Commit | Line | Data |
---|---|---|
059ec3d9 PH |
1 | /************************************************* |
2 | * Exim - an Internet mail transport agent * | |
3 | *************************************************/ | |
4 | ||
f9ba5e22 | 5 | /* Copyright (c) University of Cambridge 1995 - 2018 */ |
059ec3d9 PH |
6 | /* See the file NOTICE for conditions of use and distribution. */ |
7 | ||
8 | /* Almost all the global variables are defined together in this one header, so | |
9 | that they are easy to find. However, those that are visible during the | |
10 | compilation of the local_scan() function are defined separately in the | |
11 | local_scan.h header file. */ | |
12 | ||
13 | /* First put any specials that are required for some operating systems. */ | |
14 | ||
15 | #ifdef NEED_H_ERRNO | |
16 | extern int h_errno; | |
17 | #endif | |
18 | ||
cd59ab18 PP |
19 | /* We need to be careful about width of int and atomicity in signal handlers, |
20 | especially with the rise of 64-bit systems breaking older assumptions. But | |
21 | sig_atomic_t comes from signal.h so can't go into mytypes.h without including | |
22 | signal support in local_scan, which seems precipitous. */ | |
23 | typedef volatile sig_atomic_t SIGNAL_BOOL; | |
24 | ||
059ec3d9 PH |
25 | /* Now things that are present only when configured. */ |
26 | ||
27 | #ifdef EXIM_PERL | |
28 | extern uschar *opt_perl_startup; /* Startup code for Perl interpreter */ | |
29 | extern BOOL opt_perl_at_start; /* Start Perl interpreter at start */ | |
30 | extern BOOL opt_perl_started; /* Set once interpreter started */ | |
2f680c0c | 31 | extern BOOL opt_perl_taintmode; /* Enable taint mode in Perl */ |
059ec3d9 PH |
32 | #endif |
33 | ||
1a46a8c5 PH |
34 | #ifdef EXPAND_DLFUNC |
35 | extern tree_node *dlobj_anchor; /* Tree of dynamically-loaded objects */ | |
36 | #endif | |
37 | ||
059ec3d9 PH |
38 | #ifdef LOOKUP_IBASE |
39 | extern uschar *ibase_servers; | |
40 | #endif | |
41 | ||
42 | #ifdef LOOKUP_LDAP | |
bc19a55b PP |
43 | extern uschar *eldap_ca_cert_dir; /* Directory with CA certificates */ |
44 | extern uschar *eldap_ca_cert_file; /* CA certificate file */ | |
45 | extern uschar *eldap_cert_file; /* Certificate file */ | |
46 | extern uschar *eldap_cert_key; /* Certificate key file */ | |
47 | extern uschar *eldap_cipher_suite; /* Allowed cipher suite */ | |
059ec3d9 | 48 | extern uschar *eldap_default_servers; /* List of default servers */ |
bc19a55b PP |
49 | extern uschar *eldap_require_cert; /* Peer certificate checking strategy */ |
50 | extern BOOL eldap_start_tls; /* Use STARTTLS */ | |
059ec3d9 PH |
51 | extern int eldap_version; /* LDAP version */ |
52 | #endif | |
53 | ||
54 | #ifdef LOOKUP_MYSQL | |
55 | extern uschar *mysql_servers; /* List of servers and connect info */ | |
56 | #endif | |
57 | ||
58 | #ifdef LOOKUP_ORACLE | |
59 | extern uschar *oracle_servers; /* List of servers and connect info */ | |
60 | #endif | |
61 | ||
62 | #ifdef LOOKUP_PGSQL | |
63 | extern uschar *pgsql_servers; /* List of servers and connect info */ | |
64 | #endif | |
65 | ||
de78e2d5 | 66 | #ifdef LOOKUP_REDIS |
9bdd29ad TL |
67 | extern uschar *redis_servers; /* List of servers and connect info */ |
68 | #endif | |
69 | ||
31480e42 PH |
70 | #ifdef LOOKUP_SQLITE |
71 | extern int sqlite_lock_timeout; /* Internal lock waiting timeout */ | |
72 | #endif | |
73 | ||
059ec3d9 PH |
74 | #ifdef SUPPORT_MOVE_FROZEN_MESSAGES |
75 | extern BOOL move_frozen_messages; /* Get them out of the normal directory */ | |
76 | #endif | |
77 | ||
78 | /* These variables are outside the #ifdef because it keeps the code less | |
79 | cluttered in several places (e.g. during logging) if we can always refer to | |
80 | them. Also, the tls_ variables are now always visible. */ | |
81 | ||
817d9f57 | 82 | typedef struct { |
74f1a423 | 83 | client_conn_ctx active; /* fd/socket when in a TLS session, and ptr to TLS context */ |
817d9f57 JH |
84 | int bits; /* bits used in TLS session */ |
85 | BOOL certificate_verified; /* Client certificate verified */ | |
c0635b6d | 86 | #ifdef SUPPORT_DANE |
53a7196b | 87 | BOOL dane_verified; /* ... via DANE */ |
594706ea | 88 | int tlsa_usage; /* TLSA record(s) usage */ |
53a7196b | 89 | #endif |
817d9f57 | 90 | uschar *cipher; /* Cipher used */ |
f1be21cf | 91 | const uschar *cipher_stdname; /* Cipher used, RFC version */ |
da40b1ec | 92 | const uschar *ver; /* TLS version */ |
f1be21cf | 93 | |
817d9f57 JH |
94 | BOOL on_connect; /* For older MTAs that don't STARTTLS */ |
95 | uschar *on_connect_ports; /* Ports always tls-on-connect */ | |
9d1c15ef JH |
96 | void *ourcert; /* Certificate we presented, binary */ |
97 | void *peercert; /* Certificate of peer, binary */ | |
817d9f57 | 98 | uschar *peerdn; /* DN from peer */ |
817d9f57 | 99 | uschar *sni; /* Server Name Indication */ |
b1a32a3c | 100 | uschar *channelbinding; /* b64'd data identifying channel, for authenticators */ |
44662487 JH |
101 | enum { |
102 | OCSP_NOT_REQ=0, /* not requested */ | |
103 | OCSP_NOT_RESP, /* no response to request */ | |
018058b2 JH |
104 | OCSP_VFY_NOT_TRIED, /* response not verified */ |
105 | OCSP_FAILED, /* verify failed */ | |
44662487 JH |
106 | OCSP_VFIED /* verified */ |
107 | } ocsp; /* Stapled OCSP status */ | |
b10c87b3 JH |
108 | #ifdef EXPERIMENTAL_TLS_RESUME |
109 | unsigned resumption; /* Session resumption */ | |
110 | BOOL host_resumable:1; | |
111 | BOOL ticket_received:1; | |
112 | #endif | |
4a1bd6b9 | 113 | BOOL verify_override:1; /* certificate_verified only due to tls_try_verify_hosts */ |
817d9f57 JH |
114 | } tls_support; |
115 | extern tls_support tls_in; | |
116 | extern tls_support tls_out; | |
059ec3d9 | 117 | |
01603eec | 118 | #ifndef DISABLE_TLS |
e6060e2c | 119 | extern BOOL gnutls_compat_mode; /* Less security, more compatibility */ |
2519e60d | 120 | extern BOOL gnutls_allow_auto_pkcs11; /* Let GnuTLS autoload PKCS11 modules */ |
77bb000f | 121 | extern uschar *openssl_options; /* OpenSSL compatibility options */ |
059ec3d9 | 122 | extern const pcre *regex_STARTTLS; /* For recognizing STARTTLS settings */ |
059ec3d9 PH |
123 | extern uschar *tls_certificate; /* Certificate file */ |
124 | extern uschar *tls_crl; /* CRL File */ | |
3375e053 | 125 | extern int tls_dh_max_bits; /* don't accept higher lib suggestions */ |
059ec3d9 | 126 | extern uschar *tls_dhparam; /* DH param file */ |
10ca4f1c | 127 | extern uschar *tls_eccurve; /* EC curve */ |
23f3dc67 | 128 | # ifndef DISABLE_OCSP |
3f7eeb86 | 129 | extern uschar *tls_ocsp_file; /* OCSP stapling proof file */ |
23f3dc67 | 130 | # endif |
059ec3d9 PH |
131 | extern uschar *tls_privatekey; /* Private key file */ |
132 | extern BOOL tls_remember_esmtp; /* For YAEB */ | |
133 | extern uschar *tls_require_ciphers; /* So some can be avoided */ | |
b10c87b3 JH |
134 | # ifdef EXPERIMENTAL_TLS_RESUME |
135 | extern uschar *tls_resumption_hosts; /* TLS session resumption */ | |
136 | # endif | |
059ec3d9 PH |
137 | extern uschar *tls_try_verify_hosts; /* Optional client verification */ |
138 | extern uschar *tls_verify_certificates;/* Path for certificates to check */ | |
139 | extern uschar *tls_verify_hosts; /* Mandatory client verification */ | |
140 | #endif | |
23f3dc67 | 141 | extern uschar *tls_advertise_hosts; /* host for which TLS is advertised */ |
059ec3d9 | 142 | |
6c1c3d1d WB |
143 | extern uschar *dsn_envid; /* DSN envid string */ |
144 | extern int dsn_ret; /* DSN ret type*/ | |
145 | extern const pcre *regex_DSN; /* For recognizing DSN settings */ | |
6c1c3d1d | 146 | extern uschar *dsn_advertise_hosts; /* host for which TLS is advertised */ |
059ec3d9 PH |
147 | |
148 | /* Input-reading functions for messages, so we can use special ones for | |
149 | incoming TCP/IP. */ | |
150 | ||
bd8fbe36 | 151 | extern int (*lwr_receive_getc)(unsigned); |
0d81dabc | 152 | extern uschar * (*lwr_receive_getbuf)(unsigned *); |
7e3ce68e | 153 | extern int (*lwr_receive_ungetc)(int); |
bd8fbe36 | 154 | extern int (*receive_getc)(unsigned); |
0d81dabc | 155 | extern uschar * (*receive_getbuf)(unsigned *); |
584e96c6 | 156 | extern void (*receive_get_cache)(void); |
059ec3d9 PH |
157 | extern int (*receive_ungetc)(int); |
158 | extern int (*receive_feof)(void); | |
159 | extern int (*receive_ferror)(void); | |
58eb016e | 160 | extern BOOL (*receive_smtp_buffered)(void); |
059ec3d9 PH |
161 | |
162 | ||
163 | /* For clearing, saving, restoring address expansion variables. We have to have | |
164 | the size of this vector set explicitly, because it is referenced from more than | |
165 | one module. */ | |
166 | ||
55414b25 | 167 | extern const uschar **address_expansions[ADDRESS_EXPANSIONS_COUNT]; |
059ec3d9 | 168 | |
8768d548 JH |
169 | /* Flags for which we don't need an address ever so can use a bitfield */ |
170 | ||
171 | extern struct global_flags { | |
172 | BOOL acl_temp_details :1; /* TRUE to give details for 4xx error */ | |
173 | BOOL active_local_from_check :1; /* For adding Sender: (switchable) */ | |
