if the
116 1.1 cgd * uid matches, otherwise, use the name from the password file
117 1.1 cgd * corresponding to the uid.
118 1.1 cgd */
119 1.1 cgd uid = getuid();
120 1.1 cgd if (!from && (!(from = getlogin()) ||
121 1.1 cgd !(pw = getpwnam(from)) || pw->pw_uid != uid))
122 1.1 cgd from = (pw = getpwuid(uid)) ? pw->pw_name : "???";
123 1.1 cgd
124 1.1 cgd fd = store(from);
125 1.23.4.1 skrll for (eval = EX_OK; *argv; ++argv) {
126 1.23.4.1 skrll int rval;
127 1.23.4.1 skrll
128 1.23.4.1 skrll rval = deliver(fd, *argv, lockfile);
129 1.23.4.1 skrll if (eval == EX_OK && rval != EX_OK)
130 1.23.4.1 skrll eval = rval;
131 1.23.4.1 skrll }
132 1.10 mrg exit (eval);
133 1.1 cgd }
134 1.1 cgd
135 1.10 mrg int
136 1.1 cgd store(from)
137 1.15 mycroft const char *from;
138 1.1 cgd {
139 1.11 mrg FILE *fp = NULL; /* XXX gcc */
140 1.1 cgd time_t tval;
141 1.1 cgd int fd, eline;
142 1.1 cgd char *tn, line[2048];
143 1.1 cgd
144 1.1 cgd tn = strdup(_PATH_LOCTMP);
145 1.21 itojun if (!tn)
146 1.23.4.1 skrll logerr(EX_OSERR, "not enough core");
147 1.1 cgd if ((fd = mkstemp(tn)) == -1 || !(fp = fdopen(fd, "w+")))
148 1.23.4.1 skrll logerr(EX_OSERR, "unable to open temporary file");
149 1.1 cgd (void)unlink(tn);
150 1.1 cgd free(tn);
151 1.1 cgd
152 1.1 cgd (void)time(&tval);
153 1.1 cgd (void)fprintf(fp, "From %s %s", from, ctime(&tval));
154 1.1 cgd
155 1.1 cgd line[0] = '\0';
156 1.1 cgd for (eline = 1; fgets(line, sizeof(line), stdin);) {
157 1.1 cgd if (line[0] == '\n')
158 1.1 cgd eline = 1;
159 1.1 cgd else {
160 1.16 perry if (eline && line[0] == 'F' && !memcmp(line, "From ", 5))
161 1.1 cgd (void)putc('>', fp);
162 1.1 cgd eline = 0;
163 1.1 cgd }
164 1.1 cgd (void)fprintf(fp, "%s", line);
165 1.1 cgd if (ferror(fp))
166 1.1 cgd break;
167 1.1 cgd }
168 1.1 cgd
169 1.1 cgd /* If message not newline terminated, need an extra. */
170 1.1 cgd if (!index(line, '\n'))
171 1.1 cgd (void)putc('\n', fp);
172 1.1 cgd /* Output a newline; note, empty messages are allowed. */
173 1.1 cgd (void)putc('\n', fp);
174 1.1 cgd
175 1.1 cgd (void)fflush(fp);
176 1.1 cgd if (ferror(fp))
177 1.23.4.1 skrll logerr(EX_OSERR, "temporary file write error");
178 1.23 christos fd = dup(fd);
179 1.23 christos (void)fclose(fp);
180 1.1 cgd return(fd);
181 1.1 cgd }
182 1.1 cgd
183 1.10 mrg int
184 1.2 deraadt deliver(fd, name, lockfile)
185 1.1 cgd int fd;
186 1.1 cgd char *name;
187 1.2 deraadt int lockfile;
188 1.1 cgd {
189 1.1 cgd struct stat sb;
190 1.23.4.1 skrll struct passwd pwres, *pw;
191 1.23.4.1 skrll char pwbuf[1024];
192 1.23.4.1 skrll int created, mbfd, nr, nw, off, rval=EX_OK, lfd=-1;
193 1.2 deraadt char biffmsg[100], buf[8*1024], path[MAXPATHLEN], lpath[MAXPATHLEN];
194 1.6 pk off_t curoff;
195 1.1 cgd
196 1.1 cgd /*
197 1.1 cgd * Disallow delivery to unknown names -- special mailboxes can be
198 1.1 cgd * handled in the sendmail aliases file.
