Commit | Line | Data |
---|---|---|
059ec3d9 PH |
1 | /************************************************* |
2 | * Exim - an Internet mail transport agent * | |
3 | *************************************************/ | |
4 | ||
5a66c31b | 5 | /* Copyright (c) University of Cambridge 1995 - 2014 */ |
059ec3d9 PH |
6 | /* See the file NOTICE for conditions of use and distribution. */ |
7 | ||
8 | /* Almost all the global variables are defined together in this one header, so | |
9 | that they are easy to find. However, those that are visible during the | |
10 | compilation of the local_scan() function are defined separately in the | |
11 | local_scan.h header file. */ | |
12 | ||
13 | /* First put any specials that are required for some operating systems. */ | |
14 | ||
15 | #ifdef NEED_H_ERRNO | |
16 | extern int h_errno; | |
17 | #endif | |
18 | ||
cd59ab18 PP |
19 | /* We need to be careful about width of int and atomicity in signal handlers, |
20 | especially with the rise of 64-bit systems breaking older assumptions. But | |
21 | sig_atomic_t comes from signal.h so can't go into mytypes.h without including | |
22 | signal support in local_scan, which seems precipitous. */ | |
23 | typedef volatile sig_atomic_t SIGNAL_BOOL; | |
24 | ||
059ec3d9 PH |
25 | /* Now things that are present only when configured. */ |
26 | ||
27 | #ifdef EXIM_PERL | |
28 | extern uschar *opt_perl_startup; /* Startup code for Perl interpreter */ | |
29 | extern BOOL opt_perl_at_start; /* Start Perl interpreter at start */ | |
30 | extern BOOL opt_perl_started; /* Set once interpreter started */ | |
31 | #endif | |
32 | ||
1a46a8c5 PH |
33 | #ifdef EXPAND_DLFUNC |
34 | extern tree_node *dlobj_anchor; /* Tree of dynamically-loaded objects */ | |
35 | #endif | |
36 | ||
059ec3d9 PH |
37 | #ifdef LOOKUP_IBASE |
38 | extern uschar *ibase_servers; | |
39 | #endif | |
40 | ||
41 | #ifdef LOOKUP_LDAP | |
bc19a55b PP |
42 | extern uschar *eldap_ca_cert_dir; /* Directory with CA certificates */ |
43 | extern uschar *eldap_ca_cert_file; /* CA certificate file */ | |
44 | extern uschar *eldap_cert_file; /* Certificate file */ | |
45 | extern uschar *eldap_cert_key; /* Certificate key file */ | |
46 | extern uschar *eldap_cipher_suite; /* Allowed cipher suite */ | |
059ec3d9 | 47 | extern uschar *eldap_default_servers; /* List of default servers */ |
bc19a55b PP |
48 | extern uschar *eldap_require_cert; /* Peer certificate checking strategy */ |
49 | extern BOOL eldap_start_tls; /* Use STARTTLS */ | |
059ec3d9 PH |
50 | extern int eldap_version; /* LDAP version */ |
51 | #endif | |
52 | ||
53 | #ifdef LOOKUP_MYSQL | |
54 | extern uschar *mysql_servers; /* List of servers and connect info */ | |
55 | #endif | |
56 | ||
57 | #ifdef LOOKUP_ORACLE | |
58 | extern uschar *oracle_servers; /* List of servers and connect info */ | |
59 | #endif | |
60 | ||
61 | #ifdef LOOKUP_PGSQL | |
62 | extern uschar *pgsql_servers; /* List of servers and connect info */ | |
63 | #endif | |
64 | ||
9bdd29ad TL |
65 | #ifdef EXPERIMENTAL_REDIS |
66 | extern uschar *redis_servers; /* List of servers and connect info */ | |
67 | #endif | |
68 | ||
31480e42 PH |
69 | #ifdef LOOKUP_SQLITE |
70 | extern int sqlite_lock_timeout; /* Internal lock waiting timeout */ | |
71 | #endif | |
72 | ||
059ec3d9 PH |
73 | #ifdef SUPPORT_MOVE_FROZEN_MESSAGES |
74 | extern BOOL move_frozen_messages; /* Get them out of the normal directory */ | |
75 | #endif | |
76 | ||
77 | /* These variables are outside the #ifdef because it keeps the code less | |
78 | cluttered in several places (e.g. during logging) if we can always refer to | |
79 | them. Also, the tls_ variables are now always visible. */ | |
80 | ||
817d9f57 JH |
81 | typedef struct { |
82 | int active; /* fd/socket when in a TLS session */ | |
83 | int bits; /* bits used in TLS session */ | |
84 | BOOL certificate_verified; /* Client certificate verified */ | |
85 | uschar *cipher; /* Cipher used */ | |
86 | BOOL on_connect; /* For older MTAs that don't STARTTLS */ | |
87 | uschar *on_connect_ports; /* Ports always tls-on-connect */ | |
9d1c15ef JH |
88 | void *ourcert; /* Certificate we presented, binary */ |
89 | void *peercert; /* Certificate of peer, binary */ | |
817d9f57 | 90 | uschar *peerdn; /* DN from peer */ |
817d9f57 | 91 | uschar *sni; /* Server Name Indication */ |
44662487 JH |
92 | enum { |
93 | OCSP_NOT_REQ=0, /* not requested */ | |
94 | OCSP_NOT_RESP, /* no response to request */ | |
018058b2 JH |
95 | OCSP_VFY_NOT_TRIED, /* response not verified */ |
96 | OCSP_FAILED, /* verify failed */ | |
44662487 JH |
97 | OCSP_VFIED /* verified */ |
98 | } ocsp; /* Stapled OCSP status */ | |
817d9f57 JH |
99 | } tls_support; |
100 | extern tls_support tls_in; | |
101 | extern tls_support tls_out; | |
059ec3d9 PH |
102 | |
103 | #ifdef SUPPORT_TLS | |
e6060e2c | 104 | extern BOOL gnutls_compat_mode; /* Less security, more compatibility */ |