174 | BOOL active_local_sender_retain :1; /* For keeping Sender: (switchable) */ | |
175 | BOOL address_test_mode :1; /* True for -bt */ | |
176 | BOOL admin_user :1; /* True if caller can do admin */ | |
177 | BOOL allow_auth_unadvertised :1; /* As it says */ | |
178 | BOOL allow_unqualified_recipient :1; /* For local messages */ /* As it says */ | |
179 | BOOL allow_unqualified_sender :1; /* Reset for SMTP */ /* Ditto */ | |
180 | BOOL authentication_local :1; /* TRUE if non-smtp (implicit authentication) */ | |
181 | ||
182 | BOOL background_daemon :1; /* Set FALSE to keep in foreground */ | |
183 | ||
184 | BOOL chunking_offered :1; | |
185 | BOOL config_changed :1; /* True if -C used */ | |
186 | BOOL continue_more :1; /* Flag more addresses waiting */ | |
187 | ||
188 | BOOL daemon_listen :1; /* True if listening required */ | |
189 | BOOL debug_daemon :1; /* Debug the daemon process only */ | |
190 | BOOL deliver_firsttime :1; /* True for first delivery attempt */ | |
191 | BOOL deliver_force :1; /* TRUE if delivery was forced */ | |
192 | BOOL deliver_freeze :1; /* TRUE if delivery is frozen */ | |
193 | BOOL deliver_force_thaw :1; /* TRUE to force thaw in queue run */ | |
194 | BOOL deliver_manual_thaw :1; /* TRUE if manually thawed */ | |
195 | BOOL deliver_selectstring_regex :1; /* String is regex */ | |
196 | BOOL deliver_selectstring_sender_regex :1; /* String is regex */ | |
197 | BOOL disable_callout_flush :1; /* Don't flush before callouts */ | |
198 | BOOL disable_delay_flush :1; /* Don't flush before "delay" in ACL */ | |
199 | BOOL disable_logging :1; /* Disables log writing when TRUE */ | |
200 | #ifndef DISABLE_DKIM | |
201 | BOOL dkim_disable_verify :1; /* Set via ACL control statement. When set, DKIM verification is disabled for the current message */ | |
d85cdeb5 | 202 | BOOL dkim_init_done :1; /* lazy-init status */ |
8768d548 | 203 | #endif |
1a2e76e1 | 204 | #ifdef SUPPORT_DMARC |
8768d548 JH |
205 | BOOL dmarc_has_been_checked :1; /* Global variable to check if test has been called yet */ |
206 | BOOL dmarc_disable_verify :1; /* Set via ACL control statement. When set, DMARC verification is disabled for the current message */ | |
207 | BOOL dmarc_enable_forensic :1; /* Set via ACL control statement. When set, DMARC forensic reports are enabled for the current message */ | |
208 | #endif | |
209 | BOOL dont_deliver :1; /* TRUE for -N option */ | |
210 | BOOL dot_ends :1; /* TRUE if "." ends non-SMTP input */ | |
211 | ||
212 | BOOL enable_dollar_recipients :1; /* Make $recipients available */ | |
213 | BOOL expand_string_forcedfail :1; /* TRUE if failure was "expected" */ | |
214 | ||
215 | BOOL filter_running :1; /* TRUE while running a filter */ | |
216 | ||
217 | BOOL header_rewritten :1; /* TRUE if header changed by router */ | |
218 | BOOL helo_verified :1; /* True if HELO verified */ | |
219 | BOOL helo_verify_failed :1; /* True if attempt failed */ | |
220 | BOOL host_checking_callout :1; /* TRUE if real callout wanted */ | |
221 | BOOL host_find_failed_syntax :1; /* DNS syntax check failure */ | |
222 | ||
223 | BOOL inetd_wait_mode :1; /* Whether running in inetd wait mode */ | |
224 | BOOL is_inetd :1; /* True for inetd calls */ | |
225 | ||
226 | BOOL local_error_message :1; /* True if handling one of these */ | |
227 | BOOL log_testing_mode :1; /* TRUE in various testing modes */ | |
228 | ||
229 | #ifdef WITH_CONTENT_SCAN | |
230 | BOOL no_mbox_unspool :1; /* don't unlink files in /scan directory */ | |
231 | #endif | |
232 | BOOL no_multiline_responses :1; /* For broken clients */ | |
233 | ||
234 | BOOL parse_allow_group :1; /* Allow group syntax */ | |
235 | BOOL parse_found_group :1; /* In the middle of a group */ | |
236 | BOOL pipelining_enable :1; /* As it says */ | |
237 | #if defined(SUPPORT_PROXY) || defined(SUPPORT_SOCKS) | |
238 | BOOL proxy_session_failed :1; /* TRUE if required proxy negotiation failed */ | |
239 | #endif | |
240 | ||
241 | BOOL queue_2stage :1; /* Run queue in 2-stage manner */ | |
242 | BOOL queue_only_policy :1; /* ACL or local_scan wants queue_only */ | |
243 | BOOL queue_run_first_delivery :1; /* If TRUE, first deliveries only */ | |
244 | BOOL queue_run_force :1; /* TRUE to force during queue run */ | |
245 | BOOL queue_run_local :1; /* Local deliveries only in queue run */ | |
246 | BOOL queue_running :1; /* TRUE for queue running process and */ | |
247 | BOOL queue_smtp :1; /* Disable all immediate SMTP (-odqs)*/ | |
248 | ||
249 | BOOL really_exim :1; /* FALSE in utilities */ | |
250 | BOOL receive_call_bombout :1; /* Flag for crashing log */ | |
251 | BOOL recipients_discarded :1; /* By an ACL */ | |
252 | BOOL running_in_test_harness :1; /*TRUE when running_status is patched */ | |
253 | ||
254 | BOOL search_find_defer :1; /* Set TRUE if lookup deferred */ | |
255 | BOOL sender_address_forced :1; /* Set by -f */ | |
256 | BOOL sender_host_notsocket :1; /* Set for -bs and -bS */ | |
257 | BOOL sender_host_unknown :1; /* TRUE for -bs and -bS except inetd */ | |
258 | BOOL sender_local :1; /* TRUE for local senders */ | |
259 | BOOL sender_name_forced :1; /* Set by -F */ | |
260 | BOOL sender_set_untrusted :1; /* Sender set by untrusted caller */ | |
261 | BOOL smtp_authenticated :1; /* Sending client has authenticated */ | |
81344b40 | 262 | #ifndef DISABLE_PIPE_CONNECT |
ee8b8090 JH |
263 | BOOL smtp_in_early_pipe_advertised :1; /* server advertised PIPE_CONNECT */ |
264 | BOOL smtp_in_early_pipe_no_auth :1; /* too many authenticator names */ | |
265 | BOOL smtp_in_early_pipe_used :1; /* client did send early data */ | |
266 | #endif | |
8768d548 JH |
267 | BOOL smtp_in_pipelining_advertised :1; /* server advertised PIPELINING */ |
268 | BOOL smtp_in_pipelining_used :1; /* server noted client using PIPELINING */ | |
269 | BOOL spool_file_wireformat :1; /* current -D file has CRLF rather than NL */ | |
270 | BOOL submission_mode :1; /* Can be forced from ACL */ | |
271 | BOOL suppress_local_fixups :1; /* Can be forced from ACL */ | |
272 | BOOL suppress_local_fixups_default :1; /* former is reset to this; override with -G */ | |
273 | BOOL synchronous_delivery :1; /* TRUE if -odi is set */ | |
274 | BOOL system_filtering :1; /* TRUE when running system filter */ | |
275 | ||
276 | BOOL tcp_fastopen_ok :1; /* appears to be supported by kernel */ | |
277 | BOOL tcp_in_fastopen :1; /* conn usefully used fastopen */ | |
ee8b8090 | 278 | BOOL tcp_in_fastopen_data :1; /* fastopen carried data */ |
8768d548 JH |
279 | BOOL tcp_in_fastopen_logged :1; /* one-time logging */ |
280 | BOOL tcp_out_fastopen_logged :1; /* one-time logging */ | |
281 | BOOL timestamps_utc :1; /* Use UTC for all times */ | |
282 | BOOL transport_filter_timed_out :1; /* True if it did */ | |
283 | BOOL trusted_caller :1; /* Caller is trusted */ | |
284 | BOOL trusted_config :1; /* Configuration file is trusted */ | |
285 | } f; | |
286 | ||
287 | ||
059ec3d9 PH |
288 | /* General global variables */ |
289 | ||
290 | extern BOOL accept_8bitmime; /* Allow *BITMIME incoming */ | |
bc3c7bb7 | 291 | extern uschar *add_environment; /* List of environment variables to add */ |
71fafd95 | 292 | extern header_line *acl_added_headers; /* Headers added by an ACL */ |
059ec3d9 | 293 | extern tree_node *acl_anchor; /* Tree of named ACLs */ |
525239c1 JH |
294 | extern uschar *acl_arg[9]; /* Argument to ACL call */ |
295 | extern int acl_narg; /* Number of arguments to ACL call */ | |
e1d04f48 | 296 | extern int acl_level; /* Nesting depth and debug indent */ |
059ec3d9 | 297 | extern uschar *acl_not_smtp; /* ACL run for non-SMTP messages */ |
54cdb463 PH |
298 | #ifdef WITH_CONTENT_SCAN |
299 | extern uschar *acl_not_smtp_mime; /* For MIME parts of ditto */ | |
300 | #endif | |
45b91596 | 301 | extern uschar *acl_not_smtp_start; /* ACL run at the beginning of a non-SMTP session */ |
e7568d51 | 302 | extern uschar *acl_removed_headers; /* Headers deleted by an ACL */ |
059ec3d9 PH |
303 | extern uschar *acl_smtp_auth; /* ACL run for AUTH */ |
304 | extern uschar *acl_smtp_connect; /* ACL run on SMTP connection */ | |
305 | extern uschar *acl_smtp_data; /* ACL run after DATA received */ | |
8ccd00b1 | 306 | #ifndef DISABLE_PRDR |
fd98a5c6 JH |
307 | extern uschar *acl_smtp_data_prdr; /* ACL run after DATA received if in PRDR mode*/ |
308 | const extern pcre *regex_PRDR; /* For recognizing PRDR settings */ | |
309 | #endif | |
80a47a2c TK |
310 | #ifndef DISABLE_DKIM |
311 | extern uschar *acl_smtp_dkim; /* ACL run for DKIM signatures / domains */ | |
312 | #endif | |
059ec3d9 PH |
313 | extern uschar *acl_smtp_etrn; /* ACL run for ETRN */ |
314 | extern uschar *acl_smtp_expn; /* ACL run for EXPN */ | |
315 | extern uschar *acl_smtp_helo; /* ACL run for HELO/EHLO */ | |
316 | extern uschar *acl_smtp_mail; /* ACL run for MAIL */ | |
317 | extern uschar *acl_smtp_mailauth; /* ACL run for MAIL AUTH */ | |
8523533c TK |
318 | #ifdef WITH_CONTENT_SCAN |
319 | extern uschar *acl_smtp_mime; /* ACL run after DATA, before acl_smtp_data, for each MIME part */ | |