199 1.1 cgd */
200 1.23.4.1 skrll if ((getpwnam_r(name, &pwres, pwbuf, sizeof(pwbuf), &pw)) != 0) {
201 1.23.4.1 skrll logwarn("unable to find user %s: %s", name, strerror(errno));
202 1.23.4.1 skrll return(EX_TEMPFAIL);
203 1.23.4.1 skrll }
204 1.23.4.1 skrll if (pw == NULL) {
205 1.23.4.1 skrll logwarn("unknown name: %s", name);
206 1.23.4.1 skrll return(EX_NOUSER);
207 1.1 cgd }
208 1.1 cgd
209 1.10 mrg (void)snprintf(path, sizeof path, "%s/%s", _PATH_MAILDIR, name);
210 1.1 cgd
211 1.10 mrg if (lockfile) {
212 1.10 mrg (void)snprintf(lpath, sizeof lpath, "%s/%s.lock",
213 1.10 mrg _PATH_MAILDIR, name);
214 1.2 deraadt
215 1.2 deraadt if((lfd = open(lpath, O_CREAT|O_WRONLY|O_EXCL,
216 1.2 deraadt S_IRUSR|S_IWUSR)) < 0) {
217 1.23.4.1 skrll logwarn("%s: %s", lpath, strerror(errno));
218 1.23.4.1 skrll return(EX_OSERR);
219 1.2 deraadt }
220 1.2 deraadt }
221 1.2 deraadt
222 1.1 cgd if (!(created = lstat(path, &sb)) &&
223 1.1 cgd (sb.st_nlink != 1 || S_ISLNK(sb.st_mode))) {
224 1.23.4.1 skrll logwarn("%s: linked file", path);
225 1.23.4.1 skrll return(EX_OSERR);
226 1.1 cgd }
227 1.23.4.1 skrll
228 1.10 mrg if ((mbfd = open(path, O_APPEND|O_WRONLY|O_EXLOCK,
229 1.2 deraadt S_IRUSR|S_IWUSR)) < 0) {
230 1.2 deraadt if ((mbfd = open(path, O_APPEND|O_CREAT|O_WRONLY|O_EXLOCK,
231 1.2 deraadt S_IRUSR|S_IWUSR)) < 0) {
232 1.23.4.1 skrll logwarn("%s: %s", path, strerror(errno));
233 1.23.4.1 skrll return(EX_OSERR);
234 1.10 mrg }
235 1.1 cgd }
236 1.1 cgd
237 1.6 pk curoff = lseek(mbfd, 0, SEEK_END);
238 1.18 lukem (void)snprintf(biffmsg, sizeof biffmsg, "%s@%lld\n", name,
239 1.12 mrg (long long)curoff);
240 1.6 pk if (lseek(fd, 0, SEEK_SET) == (off_t)-1) {
241 1.23.4.1 skrll logwarn("temporary file: %s", strerror(errno));
242 1.23.4.1 skrll rval = EX_OSERR;
243 1.1 cgd goto bad;
244 1.1 cgd }
245 1.1 cgd
246 1.1 cgd while ((nr = read(fd, buf, sizeof(buf))) > 0)
247 1.3 mycroft for (off = 0; off < nr; off += nw)
248 1.3 mycroft if ((nw = write(mbfd, buf + off, nr - off)) < 0) {
249 1.23.4.1 skrll logwarn("%s: %s", path, strerror(errno));
250 1.1 cgd goto trunc;
251 1.1 cgd }
252 1.1 cgd if (nr < 0) {
253 1.23.4.1 skrll logwarn("temporary file: %s", strerror(errno));
254 1.1 cgd trunc: (void)ftruncate(mbfd, curoff);
255 1.23.4.1 skrll rval = EX_OSERR;
256 1.1 cgd }
257 1.1 cgd
258 1.1 cgd /*
259 1.1 cgd * Set the owner and group. Historically, binmail repeated this at
260 1.1 cgd * each mail delivery. We no longer do this, assuming that if the
261 1.1 cgd * ownership or permissions were changed there was a reason for doing
262 1.1 cgd * so.