2519e60d | 105 | extern BOOL gnutls_allow_auto_pkcs11; /* Let GnuTLS autoload PKCS11 modules */ |
83da1223 PH |
106 | extern uschar *gnutls_require_mac; /* So some can be avoided */ |
107 | extern uschar *gnutls_require_kx; /* So some can be avoided */ | |
108 | extern uschar *gnutls_require_proto; /* So some can be avoided */ | |
77bb000f | 109 | extern uschar *openssl_options; /* OpenSSL compatibility options */ |
059ec3d9 PH |
110 | extern const pcre *regex_STARTTLS; /* For recognizing STARTTLS settings */ |
111 | extern uschar *tls_advertise_hosts; /* host for which TLS is advertised */ | |
112 | extern uschar *tls_certificate; /* Certificate file */ | |
44bbabb5 | 113 | extern uschar *tls_channelbinding_b64; /* string of base64 channel binding */ |
059ec3d9 | 114 | extern uschar *tls_crl; /* CRL File */ |
3375e053 | 115 | extern int tls_dh_max_bits; /* don't accept higher lib suggestions */ |
059ec3d9 | 116 | extern uschar *tls_dhparam; /* DH param file */ |
f2de3a33 | 117 | #ifndef DISABLE_OCSP |
3f7eeb86 PP |
118 | extern uschar *tls_ocsp_file; /* OCSP stapling proof file */ |
119 | #endif | |
059ec3d9 PH |
120 | extern BOOL tls_offered; /* Server offered TLS */ |
121 | extern uschar *tls_privatekey; /* Private key file */ | |
122 | extern BOOL tls_remember_esmtp; /* For YAEB */ | |
123 | extern uschar *tls_require_ciphers; /* So some can be avoided */ | |
124 | extern uschar *tls_try_verify_hosts; /* Optional client verification */ | |
125 | extern uschar *tls_verify_certificates;/* Path for certificates to check */ | |
126 | extern uschar *tls_verify_hosts; /* Mandatory client verification */ | |
127 | #endif | |
128 | ||
6c1c3d1d WB |
129 | #ifdef EXPERIMENTAL_DSN |
130 | extern uschar *dsn_envid; /* DSN envid string */ | |
131 | extern int dsn_ret; /* DSN ret type*/ | |
132 | extern const pcre *regex_DSN; /* For recognizing DSN settings */ | |
133 | extern BOOL smtp_use_dsn; /* Global for passed connections */ | |
134 | extern uschar *dsn_advertise_hosts; /* host for which TLS is advertised */ | |
135 | #endif | |
059ec3d9 PH |
136 | |
137 | /* Input-reading functions for messages, so we can use special ones for | |
138 | incoming TCP/IP. */ | |
139 | ||
140 | extern int (*receive_getc)(void); | |
141 | extern int (*receive_ungetc)(int); | |
142 | extern int (*receive_feof)(void); | |
143 | extern int (*receive_ferror)(void); | |
58eb016e | 144 | extern BOOL (*receive_smtp_buffered)(void); |
059ec3d9 PH |
145 | |
146 | ||
147 | /* For clearing, saving, restoring address expansion variables. We have to have | |
148 | the size of this vector set explicitly, because it is referenced from more than | |
149 | one module. */ | |
150 | ||
151 | extern uschar **address_expansions[ADDRESS_EXPANSIONS_COUNT]; | |
152 | ||
153 | /* General global variables */ | |
154 | ||
155 | extern BOOL accept_8bitmime; /* Allow *BITMIME incoming */ | |
3c0a92dc | 156 | extern int body_8bitmime; /* sender declared BODY= ; 7=7BIT, 8=8BITMIME */ |
71fafd95 | 157 | extern header_line *acl_added_headers; /* Headers added by an ACL */ |
059ec3d9 | 158 | extern tree_node *acl_anchor; /* Tree of named ACLs */ |
525239c1 JH |
159 | extern uschar *acl_arg[9]; /* Argument to ACL call */ |
160 | extern int acl_narg; /* Number of arguments to ACL call */ | |
059ec3d9 | 161 | extern uschar *acl_not_smtp; /* ACL run for non-SMTP messages */ |
54cdb463 PH |
162 | #ifdef WITH_CONTENT_SCAN |
163 | extern uschar *acl_not_smtp_mime; /* For MIME parts of ditto */ | |
164 | #endif | |
45b91596 | 165 | extern uschar *acl_not_smtp_start; /* ACL run at the beginning of a non-SMTP session */ |
e7568d51 | 166 | extern uschar *acl_removed_headers; /* Headers deleted by an ACL */ |
059ec3d9 PH |
167 | extern uschar *acl_smtp_auth; /* ACL run for AUTH */ |
168 | extern uschar *acl_smtp_connect; /* ACL run on SMTP connection */ | |
169 | extern uschar *acl_smtp_data; /* ACL run after DATA received */ | |
8ccd00b1 | 170 | #ifndef DISABLE_PRDR |
fd98a5c6 JH |
171 | extern uschar *acl_smtp_data_prdr; /* ACL run after DATA received if in PRDR mode*/ |
172 | const extern pcre *regex_PRDR; /* For recognizing PRDR settings */ | |
173 | #endif | |
80a47a2c TK |
174 | #ifndef DISABLE_DKIM |
175 | extern uschar *acl_smtp_dkim; /* ACL run for DKIM signatures / domains */ | |
176 | #endif | |
059ec3d9 PH |
177 | extern uschar *acl_smtp_etrn; /* ACL run for ETRN */ |
178 | extern uschar *acl_smtp_expn; /* ACL run for EXPN */ | |
179 | extern uschar *acl_smtp_helo; /* ACL run for HELO/EHLO */ | |
180 | extern uschar *acl_smtp_mail; /* ACL run for MAIL */ | |
181 | extern uschar *acl_smtp_mailauth; /* ACL run for MAIL AUTH */ | |
8523533c TK |
182 | #ifdef WITH_CONTENT_SCAN |
183 | extern uschar *acl_smtp_mime; /* ACL run after DATA, before acl_smtp_data, for each MIME part */ | |
184 | #endif | |
8f128379 | 185 | extern uschar *acl_smtp_notquit; /* ACL run for disconnects */ |
059ec3d9 PH |
186 | extern uschar *acl_smtp_predata; /* ACL run for DATA command */ |