320 | #endif | |
8f128379 | 321 | extern uschar *acl_smtp_notquit; /* ACL run for disconnects */ |
059ec3d9 PH |
322 | extern uschar *acl_smtp_predata; /* ACL run for DATA command */ |
323 | extern uschar *acl_smtp_quit; /* ACL run for QUIT */ | |
324 | extern uschar *acl_smtp_rcpt; /* ACL run for RCPT */ | |
325 | extern uschar *acl_smtp_starttls; /* ACL run for STARTTLS */ | |
326 | extern uschar *acl_smtp_vrfy; /* ACL run for VRFY */ | |
38a0a95f | 327 | extern tree_node *acl_var_c; /* ACL connection variables */ |
85ffcba6 | 328 | extern tree_node *acl_var_m; /* ACL message variables */ |
059ec3d9 | 329 | extern uschar *acl_verify_message; /* User message for verify failure */ |
059ec3d9 | 330 | extern string_item *acl_warn_logged; /* Logged lines */ |
a5bd321b | 331 | extern uschar *acl_wherecodes[]; /* Response codes for ACL fails */ |
059ec3d9 PH |
332 | extern uschar *acl_wherenames[]; /* Names for messages */ |
333 | extern address_item *addr_duplicate; /* Duplicate address list */ | |
334 | extern address_item address_defaults; /* Default data for address item */ | |
335 | extern uschar *address_file; /* Name of file when delivering to one */ | |
336 | extern uschar *address_pipe; /* Pipe command when delivering to one */ | |
059ec3d9 PH |
337 | extern tree_node *addresslist_anchor; /* Tree of defined address lists */ |
338 | extern int addresslist_count; /* Number defined */ | |
339 | extern gid_t *admin_groups; /* List of admin groups */ | |
059ec3d9 PH |
340 | extern BOOL allow_domain_literals; /* As it says */ |
341 | extern BOOL allow_mx_to_ip; /* Allow MX records to -> ip address */ | |
617d3932 JH |
342 | #ifdef EXPERIMENTAL_ARC |
343 | struct arc_set *arc_received; /* highest ARC instance evaluation struct */ | |
344 | extern int arc_received_instance; /* highest ARC instance number in headers */ | |
345 | extern int arc_oldest_pass; /* lowest passing instance number in headers */ | |
346 | extern const uschar *arc_state; /* verification state */ | |
93c931f8 | 347 | extern const uschar *arc_state_reason; |
617d3932 | 348 | #endif |
059ec3d9 | 349 | extern BOOL allow_utf8_domains; /* For experimenting */ |
2d07a215 | 350 | extern uschar *authenticated_fail_id; /* ID that failed authentication */ |
059ec3d9 PH |
351 | extern uschar *authenticated_id; /* ID that was authenticated */ |
352 | extern uschar *authenticated_sender; /* From AUTH on MAIL */ | |
353 | extern BOOL authentication_failed; /* TRUE if AUTH was tried and failed */ | |
354 | extern uschar *auth_advertise_hosts; /* Only advertise to these */ | |
355 | extern auth_info auths_available[]; /* Vector of available auth mechanisms */ | |
356 | extern auth_instance *auths; /* Chain of instantiated auths */ | |
357 | extern auth_instance auth_defaults; /* Default values */ | |
358 | extern uschar *auth_defer_msg; /* Error message for log */ | |
359 | extern uschar *auth_defer_user_msg; /* Error message for user */ | |
f78eb7c6 | 360 | extern uschar *auth_vars[]; /* $authn variables */ |
059ec3d9 | 361 | extern int auto_thaw; /* Auto-thaw interval */ |
8523533c | 362 | #ifdef WITH_CONTENT_SCAN |
8768d548 | 363 | extern int av_failed; /* TRUE if the AV process failed */ |
8523533c TK |
364 | extern uschar *av_scanner; /* AntiVirus scanner to use for the malware condition */ |
365 | #endif | |
059ec3d9 | 366 | |
059ec3d9 PH |
367 | extern uschar *base62_chars; /* Table of base-62 characters */ |
368 | extern uschar *bi_command; /* Command for -bi option */ | |
369 | extern uschar *big_buffer; /* Used for various temp things */ | |
370 | extern int big_buffer_size; /* Current size (can expand) */ | |
8523533c TK |
371 | #ifdef EXPERIMENTAL_BRIGHTMAIL |
372 | extern uschar *bmi_alt_location; /* expansion variable that contains the alternate location for the rcpt (available during routing) */ | |
373 | extern uschar *bmi_base64_tracker_verdict; /* expansion variable with base-64 encoded OLD verdict string (available during routing) */ | |
374 | extern uschar *bmi_base64_verdict; /* expansion variable with base-64 encoded verdict string (available during routing) */ | |
375 | extern uschar *bmi_config_file; /* Brightmail config file */ | |
376 | extern int bmi_deliver; /* Flag that determines if the message should be delivered to the rcpt (available during routing) */ | |
377 | extern int bmi_run; /* Flag that determines if message should be run through Brightmail server */ | |
378 | extern uschar *bmi_verdicts; /* BASE64-encoded verdicts with recipient lists */ | |
379 | #endif | |
32b8ce41 | 380 | extern int bsmtp_transaction_linecount; /* Start of last transaction */ |
939c3e34 | 381 | extern int body_8bitmime; /* sender declared BODY= ; 7=7BIT, 8=8BITMIME */ |
059ec3d9 PH |
382 | extern uschar *bounce_message_file; /* Template file */ |
383 | extern uschar *bounce_message_text; /* One-liner */ | |
384 | extern uschar *bounce_recipient; /* When writing an errmsg */ | |
385 | extern BOOL bounce_return_body; /* Include body in returned message */ | |
62b7cd08 | 386 | extern int bounce_return_linesize_limit; /* Max line length in return */ |
059ec3d9 PH |
387 | extern BOOL bounce_return_message; /* Include message in bounce */ |
388 | extern int bounce_return_size_limit; /* Max amount to return */ | |
389 | extern uschar *bounce_sender_authentication; /* AUTH address for bounces */ | |
059ec3d9 | 390 | |
055e2cb4 | 391 | extern uschar *callout_address; /* Address used for a malware/spamd/verify etc. callout */ |
059ec3d9 PH |
392 | extern int callout_cache_domain_positive_expire; /* Time for positive domain callout cache records to expire */ |
393 | extern int callout_cache_domain_negative_expire; /* Time for negative domain callout cache records to expire */ | |
394 | extern int callout_cache_positive_expire; /* Time for positive callout cache records to expire */ | |
395 | extern int callout_cache_negative_expire; /* Time for negative callout cache records to expire */ | |
396 | extern uschar *callout_random_local_part; /* Local part to be used to check if server called will accept any local part */ | |
397 | extern uschar *check_dns_names_pattern;/* Regex for syntax check */ | |
398 | extern int check_log_inodes; /* Minimum for message acceptance */ | |
a45431fa | 399 | extern int_eximarith_t check_log_space; /* Minimum for message acceptance */ |
a0d6ba8a | 400 | extern BOOL check_rfc2047_length; /* Check RFC 2047 encoded string length */ |
059ec3d9 | 401 | extern int check_spool_inodes; /* Minimum for message acceptance */ |
a45431fa | 402 | extern int_eximarith_t check_spool_space; /* Minimum for message acceptance */ |
aa368db3 | 403 | extern uschar *chunking_advertise_hosts; /* RFC 3030 CHUNKING */ |
18481de3 | 404 | extern unsigned chunking_datasize; |
7e3ce68e | 405 | extern unsigned chunking_data_left; |
18481de3 | 406 | extern chunking_state_t chunking_state; |
c8e2fc1e JH |
407 | extern uschar *client_authenticator; /* Authenticator name used for smtp delivery */ |
408 | extern uschar *client_authenticated_id; /* "login" name used for SMTP AUTH */ | |
409 | extern uschar *client_authenticated_sender; /* AUTH option to SMTP MAIL FROM (not yet used) */ | |
059ec3d9 PH |
410 | extern int clmacro_count; /* Number of command line macros */ |
411 | extern uschar *clmacros[]; /* Copy of them, for re-exec */ | |
f33875c3 | 412 | extern BOOL commandline_checks_require_admin; /* belt and braces for insecure setups */ |
059ec3d9 | 413 | extern int connection_max_messages;/* Max down one SMTP connection */ |
059ec3d9 | 414 | extern FILE *config_file; /* Configuration file */ |
18d6b513 | 415 | extern const uschar *config_filename; /* Configuration file name */ |
35edf2ff | 416 | extern gid_t config_gid; /* Additional group owner */ |
059ec3d9 PH |
417 | extern int config_lineno; /* Line number */ |
418 | extern uschar *config_main_filelist; /* List of possible config files */ | |
419 | extern uschar *config_main_filename; /* File name actually used */ | |
98b8312f | 420 | extern uschar *config_main_directory; /* Directory where the main config file was found */ |
059ec3d9 | 421 | extern uid_t config_uid; /* Additional owner */ |
5013d912 | 422 | extern uschar *continue_proxy_cipher; /* TLS cipher for proxied continued delivery */ |
059ec3d9 PH |
423 | extern uschar *continue_hostname; /* Host for continued delivery */ |
424 | extern uschar *continue_host_address; /* IP address for ditto */ | |
059ec3d9 PH |
425 | extern int continue_sequence; /* Sequence num for continued delivery */ |
426 | extern uschar *continue_transport; /* Transport for continued delivery */ | |
427 | ||
e5a9dba6 | 428 | extern uschar *csa_status; /* Client SMTP Authorization result */ |
5032d1cf JH |
429 | |
430 | typedef struct { | |
57cc2785 | 431 | unsigned callout_hold_only:1; /* Conn is only for verify callout */ |
ff5929e3 | 432 | unsigned delivery:1; /* When to attempt */ |
4c04137d | 433 | unsigned defer_pass:1; /* Pass 4xx to caller rather than spooling */ |
57cc2785 | 434 | unsigned is_tls:1; /* Conn has TLS active */ |