263 1.1 cgd */
264 1.2 deraadt bad:
265 1.10 mrg if (lockfile) {
266 1.10 mrg if (lfd >= 0) {
267 1.2 deraadt unlink(lpath);
268 1.2 deraadt close(lfd);
269 1.2 deraadt }
270 1.2 deraadt }
271 1.2 deraadt if (created)
272 1.1 cgd (void)fchown(mbfd, pw->pw_uid, pw->pw_gid);
273 1.1 cgd
274 1.1 cgd (void)fsync(mbfd); /* Don't wait for update. */
275 1.1 cgd (void)close(mbfd); /* Implicit unlock. */
276 1.1 cgd
277 1.23.4.1 skrll if (rval == EX_OK)
278 1.1 cgd notifybiff(biffmsg);
279 1.23.4.1 skrll
280 1.23.4.1 skrll return rval;
281 1.1 cgd }
282 1.1 cgd
283 1.1 cgd void
284 1.1 cgd notifybiff(msg)
285 1.1 cgd char *msg;
286 1.1 cgd {
287 1.1 cgd static struct sockaddr_in addr;
288 1.1 cgd static int f = -1;
289 1.1 cgd struct hostent *hp;
290 1.1 cgd struct servent *sp;
291 1.1 cgd int len;
292 1.1 cgd
293 1.1 cgd if (!addr.sin_family) {
294 1.1 cgd /* Be silent if biff service not available. */
295 1.1 cgd if (!(sp = getservbyname("biff", "udp")))
296 1.1 cgd return;
297 1.1 cgd if (!(hp = gethostbyname("localhost"))) {
298 1.23.4.1 skrll logwarn("localhost: %s", strerror(errno));
299 1.1 cgd return;
300 1.1 cgd }
301 1.9 mycroft addr.sin_len = sizeof(struct sockaddr_in);
302 1.1 cgd addr.sin_family = hp->h_addrtype;
303 1.9 mycroft addr.sin_port = sp->s_port;
304 1.16 perry memcpy(&addr.sin_addr, hp->h_addr, hp->h_length);
305 1.1 cgd }
306 1.1 cgd if (f < 0 && (f = socket(AF_INET, SOCK_DGRAM, 0)) == -1) {
307 1.23.4.1 skrll logwarn("socket: %s", strerror(errno));
308 1.1 cgd return;
309 1.1 cgd }
310 1.1 cgd len = strlen(msg) + 1;
311 1.1 cgd if (sendto(f, msg, len, 0, (struct sockaddr *)&addr, sizeof(addr))
312 1.1 cgd != len)
313 1.23.4.1 skrll logwarn("sendto biff: %s", strerror(errno));
314 1.1 cgd }
315 1.1 cgd
316 1.1 cgd void
317 1.1 cgd usage()
318 1.1 cgd {
319 1.23.4.1 skrll logerr(EX_USAGE, "usage: mail.local [-l] [-f from] user ...");
320 1.23.4.1 skrll }
321 1.23.4.1 skrll
322 1.23.4.1 skrll void
323 1.23.4.1 skrll logerr(int status, const char *fmt, ...)
324 1.23.4.1 skrll {
325 1.23.4.1 skrll va_list ap;
326 1.23.4.1 skrll
327 1.23.4.1 skrll va_start(ap, fmt);
328 1.23.4.1 skrll vsyslog(LOG_ERR, fmt, ap);
329 1.23.4.1 skrll va_end(ap);
330 1.23.4.1 skrll
331 1.23.4.1 skrll exit(status);
332 1.23.4.1 skrll /* NOTREACHED */
333 1.23.4.1 skrll return;
334 1.1 cgd }
335 1.1 cgd
336 1.1 cgd void
337 1.23.4.1 skrll logwarn(const char *fmt, ...)
338 1.1 cgd {
339 1.1 cgd va_list ap;
340 1.20 wiz
341 1.1 cgd va_start(ap, fmt);
342 1.1 cgd vsyslog(LOG_ERR, fmt, ap);
343 1.1 cgd va_end(ap);
344 1.23.4.1 skrll return;
345 1.1 cgd }
346