187 | extern uschar *acl_smtp_quit; /* ACL run for QUIT */ | |
188 | extern uschar *acl_smtp_rcpt; /* ACL run for RCPT */ | |
189 | extern uschar *acl_smtp_starttls; /* ACL run for STARTTLS */ | |
190 | extern uschar *acl_smtp_vrfy; /* ACL run for VRFY */ | |
191 | extern BOOL acl_temp_details; /* TRUE to give details for 4xx error */ | |
38a0a95f PH |
192 | extern tree_node *acl_var_c; /* ACL connection variables */ |
193 | extern tree_node *acl_var_m; /* ACL messsage variables */ | |
059ec3d9 | 194 | extern uschar *acl_verify_message; /* User message for verify failure */ |
059ec3d9 | 195 | extern string_item *acl_warn_logged; /* Logged lines */ |
a5bd321b | 196 | extern uschar *acl_wherecodes[]; /* Response codes for ACL fails */ |
059ec3d9 | 197 | extern uschar *acl_wherenames[]; /* Names for messages */ |
69358f02 PH |
198 | extern BOOL active_local_from_check;/* For adding Sender: (switchable) */ |
199 | extern BOOL active_local_sender_retain; /* For keeping Sender: (switchable) */ | |
059ec3d9 PH |
200 | extern address_item *addr_duplicate; /* Duplicate address list */ |
201 | extern address_item address_defaults; /* Default data for address item */ | |
202 | extern uschar *address_file; /* Name of file when delivering to one */ | |
203 | extern uschar *address_pipe; /* Pipe command when delivering to one */ | |
204 | extern BOOL address_test_mode; /* True for -bt */ | |
205 | extern tree_node *addresslist_anchor; /* Tree of defined address lists */ | |
206 | extern int addresslist_count; /* Number defined */ | |
207 | extern gid_t *admin_groups; /* List of admin groups */ | |
208 | extern BOOL admin_user; /* True if caller can do admin */ | |
c46782ef | 209 | extern BOOL allow_auth_unadvertised;/* As it says */ |
059ec3d9 PH |
210 | extern BOOL allow_domain_literals; /* As it says */ |
211 | extern BOOL allow_mx_to_ip; /* Allow MX records to -> ip address */ | |
212 | extern BOOL allow_unqualified_recipient; /* As it says */ | |
213 | extern BOOL allow_unqualified_sender; /* Ditto */ | |
214 | extern BOOL allow_utf8_domains; /* For experimenting */ | |
2d07a215 | 215 | extern uschar *authenticated_fail_id; /* ID that failed authentication */ |
059ec3d9 PH |
216 | extern uschar *authenticated_id; /* ID that was authenticated */ |
217 | extern uschar *authenticated_sender; /* From AUTH on MAIL */ | |
218 | extern BOOL authentication_failed; /* TRUE if AUTH was tried and failed */ | |
219 | extern uschar *auth_advertise_hosts; /* Only advertise to these */ | |
220 | extern auth_info auths_available[]; /* Vector of available auth mechanisms */ | |
221 | extern auth_instance *auths; /* Chain of instantiated auths */ | |
222 | extern auth_instance auth_defaults; /* Default values */ | |
223 | extern uschar *auth_defer_msg; /* Error message for log */ | |
224 | extern uschar *auth_defer_user_msg; /* Error message for user */ | |
f78eb7c6 | 225 | extern uschar *auth_vars[]; /* $authn variables */ |
059ec3d9 | 226 | extern int auto_thaw; /* Auto-thaw interval */ |
8523533c | 227 | #ifdef WITH_CONTENT_SCAN |
9e949f00 | 228 | extern BOOL av_failed; /* TRUE if the AV process failed */ |
8523533c TK |
229 | extern uschar *av_scanner; /* AntiVirus scanner to use for the malware condition */ |
230 | #endif | |
059ec3d9 PH |
231 | |
232 | extern BOOL background_daemon; /* Set FALSE to keep in foreground */ | |
233 | extern uschar *base62_chars; /* Table of base-62 characters */ | |
234 | extern uschar *bi_command; /* Command for -bi option */ | |
235 | extern uschar *big_buffer; /* Used for various temp things */ | |
236 | extern int big_buffer_size; /* Current size (can expand) */ | |
8523533c TK |
237 | #ifdef EXPERIMENTAL_BRIGHTMAIL |
238 | extern uschar *bmi_alt_location; /* expansion variable that contains the alternate location for the rcpt (available during routing) */ | |
239 | extern uschar *bmi_base64_tracker_verdict; /* expansion variable with base-64 encoded OLD verdict string (available during routing) */ | |
240 | extern uschar *bmi_base64_verdict; /* expansion variable with base-64 encoded verdict string (available during routing) */ | |
241 | extern uschar *bmi_config_file; /* Brightmail config file */ | |
242 | extern int bmi_deliver; /* Flag that determines if the message should be delivered to the rcpt (available during routing) */ | |
243 | extern int bmi_run; /* Flag that determines if message should be run through Brightmail server */ | |
244 | extern uschar *bmi_verdicts; /* BASE64-encoded verdicts with recipient lists */ | |
245 | #endif | |
059ec3d9 PH |
246 | extern uschar *bounce_message_file; /* Template file */ |
247 | extern uschar *bounce_message_text; /* One-liner */ | |
248 | extern uschar *bounce_recipient; /* When writing an errmsg */ | |
249 | extern BOOL bounce_return_body; /* Include body in returned message */ | |
250 | extern BOOL bounce_return_message; /* Include message in bounce */ | |
251 | extern int bounce_return_size_limit; /* Max amount to return */ | |