74f1a423 | 435 | client_conn_ctx cctx; /* Open connection */ |
5032d1cf | 436 | int nrcpt; /* Count of addresses */ |
57cc2785 | 437 | uschar * transport; /* Name of transport */ |
5032d1cf | 438 | uschar * interface; /* (address of) */ |
57cc2785 JH |
439 | uschar * snd_ip; /* sending_ip_address */ |
440 | int snd_port; /* sending_port */ | |
441 | unsigned peer_options; /* smtp_peer_options */ | |
5032d1cf JH |
442 | host_item host; /* Host used */ |
443 | address_item addr; /* (Chain of) addresses */ | |
444 | } cut_t; | |
445 | extern cut_t cutthrough; /* Deliver-concurrently */ | |
e5a9dba6 | 446 | |
059ec3d9 | 447 | extern uschar *daemon_smtp_port; /* Can be a list of ports */ |
4aee0225 PH |
448 | extern int daemon_startup_retries; /* Number of times to retry */ |
449 | extern int daemon_startup_sleep; /* Sleep between retries */ | |
6a8f9482 TK |
450 | |
451 | #ifdef EXPERIMENTAL_DCC | |
452 | extern BOOL dcc_direct_add_header; /* directly add header */ | |
453 | extern uschar *dcc_header; /* dcc header */ | |
454 | extern uschar *dcc_result; /* dcc result */ | |
455 | extern uschar *dccifd_address; /* address of the dccifd daemon */ | |
456 | extern uschar *dccifd_options; /* options for the dccifd daemon */ | |
457 | #endif | |
458 | ||
059ec3d9 PH |
459 | extern int debug_fd; /* The fd for debug_file */ |
460 | extern FILE *debug_file; /* Where to write debugging info */ | |
6c6d6e48 | 461 | extern int debug_notall[]; /* Debug options excluded from +all */ |
059ec3d9 PH |
462 | extern bit_table debug_options[]; /* Table of debug options */ |
463 | extern int debug_options_count; /* Size of table */ | |
64073d9c | 464 | extern BOOL debug_store; /* Do extra checks on store_reset */ |
059ec3d9 PH |
465 | extern int delay_warning[]; /* Times between warnings */ |
466 | extern uschar *delay_warning_condition; /* Condition string for warnings */ | |
467 | extern BOOL delivery_date_remove; /* Remove delivery-date headers */ | |
468 | ||
469 | extern uschar *deliver_address_data; /* Arbitrary data for an address */ | |
470 | extern int deliver_datafile; /* FD for data part of message */ | |
55414b25 | 471 | extern const uschar *deliver_domain; /* The local domain for delivery */ |
059ec3d9 | 472 | extern uschar *deliver_domain_data; /* From domain lookup */ |
55414b25 JH |
473 | extern const uschar *deliver_domain_orig; /* The original local domain for delivery */ |
474 | extern const uschar *deliver_domain_parent; /* The parent domain for delivery */ | |
059ec3d9 | 475 | extern BOOL deliver_drop_privilege; /* TRUE for unprivileged delivery */ |
19050083 | 476 | extern time_t deliver_frozen_at; /* Time of freezing */ |
059ec3d9 | 477 | extern uschar *deliver_home; /* Home directory for pipes */ |
55414b25 | 478 | extern const uschar *deliver_host; /* (First) host for routed local deliveries */ |
059ec3d9 | 479 | /* Remote host for filter */ |
55414b25 | 480 | extern const uschar *deliver_host_address; /* Address for remote delivery filter */ |
a7538db1 | 481 | extern int deliver_host_port; /* Address for remote delivery filter */ |
059ec3d9 PH |
482 | extern uschar *deliver_in_buffer; /* Buffer for copying file */ |
483 | extern ino_t deliver_inode; /* Inode for appendfile */ | |
484 | extern uschar *deliver_localpart; /* The local part for delivery */ | |
485 | extern uschar *deliver_localpart_data; /* From local part lookup */ | |
486 | extern uschar *deliver_localpart_orig; /* The original local part for delivery */ | |
487 | extern uschar *deliver_localpart_parent; /* The parent local part for delivery */ | |
488 | extern uschar *deliver_localpart_prefix; /* The stripped prefix, if any */ | |
489 | extern uschar *deliver_localpart_suffix; /* The stripped suffix, if any */ | |
059ec3d9 PH |
490 | extern uschar *deliver_out_buffer; /* Buffer for copying file */ |
491 | extern int deliver_queue_load_max; /* Different value for queue running */ | |
492 | extern address_item *deliver_recipients; /* Current set of addresses */ | |
493 | extern uschar *deliver_selectstring; /* For selecting by recipient */ | |
059ec3d9 | 494 | extern uschar *deliver_selectstring_sender; /* For selecting by sender */ |
54fc8428 PH |
495 | #ifdef ENABLE_DISABLE_FSYNC |
496 | extern BOOL disable_fsync; /* Not for normal use */ | |
497 | #endif | |
7e66e54d | 498 | extern BOOL disable_ipv6; /* Don't do any IPv6 things */ |
059ec3d9 | 499 | |
80a47a2c | 500 | #ifndef DISABLE_DKIM |
aded2255 | 501 | extern unsigned dkim_collect_input; /* Runtime count of dkim signtures; tracks whether SMTP input is fed to DKIM validation */ |
2df588c9 | 502 | extern uschar *dkim_cur_signer; /* Expansion variable, holds the current "signer" domain or identity during a acl_smtp_dkim run */ |
abe1010c | 503 | extern int dkim_key_length; /* Expansion variable, length of signing key in bits */ |
b4757e36 | 504 | extern void *dkim_signatures; /* Actually a (pdkim_signature *) but most files do not need to know */ |
9e5d6b55 | 505 | extern uschar *dkim_signers; /* Expansion variable, holds colon-separated list of domains and identities that have signed a message */ |
80a47a2c TK |
506 | extern uschar *dkim_signing_domain; /* Expansion variable, domain used for signing a message. */ |
507 | extern uschar *dkim_signing_selector; /* Expansion variable, selector used for signing a message. */ | |
042e558f JH |
508 | extern uschar *dkim_verify_hashes; /* Preference order for signatures */ |
509 | extern uschar *dkim_verify_keytypes; /* Preference order for signatures */ | |
510 | extern BOOL dkim_verify_minimal; /* Shortcircuit signture verification */ | |
2c47372f | 511 | extern uschar *dkim_verify_overall; /* First successful domain verified, or null */ |
80a47a2c | 512 | extern uschar *dkim_verify_signers; /* Colon-separated list of domains for each of which we call the DKIM ACL */ |
a79d8834 JH |
513 | extern uschar *dkim_verify_status; /* result for this signature */ |
514 | extern uschar *dkim_verify_reason; /* result for this signature */ | |
f7572e5a | 515 | #endif |
1a2e76e1 | 516 | #ifdef SUPPORT_DMARC |
8c8b8274 | 517 | extern uschar *dmarc_domain_policy; /* Expansion for declared policy of used domain */ |
4840604e TL |
518 | extern uschar *dmarc_forensic_sender; /* Set sender address for forensic reports */ |
519 | extern uschar *dmarc_history_file; /* Expansion variable, file to store dmarc results */ | |
520 | extern uschar *dmarc_status; /* Expansion variable, one word value */ | |
521 | extern uschar *dmarc_status_text; /* Expansion variable, human readable value */ | |
522 | extern uschar *dmarc_tld_file; /* Mozilla TLDs text file */ | |
523 | extern uschar *dmarc_used_domain; /* Expansion variable, domain libopendmarc chose for DMARC policy lookup */ | |
4840604e | 524 | #endif |
f7572e5a | 525 | |
059ec3d9 | 526 | extern uschar *dns_again_means_nonexist; /* Domains that are badly set up */ |
e5a9dba6 PH |
527 | extern int dns_csa_search_limit; /* How deep to search for CSA SRV records */ |
528 | extern BOOL dns_csa_use_reverse; /* Check CSA in reverse DNS? (non-standard) */ | |
d8d9f930 | 529 | extern int dns_cname_loops; /* Follow CNAMEs returned by resolver to this depth */ |
059ec3d9 | 530 | extern uschar *dns_ipv4_lookup; /* For these domains, don't look for AAAA (or A6) */ |
c0635b6d | 531 | #ifdef SUPPORT_DANE |
e682570f TL |
532 | extern int dns_dane_ok; /* Ok to use DANE when checking TLS authenticity */ |
533 | #endif | |
059ec3d9 PH |
534 | extern int dns_retrans; /* Retransmission time setting */ |
535 | extern int dns_retry; /* Number of retries */ | |
0fbd9bff | 536 | extern int dns_dnssec_ok; /* When constructing DNS query, set DO flag */ |
9820a77f | 537 | extern uschar *dns_trust_aa; /* DNSSEC trust AA as AD */ |
e97d1f08 | 538 | extern int dns_use_edns0; /* Coerce EDNS0 support on/off in resolver. */ |
059ec3d9 | 539 | extern uschar *dnslist_domain; /* DNS (black) list domain */ |
93655c46 | 540 | extern uschar *dnslist_matched; /* DNS (black) list matched key */ |
059ec3d9 PH |
541 | extern uschar *dnslist_text; /* DNS (black) list text message */ |
542 | extern uschar *dnslist_value; /* DNS (black) list IP address */ | |
543 | extern tree_node *domainlist_anchor; /* Tree of defined domain lists */ | |
544 | extern int domainlist_count; /* Number defined */ | |
059ec3d9 PH |
545 | |
546 | /* This option is now a no-opt, retained for compatibility */ | |
547 | extern BOOL drop_cr; /* For broken local MUAs */ | |
548 | ||
0e22dfd1 PH |
549 | extern uschar *dsn_from; /* From: string for DSNs */ |
550 | ||
a207d5dd | 551 | extern BOOL envelope_to_remove; /* Remove envelope_to_headers */ |
059ec3d9 PH |
552 | extern int errno_quota; /* Quota errno in this OS */ |
553 | extern int error_handling; /* Error handling style */ | |
554 | extern uschar *errors_copy; /* For taking copies of errors */ | |
555 | extern uschar *errors_reply_to; /* Reply-to for error messages */ | |
556 | extern int errors_sender_rc; /* Return after message to sender*/ | |
774ef2d7 | 557 | |
0cbf2b82 | 558 | #ifndef DISABLE_EVENT |
774ef2d7 JH |
559 | extern uschar *event_action; /* expansion for delivery events */ |
560 | extern uschar *event_data; /* event data */ | |
561 | extern int event_defer_errno; /* error number set when a remote delivery is deferred with a host error */ | |
55414b25 | 562 | extern const uschar *event_name; /* event classification */ |
774ef2d7 JH |
563 | #endif |
564 | ||
059ec3d9 PH |
565 | extern gid_t exim_gid; /* To be used with exim_uid */ |
566 | extern BOOL exim_gid_set; /* TRUE if exim_gid set */ | |
567 | extern uschar *exim_path; /* Path to exec exim */ | |
98a90c36 | 568 | extern const uschar *exim_sieve_extension_list[]; /* list of sieve extensions */ |
059ec3d9 PH |
569 | extern uid_t exim_uid; /* Non-root uid for exim */ |
570 | extern BOOL exim_uid_set; /* TRUE if exim_uid set */ | |
e1d04f48 | 571 | extern int expand_level; /* Nesting depth; indent for debug */ |
059ec3d9 PH |
572 | extern int expand_forbid; /* RDO flags for forbidding things */ |
573 | extern int expand_nlength[]; /* Lengths of numbered strings */ | |
574 | extern int expand_nmax; /* Max numerical value */ | |
575 | extern uschar *expand_nstring[]; /* Numbered strings */ | |
059ec3d9 PH |
576 | extern BOOL extract_addresses_remove_arguments; /* Controls -t behaviour */ |
577 | extern uschar *extra_local_interfaces; /* Local, non-listen interfaces */ | |
578 | ||
29aba418 TF |
579 | extern int fake_response; /* Fake FAIL or DEFER response to data */ |
580 | extern uschar *fake_response_text; /* User defined message for the above. Default is in globals.c. */ | |
059ec3d9 | 581 | extern int filter_n[FILTER_VARIABLE_COUNT]; /* filter variables */ |
059ec3d9 | 582 | extern int filter_sn[FILTER_VARIABLE_COUNT]; /* variables set by system filter */ |
f05da2e8 PH |
583 | extern int filter_test; /* Filter test type */ |
584 | extern uschar *filter_test_sfile; /* System filter test file */ | |
585 | extern uschar *filter_test_ufile; /* User filter test file */ | |
059ec3d9 PH |
586 | extern uschar *filter_thisaddress; /* For address looping */ |
587 | extern int finduser_retries; /* Retry count for getpwnam() */ | |
588 | extern uid_t fixed_never_users[]; /* Can't be overridden */ | |
589 | extern uschar *freeze_tell; /* Message on (some) freezings */ | |
6a3f1455 | 590 | extern uschar *freeze_tell_config; /* The configured setting */ |
059ec3d9 PH |
591 | extern uschar *fudged_queue_times; /* For use in test harness */ |
592 | ||
593 | extern uschar *gecos_name; /* To be expanded when pattern matches */ | |
594 | extern uschar *gecos_pattern; /* Pattern to match */ | |
595 | extern rewrite_rule *global_rewrite_rules; /* Chain of rewriting rules */ | |
596 | ||
9723f966 JH |
597 | extern volatile sig_atomic_t had_command_timeout; /* Alarm sighandler called */ |
598 | extern volatile sig_atomic_t had_command_sigterm; /* TERM sighandler called */ | |
599 | extern volatile sig_atomic_t had_data_timeout; /* Alarm sighandler called */ | |
600 | extern volatile sig_atomic_t had_data_sigint; /* TERM/INT sighandler called */ | |
059ec3d9 PH |
601 | extern int header_insert_maxlen; /* Max for inserting headers */ |
602 | extern int header_maxsize; /* Max total length for header */ | |
603 | extern int header_line_maxsize; /* Max for an individual line */ | |
604 | extern header_name header_names[]; /* Table of header names */ | |
605 | extern int header_names_size; /* Number of entries */ | |
059ec3d9 PH |
606 | extern uschar *helo_accept_junk_hosts; /* Allowed to use junk arg */ |
607 | extern uschar *helo_allow_chars; /* Rogue chars to allow in HELO/EHLO */ | |
608 | extern uschar *helo_lookup_domains; /* If these given, lookup host name */ | |
609 | extern uschar *helo_try_verify_hosts; /* Soft check HELO argument for these */ | |
059ec3d9 | 610 | extern uschar *helo_verify_hosts; /* Hard check HELO argument for these */ |
1ba28e2b | 611 | extern const uschar *hex_digits; /* Used in several places */ |
059ec3d9 | 612 | extern uschar *hold_domains; /* Hold up deliveries to these */ |
059ec3d9 PH |
613 | extern uschar *host_data; /* Obtained from lookup in ACL */ |
614 | extern uschar *host_lookup; /* For which IP addresses are always looked up */ | |
b08b24c8 | 615 | extern BOOL host_lookup_deferred; /* TRUE if lookup deferred */ |
059ec3d9 PH |
616 | extern BOOL host_lookup_failed; /* TRUE if lookup failed */ |
617 | extern uschar *host_lookup_order; /* Order of host lookup types */ | |
618 | extern uschar *host_lookup_msg; /* Text for why it failed */ | |
619 | extern int host_number; /* For sharing spools */ | |
620 | extern uschar *host_number_string; /* For expanding */ | |
621 | extern uschar *host_reject_connection; /* Reject these hosts */ | |
622 | extern tree_node *hostlist_anchor; /* Tree of defined host lists */ | |
623 | extern int hostlist_count; /* Number defined */ | |
624 | extern uschar *hosts_connection_nolog; /* Limits the logging option */ | |
625 | extern uschar *hosts_treat_as_local; /* For routing */ | |
626 | ||
627 | extern int ignore_bounce_errors_after; /* Keep them for this time. */ | |
628 | extern BOOL ignore_fromline_local; /* Local SMTP ignore fromline */ | |
629 | extern uschar *ignore_fromline_hosts; /* Hosts permitted to send "From " */ | |
9ee44efb | 630 | extern int inetd_wait_timeout; /* Timeout for inetd wait mode */ |
3615fa9a | 631 | extern uschar *initial_cwd; /* The directory we where in at startup */ |
0ce9abe6 | 632 | extern uschar *iterate_item; /* Item from iterate list */ |
059ec3d9 PH |
633 | |
634 | extern int journal_fd; /* Fd for journal file */ | |
635 | ||
bc3c7bb7 | 636 | extern uschar *keep_environment; /* Whitelist for environment variables */ |
059ec3d9 PH |
637 | extern int keep_malformed; /* Time to keep malformed messages */ |
638 | ||
639 | extern uschar *eldap_dn; /* Where LDAP DNs are left */ | |
640 | extern int load_average; /* Most recently read load average */ | |
69358f02 | 641 | extern BOOL local_from_check; /* For adding Sender: (global value) */ |
059ec3d9 PH |
642 | extern uschar *local_from_prefix; /* Permitted prefixes */ |
643 | extern uschar *local_from_suffix; /* Permitted suffixes */ | |
644 | extern uschar *local_interfaces; /* For forcing specific interfaces */ | |
9723f966 | 645 | #ifdef HAVE_LOCAL_SCAN |
059ec3d9 PH |
646 | extern uschar *local_scan_data; /* Text returned by local_scan() */ |
647 | extern optionlist local_scan_options[];/* Option list for local_scan() */ | |
648 | extern int local_scan_options_count; /* Size of the list */ | |
649 | extern int local_scan_timeout; /* Timeout for local_scan() */ | |
9723f966 | 650 | #endif |
059ec3d9 PH |
651 | extern BOOL local_sender_retain; /* Retain Sender: (with no From: check) */ |
652 | extern gid_t local_user_gid; /* As it says; may be set in routers */ | |
653 | extern uid_t local_user_uid; /* As it says; may be set in routers */ | |
654 | extern tree_node *localpartlist_anchor;/* Tree of defined localpart lists */ | |
655 | extern int localpartlist_count; /* Number defined */ | |
656 | extern uschar *log_buffer; /* For constructing log entries */ | |
6c6d6e48 | 657 | extern int log_default[]; /* Initialization list for log_selector */ |
059ec3d9 | 658 | extern uschar *log_file_path; /* If unset, use default */ |
6c6d6e48 | 659 | extern int log_notall[]; /* Log options excluded from +all */ |
059ec3d9 PH |
660 | extern bit_table log_options[]; /* Table of options */ |
661 | extern int log_options_count; /* Size of table */ | |
6ea85e9a | 662 | extern int log_reject_target; /* Target log for ACL rejections */ |
6c6d6e48 | 663 | extern unsigned int log_selector[]; /* Bit map of logging options */ |
059ec3d9 PH |
664 | extern uschar *log_selector_string; /* As supplied in the config */ |
665 | extern FILE *log_stderr; /* Copy of stderr for log use, or NULL */ | |
059ec3d9 PH |
666 | extern BOOL log_timezone; /* TRUE to include the timezone in log lines */ |
667 | extern uschar *login_sender_address; /* The actual sender address */ | |
e6d225ae | 668 | extern lookup_info **lookup_list; /* Array of pointers to available lookups */ |
059ec3d9 | 669 | extern int lookup_list_count; /* Number of entries in the list */ |
4e0983dc | 670 | extern uschar *lookup_dnssec_authenticated; /* AD status of dns lookup */ |
059ec3d9 PH |
671 | extern int lookup_open_max; /* Max lookup files to cache */ |
672 | extern uschar *lookup_value; /* Value looked up from file */ | |
673 | ||
1a7c9a48 | 674 | extern macro_item *macros; /* Configuration macros */ |
85e03244 | 675 | extern macro_item *macros_user; /* Non-builtin configuration macros */ |
1a7c9a48 | 676 | extern macro_item *mlast; /* Last item in macro list */ |
059ec3d9 | 677 | extern uschar *mailstore_basename; /* For mailstore deliveries */ |
8523533c TK |
678 | #ifdef WITH_CONTENT_SCAN |
679 | extern uschar *malware_name; /* Name of virus or malware ("W32/Klez-H") */ | |
680 | #endif | |
d677b2f2 | 681 | extern int max_received_linelength;/* What it says */ |
059ec3d9 PH |