252 | extern uschar *bounce_sender_authentication; /* AUTH address for bounces */ | |
253 | extern int bsmtp_transaction_linecount; /* Start of last transaction */ | |
254 | ||
255 | extern int callout_cache_domain_positive_expire; /* Time for positive domain callout cache records to expire */ | |
256 | extern int callout_cache_domain_negative_expire; /* Time for negative domain callout cache records to expire */ | |
257 | extern int callout_cache_positive_expire; /* Time for positive callout cache records to expire */ | |
258 | extern int callout_cache_negative_expire; /* Time for negative callout cache records to expire */ | |
259 | extern uschar *callout_random_local_part; /* Local part to be used to check if server called will accept any local part */ | |
260 | extern uschar *check_dns_names_pattern;/* Regex for syntax check */ | |
261 | extern int check_log_inodes; /* Minimum for message acceptance */ | |
262 | extern int check_log_space; /* Minimum for message acceptance */ | |
a0d6ba8a | 263 | extern BOOL check_rfc2047_length; /* Check RFC 2047 encoded string length */ |
059ec3d9 PH |
264 | extern int check_spool_inodes; /* Minimum for message acceptance */ |
265 | extern int check_spool_space; /* Minimum for message acceptance */ | |
c8e2fc1e JH |
266 | extern uschar *client_authenticator; /* Authenticator name used for smtp delivery */ |
267 | extern uschar *client_authenticated_id; /* "login" name used for SMTP AUTH */ | |
268 | extern uschar *client_authenticated_sender; /* AUTH option to SMTP MAIL FROM (not yet used) */ | |
059ec3d9 PH |
269 | extern int clmacro_count; /* Number of command line macros */ |
270 | extern uschar *clmacros[]; /* Copy of them, for re-exec */ | |
271 | extern int connection_max_messages;/* Max down one SMTP connection */ | |
272 | extern BOOL config_changed; /* True if -C used */ | |
273 | extern FILE *config_file; /* Configuration file */ | |
274 | extern uschar *config_filename; /* Configuration file name */ | |
35edf2ff PH |
275 | #ifdef CONFIGURE_GROUP |
276 | extern gid_t config_gid; /* Additional group owner */ | |
277 | #endif | |
059ec3d9 PH |
278 | extern int config_lineno; /* Line number */ |
279 | extern uschar *config_main_filelist; /* List of possible config files */ | |
280 | extern uschar *config_main_filename; /* File name actually used */ | |
281 | #ifdef CONFIGURE_OWNER | |
282 | extern uid_t config_uid; /* Additional owner */ | |
283 | #endif | |
284 | extern uschar *continue_hostname; /* Host for continued delivery */ | |
285 | extern uschar *continue_host_address; /* IP address for ditto */ | |
286 | extern BOOL continue_more; /* Flag more addresses waiting */ | |
287 | extern int continue_sequence; /* Sequence num for continued delivery */ | |
288 | extern uschar *continue_transport; /* Transport for continued delivery */ | |
289 | ||
e5a9dba6 | 290 | extern uschar *csa_status; /* Client SMTP Authorization result */ |
e4bdf652 JH |
291 | extern BOOL cutthrough_delivery; /* Deliver in foreground */ |
292 | extern int cutthrough_fd; /* Connection for ditto */ | |
e5a9dba6 | 293 | |
059ec3d9 PH |
294 | extern BOOL daemon_listen; /* True if listening required */ |
295 | extern uschar *daemon_smtp_port; /* Can be a list of ports */ | |
4aee0225 PH |
296 | extern int daemon_startup_retries; /* Number of times to retry */ |
297 | extern int daemon_startup_sleep; /* Sleep between retries */ | |
6a8f9482 TK |
298 | |
299 | #ifdef EXPERIMENTAL_DCC | |
300 | extern BOOL dcc_direct_add_header; /* directly add header */ | |
301 | extern uschar *dcc_header; /* dcc header */ | |
302 | extern uschar *dcc_result; /* dcc result */ | |
303 | extern uschar *dccifd_address; /* address of the dccifd daemon */ | |
304 | extern uschar *dccifd_options; /* options for the dccifd daemon */ | |
305 | #endif | |
306 | ||
3d235903 | 307 | extern BOOL debug_daemon; /* Debug the daemon process only */ |
059ec3d9 PH |
308 | extern int debug_fd; /* The fd for debug_file */ |
309 | extern FILE *debug_file; /* Where to write debugging info */ | |
310 | extern bit_table debug_options[]; /* Table of debug options */ | |
311 | extern int debug_options_count; /* Size of table */ | |
312 | extern int delay_warning[]; /* Times between warnings */ | |
313 | extern uschar *delay_warning_condition; /* Condition string for warnings */ | |
314 | extern BOOL delivery_date_remove; /* Remove delivery-date headers */ | |
315 | ||
316 | extern uschar *deliver_address_data; /* Arbitrary data for an address */ | |
317 | extern int deliver_datafile; /* FD for data part of message */ | |
318 | extern uschar *deliver_domain; /* The local domain for delivery */ | |
319 | extern uschar *deliver_domain_data; /* From domain lookup */ | |
320 | extern uschar *deliver_domain_orig; /* The original local domain for delivery */ | |
321 | extern uschar *deliver_domain_parent; /* The parent domain for delivery */ | |