682 | extern int max_username_length; /* For systems with broken getpwnam() */ |
683 | extern int message_age; /* In seconds */ | |
684 | extern uschar *message_body; /* Start of message body for filter */ | |
685 | extern uschar *message_body_end; /* End of message body for filter */ | |
ddea74fa | 686 | extern BOOL message_body_newlines; /* FALSE => remove newlines */ |
059ec3d9 PH |
687 | extern int message_body_size; /* Sic */ |
688 | extern int message_body_visible; /* Amount visible in message_body */ | |
689 | extern int message_ended; /* State of message reading and how ended */ | |
690 | extern uschar *message_headers; /* When built */ | |
691 | extern uschar message_id_option[]; /* -E<message-id> for use as option */ | |
692 | extern uschar *message_id_external; /* External form of following */ | |
693 | extern uschar *message_id_domain; /* Expanded to form domain-part of message_id */ | |
694 | extern uschar *message_id_text; /* Expanded to form message_id */ | |
695 | extern struct timeval message_id_tv; /* Time used to create last message_id */ | |
696 | extern int message_linecount; /* As it says */ | |
697 | extern BOOL message_logs; /* TRUE to write message logs */ | |
698 | extern int message_size; /* Size of message */ | |
699 | extern uschar *message_size_limit; /* As it says */ | |
8c5d388a | 700 | #ifdef SUPPORT_I18N |
eb02f5df | 701 | extern BOOL message_smtputf8; /* Internationalized mail handling */ |
3c8b3577 | 702 | extern int message_utf8_downconvert; /* convert from utf8 */ |
7ade712c | 703 | const extern pcre *regex_UTF8; /* For recognizing SMTPUTF8 settings */ |
eb02f5df | 704 | #endif |
059ec3d9 PH |
705 | extern uschar message_subdir[]; /* Subdirectory for messages */ |
706 | extern uschar *message_reference; /* Reference for error messages */ | |
8523533c TK |
707 | |
708 | /* MIME ACL expandables */ | |
709 | #ifdef WITH_CONTENT_SCAN | |
710 | extern int mime_anomaly_level; | |
1ba28e2b | 711 | extern const uschar *mime_anomaly_text; |
8523533c TK |
712 | extern uschar *mime_boundary; |
713 | extern uschar *mime_charset; | |
714 | extern uschar *mime_content_description; | |
715 | extern uschar *mime_content_disposition; | |
716 | extern uschar *mime_content_id; | |
717 | extern unsigned int mime_content_size; | |
718 | extern uschar *mime_content_transfer_encoding; | |
719 | extern uschar *mime_content_type; | |
720 | extern uschar *mime_decoded_filename; | |
721 | extern uschar *mime_filename; | |
722 | extern int mime_is_multipart; | |
723 | extern int mime_is_coverletter; | |
724 | extern int mime_is_rfc822; | |
725 | extern int mime_part_count; | |
726 | #endif | |
727 | ||
059ec3d9 PH |
728 | extern BOOL mua_wrapper; /* TRUE when Exim is wrapping an MUA */ |
729 | ||
730 | extern uid_t *never_users; /* List of uids never to be used */ | |
8523533c | 731 | #ifdef WITH_CONTENT_SCAN |
8523533c | 732 | #endif |
059ec3d9 | 733 | |
fb05276a JH |
734 | extern const int on; /* For setsockopt */ |
735 | extern const int off; | |
736 | ||
059ec3d9 PH |
737 | extern optionlist optionlist_auths[]; /* These option lists are made */ |
738 | extern int optionlist_auths_size; /* global so that readconf can */ | |
739 | extern optionlist optionlist_routers[]; /* see them for printing out */ | |
740 | extern int optionlist_routers_size; /* the options. */ | |
741 | extern optionlist optionlist_transports[]; | |
742 | extern int optionlist_transports_size; | |
743 | ||
744 | extern uid_t original_euid; /* Original effective uid */ | |
745 | extern gid_t originator_gid; /* Gid of whoever wrote spool file */ | |
746 | extern uschar *originator_login; /* Login of same */ | |
747 | extern uschar *originator_name; /* Full name of same */ | |
748 | extern uid_t originator_uid; /* Uid of ditto */ | |
749 | extern uschar *override_local_interfaces; /* Value of -oX argument */ | |
750 | extern uschar *override_pid_file_path; /* Value of -oP argument */ | |
751 | ||
059ec3d9 PH |
752 | extern uschar *percent_hack_domains; /* Local domains for which '% operates */ |
753 | extern uschar *pid_file_path; /* For writing daemon pids */ | |
81344b40 | 754 | #ifndef DISABLE_PIPE_CONNECT |
ee8b8090 JH |
755 | extern uschar *pipe_connect_advertise_hosts; /* for banner/EHLO pipelining */ |
756 | #endif | |
059ec3d9 | 757 | extern uschar *pipelining_advertise_hosts; /* As it says */ |
8ccd00b1 | 758 | #ifndef DISABLE_PRDR |
fd98a5c6 JH |
759 | extern BOOL prdr_enable; /* As it says */ |
760 | extern BOOL prdr_requested; /* Connecting mail server wants PRDR */ | |
761 | #endif | |
059ec3d9 PH |
762 | extern BOOL preserve_message_logs; /* Save msglog files */ |
763 | extern uschar *primary_hostname; /* Primary name of this computer */ | |
764 | extern BOOL print_topbitchars; /* Topbit chars are printing chars */ | |
f3ebb786 | 765 | extern uschar *process_info; /* For SIGUSR1 output */ |
921b12ca | 766 | extern int process_info_len; |
059ec3d9 PH |
767 | extern uschar *process_log_path; /* Alternate path */ |
768 | extern BOOL prod_requires_admin; /* TRUE if prodding requires admin */ | |
a3c86431 | 769 | |
e6d2a989 | 770 | #if defined(SUPPORT_PROXY) || defined(SUPPORT_SOCKS) |
cee5f132 | 771 | extern uschar *hosts_proxy; /* Hostlist which (require) use proxy protocol */ |
e6d2a989 JH |
772 | extern uschar *proxy_external_address; /* IP of remote interface of proxy */ |
773 | extern int proxy_external_port; /* Port on remote interface of proxy */ | |
774 | extern uschar *proxy_local_address; /* IP of local interface of proxy */ | |
775 | extern int proxy_local_port; /* Port on local interface of proxy */ | |
a3c86431 | 776 | extern BOOL proxy_session; /* TRUE if receiving mail from valid proxy */ |
a3c86431 TL |
777 | #endif |
778 | ||
fffda43a TK |
779 | extern uschar *prvscheck_address; /* Set during prvscheck expansion item */ |
780 | extern uschar *prvscheck_keynum; /* Set during prvscheck expansion item */ | |
781 | extern uschar *prvscheck_result; /* Set during prvscheck expansion item */ | |
059ec3d9 | 782 | |
55414b25 | 783 | extern const uschar *qualify_domain_recipient; /* Domain to qualify recipients with */ |
059ec3d9 | 784 | extern uschar *qualify_domain_sender; /* Domain to qualify senders with */ |
059ec3d9 PH |
785 | extern uschar *queue_domains; /* Queue these domains */ |
786 | extern BOOL queue_list_requires_admin; /* TRUE if -bp requires admin */ | |
059ec3d9 PH |
787 | /* immediate children */ |
788 | extern pid_t queue_run_pid; /* PID of the queue running process or 0 */ | |
789 | extern int queue_run_pipe; /* Pipe for synchronizing */ | |
790 | extern int queue_interval; /* Queue running interval */ | |
a2da3176 | 791 | extern uschar *queue_name; /* Name of queue, if nondefault spooling */ |
fc7bae7f | 792 | extern uschar *queue_name_dest; /* Destination queue, for moving messages */ |
059ec3d9 PH |
793 | extern BOOL queue_only; /* TRUE to disable immediate delivery */ |
794 | extern int queue_only_load; /* Max load before auto-queue */ | |
8669f003 | 795 | extern BOOL queue_only_load_latch; /* Latch queue_only_load TRUE */ |
059ec3d9 PH |
796 | extern uschar *queue_only_file; /* Queue if file exists/not-exists */ |
797 | extern BOOL queue_only_override; /* Allow override from command line */ | |
059ec3d9 | 798 | extern BOOL queue_run_in_order; /* As opposed to random */ |
0cd5fd23 | 799 | extern uschar *queue_run_max; /* Max queue runners */ |
059ec3d9 PH |
800 | extern uschar *queue_smtp_domains; /* Ditto, for these domains */ |
801 | ||
802 | extern unsigned int random_seed; /* Seed for random numbers */ | |
fe0dab11 | 803 | extern tree_node *ratelimiters_cmd; /* Results of command ratelimit checks */ |
870f6ba8 TF |
804 | extern tree_node *ratelimiters_conn; /* Results of connection ratelimit checks */ |
805 | extern tree_node *ratelimiters_mail; /* Results of per-mail ratelimit checks */ | |
059ec3d9 PH |
806 | extern uschar *raw_active_hostname; /* Pre-expansion */ |
807 | extern uschar *raw_sender; /* Before rewriting */ | |
808 | extern uschar **raw_recipients; /* Before rewriting */ | |
809 | extern int raw_recipients_count; | |
17ccbda6 | 810 | extern const uschar * rc_names[]; /* Mostly for debug output */ |
059ec3d9 PH |
811 | extern int rcpt_count; /* Count of RCPT commands in a message */ |
812 | extern int rcpt_fail_count; /* Those that got 5xx */ | |
813 | extern int rcpt_defer_count; /* Those that got 4xx */ | |
814 | extern gid_t real_gid; /* Real gid */ | |
815 | extern uid_t real_uid; /* Real user running program */ | |
059ec3d9 PH |
816 | extern int receive_linecount; /* Mainly for BSMTP errors */ |
817 | extern int receive_messagecount; /* Mainly for BSMTP errors */ | |
818 | extern int receive_timeout; /* For non-SMTP acceptance */ | |
819 | extern int received_count; /* Count of Received: headers */ | |
820 | extern uschar *received_for; /* For "for" field */ | |
821 | extern uschar *received_header_text; /* Definition of Received: header */ | |
822 | extern int received_headers_max; /* Max count of Received: headers */ | |