322 | extern BOOL deliver_drop_privilege; /* TRUE for unprivileged delivery */ | |
323 | extern BOOL deliver_firsttime; /* True for first delivery attempt */ | |
324 | extern BOOL deliver_force; /* TRUE if delivery was forced */ | |
325 | extern BOOL deliver_freeze; /* TRUE if delivery is frozen */ | |
19050083 | 326 | extern time_t deliver_frozen_at; /* Time of freezing */ |
059ec3d9 PH |
327 | extern uschar *deliver_home; /* Home directory for pipes */ |
328 | extern uschar *deliver_host; /* (First) host for routed local deliveries */ | |
329 | /* Remote host for filter */ | |
330 | extern uschar *deliver_host_address; /* Address for remote delivery filter */ | |
331 | extern uschar *deliver_in_buffer; /* Buffer for copying file */ | |
332 | extern ino_t deliver_inode; /* Inode for appendfile */ | |
333 | extern uschar *deliver_localpart; /* The local part for delivery */ | |
334 | extern uschar *deliver_localpart_data; /* From local part lookup */ | |
335 | extern uschar *deliver_localpart_orig; /* The original local part for delivery */ | |
336 | extern uschar *deliver_localpart_parent; /* The parent local part for delivery */ | |
337 | extern uschar *deliver_localpart_prefix; /* The stripped prefix, if any */ | |
338 | extern uschar *deliver_localpart_suffix; /* The stripped suffix, if any */ | |
339 | extern BOOL deliver_force_thaw; /* TRUE to force thaw in queue run */ | |
340 | extern BOOL deliver_manual_thaw; /* TRUE if manually thawed */ | |
341 | extern uschar *deliver_out_buffer; /* Buffer for copying file */ | |
342 | extern int deliver_queue_load_max; /* Different value for queue running */ | |
343 | extern address_item *deliver_recipients; /* Current set of addresses */ | |
344 | extern uschar *deliver_selectstring; /* For selecting by recipient */ | |
345 | extern BOOL deliver_selectstring_regex; /* String is regex */ | |
346 | extern uschar *deliver_selectstring_sender; /* For selecting by sender */ | |
347 | extern BOOL deliver_selectstring_sender_regex; /* String is regex */ | |
8523533c TK |
348 | #ifdef WITH_OLD_DEMIME |
349 | extern int demime_errorlevel; /* Severity of MIME error */ | |
350 | extern int demime_ok; /* Nonzero if message has been demimed */ | |
351 | extern uschar *demime_reason; /* Reason for broken MIME container */ | |
352 | #endif | |
4c590bd1 | 353 | extern BOOL disable_callout_flush; /* Don't flush before callouts */ |
047bdd8c | 354 | extern BOOL disable_delay_flush; /* Don't flush before "delay" in ACL */ |
54fc8428 PH |
355 | #ifdef ENABLE_DISABLE_FSYNC |
356 | extern BOOL disable_fsync; /* Not for normal use */ | |
357 | #endif | |
7e66e54d | 358 | extern BOOL disable_ipv6; /* Don't do any IPv6 things */ |
059ec3d9 PH |
359 | extern BOOL disable_logging; /* Disables log writing when TRUE */ |
360 | ||
80a47a2c | 361 | #ifndef DISABLE_DKIM |
2df588c9 | 362 | extern uschar *dkim_cur_signer; /* Expansion variable, holds the current "signer" domain or identity during a acl_smtp_dkim run */ |
9e5d6b55 | 363 | extern uschar *dkim_signers; /* Expansion variable, holds colon-separated list of domains and identities that have signed a message */ |
80a47a2c TK |
364 | extern uschar *dkim_signing_domain; /* Expansion variable, domain used for signing a message. */ |
365 | extern uschar *dkim_signing_selector; /* Expansion variable, selector used for signing a message. */ | |
366 | extern uschar *dkim_verify_signers; /* Colon-separated list of domains for each of which we call the DKIM ACL */ | |
367 | extern BOOL dkim_collect_input; /* Runtime flag that tracks wether SMTP input is fed to DKIM validation */ | |
368 | extern BOOL dkim_disable_verify; /* Set via ACL control statement. When set, DKIM verification is disabled for the current message */ | |
f7572e5a | 369 | #endif |
4840604e | 370 | #ifdef EXPERIMENTAL_DMARC |
4a8ce2d8 | 371 | extern BOOL dmarc_has_been_checked; /* Global variable to check if test has been called yet */ |
4840604e | 372 | extern uschar *dmarc_ar_header; /* Expansion variable, suggested header for dmarc auth results */ |
8c8b8274 | 373 | extern uschar *dmarc_domain_policy; /* Expansion for declared policy of used domain */ |
4840604e TL |
374 | extern uschar *dmarc_forensic_sender; /* Set sender address for forensic reports */ |
375 | extern uschar *dmarc_history_file; /* Expansion variable, file to store dmarc results */ | |
376 | extern uschar *dmarc_status; /* Expansion variable, one word value */ | |
377 | extern uschar *dmarc_status_text; /* Expansion variable, human readable value */ | |
378 | extern uschar *dmarc_tld_file; /* Mozilla TLDs text file */ | |
379 | extern uschar *dmarc_used_domain; /* Expansion variable, domain libopendmarc chose for DMARC policy lookup */ | |
380 | extern BOOL dmarc_disable_verify; /* Set via ACL control statement. When set, DMARC verification is disabled for the current message */ | |
381 | extern BOOL dmarc_enable_forensic; /* Set via ACL control statement. When set, DMARC forensic reports are enabled for the current message */ | |