32dfdf8b | 823 | extern struct timeval received_time; /* Time the message was received */ |
306c6c77 | 824 | extern struct timeval received_time_taken; /* Interval the message took to be received */ |
059ec3d9 PH |
825 | extern uschar *recipient_data; /* lookup data for recipients */ |
826 | extern uschar *recipient_unqualified_hosts; /* Permitted unqualified recipients */ | |
2c7db3f5 | 827 | extern uschar *recipient_verify_failure; /* What went wrong */ |
059ec3d9 PH |
828 | extern int recipients_list_max; /* Maximum number fitting in list */ |
829 | extern int recipients_max; /* Max permitted */ | |
a207d5dd | 830 | extern BOOL recipients_max_reject; /* If TRUE, reject whole message */ |
059ec3d9 PH |
831 | extern const pcre *regex_AUTH; /* For recognizing AUTH settings */ |
832 | extern const pcre *regex_check_dns_names; /* For DNS name checking */ | |
833 | extern const pcre *regex_From; /* For recognizing "From_" lines */ | |
f98442df | 834 | extern const pcre *regex_CHUNKING; /* For recognizing CHUNKING (RFC 3030) */ |
f1513293 | 835 | extern const pcre *regex_IGNOREQUOTA; /* For recognizing IGNOREQUOTA (LMTP) */ |
059ec3d9 PH |
836 | extern const pcre *regex_PIPELINING; /* For recognizing PIPELINING */ |
837 | extern const pcre *regex_SIZE; /* For recognizing SIZE settings */ | |
81344b40 | 838 | #ifndef DISABLE_PIPE_CONNECT |
ee8b8090 JH |
839 | extern const pcre *regex_EARLY_PIPE; /* For recognizing PIPE_CONNCT */ |
840 | #endif | |
059ec3d9 | 841 | extern const pcre *regex_ismsgid; /* Compiled r.e. for message it */ |
f38917cc JH |
842 | extern const pcre *regex_smtp_code; /* For recognizing SMTP codes */ |
843 | extern uschar *regex_vars[]; /* $regexN variables */ | |
a7cbbf50 PP |
844 | #ifdef WHITELIST_D_MACROS |
845 | extern const pcre *regex_whitelisted_macro; /* For -D macro values */ | |
846 | #endif | |
8523533c TK |
847 | #ifdef WITH_CONTENT_SCAN |
848 | extern uschar *regex_match_string; /* regex that matched a line (regex ACL condition) */ | |
849 | #endif | |
059ec3d9 PH |
850 | extern int remote_delivery_count; /* Number of remote addresses */ |
851 | extern int remote_max_parallel; /* Maximum parallel delivery */ | |
852 | extern uschar *remote_sort_domains; /* Remote domain sorting order */ | |
853 | extern retry_config *retries; /* Chain of retry config information */ | |
854 | extern int retry_data_expire; /* When to expire retry data */ | |
855 | extern int retry_interval_max; /* Absolute maximum */ | |
856 | extern int retry_maximum_timeout; /* The maximum timeout */ | |
857 | extern uschar *return_path; /* Return path for a message */ | |
858 | extern BOOL return_path_remove; /* Remove return-path headers */ | |
859 | extern int rewrite_existflags; /* Indicate which headers have rewrites */ | |
860 | extern uschar *rfc1413_hosts; /* RFC hosts */ | |
861 | extern int rfc1413_query_timeout; /* Timeout on RFC 1413 calls */ | |
862 | /* extern BOOL rfc821_domains; */ /* If set, syntax is 821, not 822 => being abolished */ | |
c1d94452 | 863 | extern uid_t root_gid; /* The gid for root */ |
059ec3d9 PH |
864 | extern uid_t root_uid; /* The uid for root */ |
865 | extern router_info routers_available[];/* Vector of available routers */ | |
866 | extern router_instance *routers; /* Chain of instantiated routers */ | |
867 | extern router_instance router_defaults;/* Default values */ | |
181d9bf8 | 868 | extern uschar *router_name; /* Name of router last started */ |
fa7b17bd | 869 | extern tree_node *router_var; /* Variables set by router */ |
059ec3d9 PH |
870 | extern ip_address_item *running_interfaces; /* Host's running interfaces */ |
871 | extern uschar *running_status; /* Flag string for testing */ | |
872 | extern int runrc; /* rc from ${run} */ | |
873 | ||
874 | extern uschar *search_error_message; /* Details of lookup problem */ | |
059ec3d9 PH |
875 | extern uschar *self_hostname; /* Self host after routing->directors */ |
876 | extern unsigned int sender_address_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender */ | |
2a3eea10 | 877 | extern uschar *sender_address_data; /* address_data from sender verify */ |
059ec3d9 PH |
878 | extern uschar *sender_address_unrewritten; /* Set if rewritten by verify */ |
879 | extern uschar *sender_data; /* lookup result for senders */ | |
880 | extern unsigned int sender_domain_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender domain */ | |
881 | extern uschar *sender_fullhost; /* Sender host name + address */ | |
1705dd20 | 882 | extern BOOL sender_helo_dnssec; /* True if HELO verify used DNS and was DNSSEC */ |
059ec3d9 PH |
883 | extern uschar *sender_helo_name; /* Host name from HELO/EHLO */ |
884 | extern uschar **sender_host_aliases; /* Points to list of alias names */ | |
c44ff8be | 885 | extern uschar *sender_host_auth_pubname; /* Public-name of authentication method */ |
059ec3d9 | 886 | extern unsigned int sender_host_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for incoming host */ |
1f4a55da | 887 | extern BOOL sender_host_dnssec; /* true if sender_host_name verified in DNSSEC */ |
059ec3d9 | 888 | extern uschar *sender_ident; /* Sender identity via RFC 1413 */ |
870f6ba8 TF |
889 | extern uschar *sender_rate; /* Sender rate computed by ACL */ |
890 | extern uschar *sender_rate_limit; /* Configured rate limit */ | |
891 | extern uschar *sender_rate_period; /* Configured smoothing period */ | |
059ec3d9 | 892 | extern uschar *sender_rcvhost; /* Host data for Received: */ |
059ec3d9 | 893 | extern uschar *sender_unqualified_hosts; /* Permitted unqualified senders */ |
2c7db3f5 | 894 | extern uschar *sender_verify_failure; /* What went wrong */ |
059ec3d9 PH |
895 | extern address_item *sender_verified_list; /* Saved chain of sender verifies */ |
896 | extern address_item *sender_verified_failed; /* The one that caused denial */ | |
41c7c167 PH |
897 | extern uschar *sending_ip_address; /* Address of outgoing (SMTP) interface */ |
898 | extern int sending_port; /* Port of outgoing interface */ | |
cd59ab18 | 899 | extern SIGNAL_BOOL sigalrm_seen; /* Flag for sigalrm_handler */ |
c2a1bba0 | 900 | extern const uschar *sigalarm_setter; /* For debug, set to callpoint of alarm() */ |
059ec3d9 | 901 | extern uschar **sighup_argv; /* Args for re-execing after SIGHUP */ |
4c04137d | 902 | extern int slow_lookup_log; /* Log DNS lookups taking longer than N millisecs */ |
059ec3d9 PH |
903 | extern int smtp_accept_count; /* Count of connections */ |
904 | extern BOOL smtp_accept_keepalive; /* Set keepalive on incoming */ | |
905 | extern int smtp_accept_max; /* Max SMTP connections */ | |
906 | extern int smtp_accept_max_nonmail;/* Max non-mail commands in one con */ | |
907 | extern uschar *smtp_accept_max_nonmail_hosts; /* Limit non-mail cmds from these hosts */ | |
908 | extern int smtp_accept_max_per_connection; /* Max msgs per connection */ | |
909 | extern uschar *smtp_accept_max_per_host; /* Max SMTP cons from one IP addr */ | |
910 | extern int smtp_accept_queue; /* Queue after so many connections */ | |
911 | extern int smtp_accept_queue_per_connection; /* Queue after so many msgs */ | |
912 | extern int smtp_accept_reserve; /* Reserve these SMTP connections */ | |
913 | extern uschar *smtp_active_hostname; /* Hostname for this message */ | |
059ec3d9 PH |
914 | extern uschar *smtp_banner; /* Banner string (to be expanded) */ |
915 | extern BOOL smtp_check_spool_space; /* TRUE to check SMTP SIZE value */ | |
b4ed4da0 | 916 | extern int smtp_ch_index; /* Index in smtp_connection_had */ |
3ee512ff PH |
917 | extern uschar *smtp_cmd_argument; /* For all SMTP commands */ |
918 | extern uschar *smtp_cmd_buffer; /* SMTP command buffer */ | |
0f1a8658 | 919 | extern struct timeval smtp_connection_start; /* Start time of SMTP connection */ |
b4ed4da0 | 920 | extern uschar smtp_connection_had[]; /* Recent SMTP commands */ |
059ec3d9 PH |
921 | extern int smtp_connect_backlog; /* Max backlog permitted */ |
922 | extern double smtp_delay_mail; /* Current MAIL delay */ | |
923 | extern double smtp_delay_rcpt; /* Current RCPT delay */ | |
924 | extern BOOL smtp_enforce_sync; /* Enforce sync rules */ | |
925 | extern uschar *smtp_etrn_command; /* Command to run */ | |
926 | extern BOOL smtp_etrn_serialize; /* Only one at once */ | |
927 | extern FILE *smtp_in; /* Incoming SMTP input file */ | |
928 | extern int smtp_load_reserve; /* Only from reserved if load > this */ | |
929 | extern int smtp_mailcmd_count; /* Count of MAIL commands */ | |
930 | extern int smtp_max_synprot_errors;/* Max syntax/protocol errors */ | |
931 | extern int smtp_max_unknown_commands; /* As it says */ | |
8f128379 | 932 | extern uschar *smtp_notquit_reason; /* Global for disconnect reason */ |
059ec3d9 PH |
933 | extern FILE *smtp_out; /* Incoming SMTP output file */ |
934 | extern uschar *smtp_ratelimit_hosts; /* Rate limit these hosts */ | |
935 | extern uschar *smtp_ratelimit_mail; /* Parameters for MAIL limiting */ | |
936 | extern uschar *smtp_ratelimit_rcpt; /* Parameters for RCPT limiting */ | |