382 | #endif | |
f7572e5a | 383 | |
059ec3d9 | 384 | extern uschar *dns_again_means_nonexist; /* Domains that are badly set up */ |
e5a9dba6 PH |
385 | extern int dns_csa_search_limit; /* How deep to search for CSA SRV records */ |
386 | extern BOOL dns_csa_use_reverse; /* Check CSA in reverse DNS? (non-standard) */ | |
059ec3d9 PH |
387 | extern uschar *dns_ipv4_lookup; /* For these domains, don't look for AAAA (or A6) */ |
388 | extern int dns_retrans; /* Retransmission time setting */ | |
389 | extern int dns_retry; /* Number of retries */ | |
0fbd9bff | 390 | extern int dns_dnssec_ok; /* When constructing DNS query, set DO flag */ |
e97d1f08 | 391 | extern int dns_use_edns0; /* Coerce EDNS0 support on/off in resolver. */ |
059ec3d9 | 392 | extern uschar *dnslist_domain; /* DNS (black) list domain */ |
93655c46 | 393 | extern uschar *dnslist_matched; /* DNS (black) list matched key */ |
059ec3d9 PH |
394 | extern uschar *dnslist_text; /* DNS (black) list text message */ |
395 | extern uschar *dnslist_value; /* DNS (black) list IP address */ | |
396 | extern tree_node *domainlist_anchor; /* Tree of defined domain lists */ | |
397 | extern int domainlist_count; /* Number defined */ | |
398 | extern BOOL dont_deliver; /* TRUE for -N option */ | |
399 | extern BOOL dot_ends; /* TRUE if "." ends non-SMTP input */ | |
400 | ||
401 | /* This option is now a no-opt, retained for compatibility */ | |
402 | extern BOOL drop_cr; /* For broken local MUAs */ | |
403 | ||
0e22dfd1 PH |
404 | extern uschar *dsn_from; /* From: string for DSNs */ |
405 | ||
059ec3d9 PH |
406 | extern BOOL enable_dollar_recipients; /* Make $recipients available */ |
407 | extern int envelope_to_remove; /* Remove envelope_to_headers */ | |
408 | extern int errno_quota; /* Quota errno in this OS */ | |
409 | extern int error_handling; /* Error handling style */ | |
410 | extern uschar *errors_copy; /* For taking copies of errors */ | |
411 | extern uschar *errors_reply_to; /* Reply-to for error messages */ | |
412 | extern int errors_sender_rc; /* Return after message to sender*/ | |
413 | extern gid_t exim_gid; /* To be used with exim_uid */ | |
414 | extern BOOL exim_gid_set; /* TRUE if exim_gid set */ | |
415 | extern uschar *exim_path; /* Path to exec exim */ | |
98a90c36 | 416 | extern const uschar *exim_sieve_extension_list[]; /* list of sieve extensions */ |
059ec3d9 PH |
417 | extern uid_t exim_uid; /* Non-root uid for exim */ |
418 | extern BOOL exim_uid_set; /* TRUE if exim_uid set */ | |
419 | extern int expand_forbid; /* RDO flags for forbidding things */ | |
420 | extern int expand_nlength[]; /* Lengths of numbered strings */ | |
421 | extern int expand_nmax; /* Max numerical value */ | |
422 | extern uschar *expand_nstring[]; /* Numbered strings */ | |
423 | extern BOOL expand_string_forcedfail; /* TRUE if failure was "expected" */ | |
424 | extern BOOL extract_addresses_remove_arguments; /* Controls -t behaviour */ | |
425 | extern uschar *extra_local_interfaces; /* Local, non-listen interfaces */ | |
426 | ||
29aba418 TF |
427 | extern int fake_response; /* Fake FAIL or DEFER response to data */ |
428 | extern uschar *fake_response_text; /* User defined message for the above. Default is in globals.c. */ | |
059ec3d9 PH |
429 | extern int filter_n[FILTER_VARIABLE_COUNT]; /* filter variables */ |
430 | extern BOOL filter_running; /* TRUE while running a filter */ | |
431 | extern int filter_sn[FILTER_VARIABLE_COUNT]; /* variables set by system filter */ | |
f05da2e8 PH |
432 | extern int filter_test; /* Filter test type */ |
433 | extern uschar *filter_test_sfile; /* System filter test file */ | |
434 | extern uschar *filter_test_ufile; /* User filter test file */ | |
059ec3d9 PH |
435 | extern uschar *filter_thisaddress; /* For address looping */ |
436 | extern int finduser_retries; /* Retry count for getpwnam() */ | |
437 | extern uid_t fixed_never_users[]; /* Can't be overridden */ | |
8523533c TK |
438 | #ifdef WITH_OLD_DEMIME |
439 | extern uschar *found_extension; /* demime acl condition: file extension found */ | |
440 | #endif | |
059ec3d9 | 441 | extern uschar *freeze_tell; /* Message on (some) freezings */ |
6a3f1455 | 442 | extern uschar *freeze_tell_config; /* The configured setting */ |
059ec3d9 PH |
443 | extern uschar *fudged_queue_times; /* For use in test harness */ |
444 | ||
445 | extern uschar *gecos_name; /* To be expanded when pattern matches */ | |
446 | extern uschar *gecos_pattern; /* Pattern to match */ | |
447 | extern rewrite_rule *global_rewrite_rules; /* Chain of rewriting rules */ | |
448 | ||
449 | extern int header_insert_maxlen; /* Max for inserting headers */ | |
450 | extern int header_maxsize; /* Max total length for header */ | |
451 | extern int header_line_maxsize; /* Max for an individual line */ | |
452 | extern header_name header_names[]; /* Table of header names */ | |