937 | extern uschar *smtp_read_error; /* Message for SMTP input error */ | |
938 | extern int smtp_receive_timeout; /* Applies to each received line */ | |
1ad6489e | 939 | extern uschar *smtp_receive_timeout_s; /* ... expandable version */ |
059ec3d9 PH |
940 | extern uschar *smtp_reserve_hosts; /* Hosts for reserved slots */ |
941 | extern BOOL smtp_return_error_details; /* TRUE to return full info */ | |
942 | extern int smtp_rlm_base; /* Base interval for MAIL rate limit */ | |
943 | extern double smtp_rlm_factor; /* Factor for MAIL rate limit */ | |
944 | extern int smtp_rlm_limit; /* Max delay */ | |
945 | extern int smtp_rlm_threshold; /* Threshold for RCPT rate limit */ | |
946 | extern int smtp_rlr_base; /* Base interval for RCPT rate limit */ | |
947 | extern double smtp_rlr_factor; /* Factor for RCPT rate limit */ | |
948 | extern int smtp_rlr_limit; /* Max delay */ | |
949 | extern int smtp_rlr_threshold; /* Threshold for RCPT rate limit */ | |
2d14f397 JH |
950 | extern unsigned smtp_peer_options; /* Global flags for passed connections */ |
951 | extern unsigned smtp_peer_options_wrap; /* stacked version hidden by TLS */ | |
8c5d388a | 952 | #ifdef SUPPORT_I18N |
3d1451ea JH |
953 | extern uschar *smtputf8_advertise_hosts; /* ingress control */ |
954 | #endif | |
8523533c TK |
955 | |
956 | #ifdef WITH_CONTENT_SCAN | |
957 | extern uschar *spamd_address; /* address for the spamassassin daemon */ | |
958 | extern uschar *spam_bar; /* the spam "bar" (textual representation of spam_score) */ | |
959 | extern uschar *spam_report; /* the spamd report (multiline) */ | |
c5f280e2 | 960 | extern uschar *spam_action; /* the spamd recommended-action */ |
8523533c TK |
961 | extern uschar *spam_score; /* the spam score (float) */ |
962 | extern uschar *spam_score_int; /* spam_score * 10 (int) */ | |
963 | #endif | |
7952eef9 | 964 | #ifdef SUPPORT_SPF |
65a7d8c3 | 965 | extern uschar *spf_guess; /* spf best-guess record */ |
8523533c | 966 | extern uschar *spf_header_comment; /* spf header comment */ |
8fe685ad | 967 | extern uschar *spf_received; /* Received-SPF: header */ |
8523533c | 968 | extern uschar *spf_result; /* spf result in string form */ |
87e9d061 | 969 | extern BOOL spf_result_guessed; /* spf result is of best-guess operation */ |
8523533c TK |
970 | extern uschar *spf_smtp_comment; /* spf comment to include in SMTP reply */ |
971 | #endif | |
059ec3d9 | 972 | extern BOOL split_spool_directory; /* TRUE to use multiple subdirs */ |
1bd642c2 | 973 | extern FILE *spool_data_file; /* handle for -D file */ |
059ec3d9 | 974 | extern uschar *spool_directory; /* Name of spool directory */ |
328c5688 | 975 | extern BOOL spool_wireformat; /* can write wireformat -D files */ |
8523533c TK |
976 | #ifdef EXPERIMENTAL_SRS |
977 | extern uschar *srs_config; /* SRS config secret:max age:hash length:use timestamp:use hash */ | |
978 | extern uschar *srs_db_address; /* SRS db address */ | |
979 | extern uschar *srs_db_key; /* SRS db key */ | |
384152a6 TK |
980 | extern int srs_hashlength; /* SRS hash length */ |
981 | extern int srs_hashmin; /* SRS minimum hash length */ | |
982 | extern int srs_maxage; /* SRS max age */ | |
8523533c TK |
983 | extern uschar *srs_orig_sender; /* SRS original sender */ |
984 | extern uschar *srs_orig_recipient; /* SRS original recipient */ | |
985 | extern uschar *srs_recipient; /* SRS recipient */ | |
384152a6 | 986 | extern uschar *srs_secrets; /* SRS secrets list */ |
8523533c | 987 | extern uschar *srs_status; /* SRS staus */ |
384152a6 TK |
988 | extern BOOL srs_usehash; /* SRS use hash flag */ |
989 | extern BOOL srs_usetimestamp; /* SRS use timestamp flag */ | |
8523533c | 990 | #endif |
7ef88aa0 JH |
991 | #ifdef EXPERIMENTAL_SRS_NATIVE |
992 | extern uschar *srs_recipient; /* SRS recipient */ | |
993 | #endif | |
38a0a95f | 994 | extern BOOL strict_acl_vars; /* ACL variables have to be set before being used */ |
059ec3d9 | 995 | extern int string_datestamp_offset;/* After insertion by string_format */ |
f1e5fef5 PP |
996 | extern int string_datestamp_length;/* After insertion by string_format */ |
997 | extern int string_datestamp_type; /* After insertion by string_format */ | |
059ec3d9 PH |
998 | extern BOOL strip_excess_angle_brackets; /* Surrounding route-addrs */ |
999 | extern BOOL strip_trailing_dot; /* Remove dots at ends of domains */ | |
1000 | extern uschar *submission_domain; /* Domain for submission mode */ | |
2fe1a124 | 1001 | extern uschar *submission_name; /* User name set from ACL */ |
059ec3d9 PH |
1002 | extern BOOL syslog_duplication; /* FALSE => no duplicate logging */ |
1003 | extern int syslog_facility; /* As defined by Syslog.h */ | |
2333e06f | 1004 | extern BOOL syslog_pid; /* TRUE if PID on syslogs */ |
059ec3d9 PH |
1005 | extern uschar *syslog_processname; /* 'ident' param to openlog() */ |
1006 | extern BOOL syslog_timestamp; /* TRUE if time on syslogs */ | |
1007 | extern uschar *system_filter; /* Name of system filter file */ | |
1008 | ||
1009 | extern uschar *system_filter_directory_transport; /* Transports for the */ | |
1010 | extern uschar *system_filter_file_transport; /* system filter */ | |
1011 | extern uschar *system_filter_pipe_transport; | |
1012 | extern uschar *system_filter_reply_transport; | |
1013 | ||
1014 | extern gid_t system_filter_gid; /* Gid for running system filter */ | |
1015 | extern BOOL system_filter_gid_set; /* TRUE if gid set */ | |
1016 | extern uid_t system_filter_uid; /* Uid for running system filter */ | |
1017 | extern BOOL system_filter_uid_set; /* TRUE if uid set */ | |
059ec3d9 | 1018 | |
0ab63f3d | 1019 | extern blob tcp_fastopen_nodata; /* for zero-data TFO connect requests */ |
059ec3d9 | 1020 | extern BOOL tcp_nodelay; /* Controls TCP_NODELAY on daemon */ |
ee8b8090 | 1021 | extern tfo_state_t tcp_out_fastopen; /* TCP fast open */ |
5dc43717 JJ |
1022 | #ifdef USE_TCP_WRAPPERS |
1023 | extern uschar *tcp_wrappers_daemon_name; /* tcpwrappers daemon lookup name */ | |
1024 | #endif | |
8669f003 | 1025 | extern int test_harness_load_avg; /* For use when testing */ |
059ec3d9 PH |
1026 | extern int thismessage_size_limit; /* Limit for this message */ |
1027 | extern int timeout_frozen_after; /* Max time to keep frozen messages */ | |
9f01e50d JH |
1028 | #ifdef MEASURE_TIMING |
1029 | extern struct timeval timestamp_startup; /* For development measurements */ | |
1030 | #endif | |
d68218c7 | 1031 | |
181d9bf8 | 1032 | extern uschar *transport_name; /* Name of transport last started */ |
059ec3d9 | 1033 | extern int transport_count; /* Count of bytes transported */ |
332f5cf3 | 1034 | extern int transport_newlines; /* Accurate count of number of newline chars transported */ |
55414b25 | 1035 | extern const uschar **transport_filter_argv; /* For on-the-fly filtering */ |
059ec3d9 PH |
1036 | extern int transport_filter_timeout; /* Timeout for same */ |
1037 | ||
1038 | extern transport_info transports_available[]; /* Vector of available transports */ | |
1039 | extern transport_instance *transports; /* Chain of instantiated transports */ | |
1040 | extern transport_instance transport_defaults; /* Default values */ | |
1041 | ||
1042 | extern int transport_write_timeout;/* Set to time out individual writes */ | |
1043 | ||
1044 | extern tree_node *tree_dns_fails; /* Tree of DNS lookup failures */ | |
1045 | extern tree_node *tree_duplicates; /* Tree of duplicate addresses */ | |
1046 | extern tree_node *tree_nonrecipients; /* Tree of nonrecipient addresses */ | |
1047 | extern tree_node *tree_unusable; /* Tree of unusable addresses */ | |
1048 | ||
059ec3d9 PH |
1049 | extern gid_t *trusted_groups; /* List of trusted groups */ |
1050 | extern uid_t *trusted_users; /* List of trusted users */ | |
1051 | extern uschar *timezone_string; /* Required timezone setting */ | |
1052 | ||
1053 | extern uschar *unknown_login; /* To use when login id unknown */ | |
1054 | extern uschar *unknown_username; /* Ditto */ | |
1055 | extern uschar *untrusted_set_sender; /* Let untrusted users set these senders */ | |
1056 | extern uschar *uucp_from_pattern; /* For recognizing "From " lines */ | |
1057 | extern uschar *uucp_from_sender; /* For building the sender */ | |
1058 | ||
1059 | extern uschar *warn_message_file; /* Template for warning messages */ | |
1060 | extern uschar *warnmsg_delay; /* String form of delay time */ | |
1061 | extern uschar *warnmsg_recipients; /* Recipients of warning message */ | |
1062 | extern BOOL write_rejectlog; /* Control of reject logging */ | |
1063 | ||
aec45841 | 1064 | extern uschar *verify_mode; /* Running a router in verify mode */ |
059ec3d9 PH |
1065 | extern uschar *version_copyright; /* Copyright notice */ |
1066 | extern uschar *version_date; /* Date of compilation */ | |
1067 | extern uschar *version_cnumber; /* Compile number */ | |
1068 | extern uschar *version_string; /* Version string */ | |
1069 | ||
1070 | extern int warning_count; /* Delay warnings sent for this msg */ | |
1071 | ||
1072 | /* End of globals.h */ |