453 | extern int header_names_size; /* Number of entries */ | |
454 | extern BOOL header_rewritten; /* TRUE if header changed by router */ | |
455 | extern uschar *helo_accept_junk_hosts; /* Allowed to use junk arg */ | |
456 | extern uschar *helo_allow_chars; /* Rogue chars to allow in HELO/EHLO */ | |
457 | extern uschar *helo_lookup_domains; /* If these given, lookup host name */ | |
458 | extern uschar *helo_try_verify_hosts; /* Soft check HELO argument for these */ | |
459 | extern BOOL helo_verified; /* True if HELO verified */ | |
d7b47fd0 | 460 | extern BOOL helo_verify_failed; /* True if attempt failed */ |
059ec3d9 | 461 | extern uschar *helo_verify_hosts; /* Hard check HELO argument for these */ |
1ba28e2b | 462 | extern const uschar *hex_digits; /* Used in several places */ |
059ec3d9 PH |
463 | extern uschar *hold_domains; /* Hold up deliveries to these */ |
464 | extern BOOL host_find_failed_syntax;/* DNS syntax check failure */ | |
465 | extern BOOL host_checking_callout; /* TRUE if real callout wanted */ | |
466 | extern uschar *host_data; /* Obtained from lookup in ACL */ | |
467 | extern uschar *host_lookup; /* For which IP addresses are always looked up */ | |
b08b24c8 | 468 | extern BOOL host_lookup_deferred; /* TRUE if lookup deferred */ |
059ec3d9 PH |
469 | extern BOOL host_lookup_failed; /* TRUE if lookup failed */ |
470 | extern uschar *host_lookup_order; /* Order of host lookup types */ | |
471 | extern uschar *host_lookup_msg; /* Text for why it failed */ | |
472 | extern int host_number; /* For sharing spools */ | |
473 | extern uschar *host_number_string; /* For expanding */ | |
474 | extern uschar *host_reject_connection; /* Reject these hosts */ | |
475 | extern tree_node *hostlist_anchor; /* Tree of defined host lists */ | |
476 | extern int hostlist_count; /* Number defined */ | |
477 | extern uschar *hosts_connection_nolog; /* Limits the logging option */ | |
478 | extern uschar *hosts_treat_as_local; /* For routing */ | |
479 | ||
480 | extern int ignore_bounce_errors_after; /* Keep them for this time. */ | |
481 | extern BOOL ignore_fromline_local; /* Local SMTP ignore fromline */ | |
482 | extern uschar *ignore_fromline_hosts; /* Hosts permitted to send "From " */ | |
9ee44efb PP |
483 | extern BOOL inetd_wait_mode; /* Whether running in inetd wait mode */ |
484 | extern int inetd_wait_timeout; /* Timeout for inetd wait mode */ | |
059ec3d9 | 485 | extern BOOL is_inetd; /* True for inetd calls */ |
0ce9abe6 | 486 | extern uschar *iterate_item; /* Item from iterate list */ |
059ec3d9 PH |
487 | |
488 | extern int journal_fd; /* Fd for journal file */ | |
489 | ||
490 | extern int keep_malformed; /* Time to keep malformed messages */ | |
491 | ||
492 | extern uschar *eldap_dn; /* Where LDAP DNs are left */ | |
493 | extern int load_average; /* Most recently read load average */ | |
494 | extern BOOL local_error_message; /* True if handling one of these */ | |
69358f02 | 495 | extern BOOL local_from_check; /* For adding Sender: (global value) */ |
059ec3d9 PH |
496 | extern uschar *local_from_prefix; /* Permitted prefixes */ |
497 | extern uschar *local_from_suffix; /* Permitted suffixes */ | |
498 | extern uschar *local_interfaces; /* For forcing specific interfaces */ | |
499 | extern uschar *local_scan_data; /* Text returned by local_scan() */ | |
500 | extern optionlist local_scan_options[];/* Option list for local_scan() */ | |
501 | extern int local_scan_options_count; /* Size of the list */ | |
502 | extern int local_scan_timeout; /* Timeout for local_scan() */ | |
503 | extern BOOL local_sender_retain; /* Retain Sender: (with no From: check) */ | |
504 | extern gid_t local_user_gid; /* As it says; may be set in routers */ | |
505 | extern uid_t local_user_uid; /* As it says; may be set in routers */ | |
506 | extern tree_node *localpartlist_anchor;/* Tree of defined localpart lists */ | |
507 | extern int localpartlist_count; /* Number defined */ | |
508 | extern uschar *log_buffer; /* For constructing log entries */ | |
509 | extern unsigned int log_extra_selector;/* Bit map of logging options other than used by log_write() */ | |
510 | extern uschar *log_file_path; /* If unset, use default */ | |
511 | extern bit_table log_options[]; /* Table of options */ | |
512 | extern int log_options_count; /* Size of table */ | |
6ea85e9a | 513 | extern int log_reject_target; /* Target log for ACL rejections */ |
059ec3d9 PH |
514 | extern uschar *log_selector_string; /* As supplied in the config */ |
515 | extern FILE *log_stderr; /* Copy of stderr for log use, or NULL */ | |
516 | extern BOOL log_testing_mode; /* TRUE in various testing modes */ | |
517 | extern BOOL log_timezone; /* TRUE to include the timezone in log lines */ | |
6ea85e9a | 518 | extern unsigned int log_write_selector;/* Bit map of logging options for log_write() */ |
059ec3d9 | 519 | extern uschar *login_sender_address; /* The actual sender address */ |
e6d225ae | 520 | extern lookup_info **lookup_list; /* Array of pointers to available lookups */ |
059ec3d9 | 521 | extern int lookup_list_count; /* Number of entries in the list */ |
4e0983dc | 522 | extern uschar *lookup_dnssec_authenticated; /* AD status of dns lookup */ |
059ec3d9 PH |
523 | extern int lookup_open_max; /* Max lookup files to cache */ |
524 | extern uschar *lookup_value; /* Value looked up from file */ | |
525 | ||
526 | extern macro_item *macros; /* Configuration macros */ | |
527 | extern uschar *mailstore_basename; /* For mailstore deliveries */ | |
8523533c TK |
528 | #ifdef WITH_CONTENT_SCAN |
529 | extern uschar *malware_name; /* Name of virus or malware ("W32/Klez-H") */ | |
530 | #endif | |
d677b2f2 | 531 | extern int max_received_linelength;/* What it says */ |
059ec3d9 PH |
532 | extern int max_username_length; /* For systems with broken getpwnam() */ |
533 | extern int message_age; /* In seconds */ | |
534 | extern uschar *message_body; /* Start of message body for filter */ | |
535 | extern uschar *message_body_end; /* End of message body for filter */ | |
ddea74fa | 536 | extern BOOL message_body_newlines; /* FALSE => remove newlines */ |
059ec3d9 PH |
537 | extern int message_body_size; /* Sic */ |
538 | extern int message_body_visible; /* Amount visible in message_body */ | |
539 | extern int message_ended; /* State of message reading and how ended */ | |
540 | extern uschar *message_headers; /* When built */ | |
541 | extern uschar message_id_option[]; /* -E<message-id> for use as option */ | |
542 | extern uschar *message_id_external; /* External form of following */ | |
543 | extern uschar *message_id_domain; /* Expanded to form domain-part of message_id */ | |
544 | extern uschar *message_id_text; /* Expanded to form message_id */ | |
545 | extern struct timeval message_id_tv; /* Time used to create last message_id */ | |
546 | extern int message_linecount; /* As it says */ | |
547 | extern BOOL message_logs; /* TRUE to write message logs */ | |
548 | extern int message_size; /* Size of message */ | |
549 | extern uschar *message_size_limit; /* As it says */ | |
550 | extern uschar message_subdir[]; /* Subdirectory for messages */ | |
551 | extern uschar *message_reference; /* Reference for error messages */ | |
8523533c TK |
552 | |
553 | /* MIME ACL expandables */ | |
554 | #ifdef WITH_CONTENT_SCAN | |
555 | extern int mime_anomaly_level; | |
1ba28e2b | 556 | extern const uschar *mime_anomaly_text; |
8523533c TK |
557 | extern uschar *mime_boundary; |
558 | extern uschar *mime_charset; | |
559 | extern uschar *mime_content_description; | |
560 | extern uschar *mime_content_disposition; | |
561 | extern uschar *mime_content_id; | |
562 | extern unsigned int mime_content_size; | |
563 | extern uschar *mime_content_transfer_encoding; | |
564 | extern uschar *mime_content_type; | |
565 | extern uschar *mime_decoded_filename; | |
566 | extern uschar *mime_filename; | |
567 | extern int mime_is_multipart; | |
568 | extern int mime_is_coverletter; | |
569 | extern int mime_is_rfc822; | |
570 | extern int mime_part_count; | |
571 | #endif | |
572 | ||
059ec3d9 PH |
573 | extern BOOL mua_wrapper; /* TRUE when Exim is wrapping an MUA */ |
574 | ||
575 | extern uid_t *never_users; /* List of uids never to be used */ | |
8523533c TK |
576 | #ifdef WITH_CONTENT_SCAN |
577 | extern BOOL no_mbox_unspool; /* don't unlink files in /scan directory */ | |
578 | #endif | |
059ec3d9 PH |
579 | extern BOOL no_multiline_responses; /* For broken clients */ |
580 | ||
581 | extern optionlist optionlist_auths[]; /* These option lists are made */ | |
582 | extern int optionlist_auths_size; /* global so that readconf can */ | |
583 | extern optionlist optionlist_routers[]; /* see them for printing out */ | |
584 | extern int optionlist_routers_size; /* the options. */ | |
585 | extern optionlist optionlist_transports[]; | |
586 | extern int optionlist_transports_size; | |
587 | ||
588 | extern uid_t original_euid; /* Original effective uid */ | |
589 | extern gid_t originator_gid; /* Gid of whoever wrote spool file */ | |
590 | extern uschar *originator_login; /* Login of same */ | |
591 | extern uschar *originator_name; /* Full name of same */ | |
592 | extern uid_t originator_uid; /* Uid of ditto */ | |
593 | extern uschar *override_local_interfaces; /* Value of -oX argument */ | |
594 | extern uschar *override_pid_file_path; /* Value of -oP argument */ | |
595 | ||
596 | extern BOOL parse_allow_group; /* Allow group syntax */ | |
597 | extern BOOL parse_found_group; /* In the middle of a group */ | |
598 | extern uschar *percent_hack_domains; /* Local domains for which '% operates */ | |
599 | extern uschar *pid_file_path; /* For writing daemon pids */ | |
600 | extern uschar *pipelining_advertise_hosts; /* As it says */ | |
cf8b11a5 | 601 | extern BOOL pipelining_enable; /* As it says */ |
8ccd00b1 | 602 | #ifndef DISABLE_PRDR |
fd98a5c6 JH |
603 | extern BOOL prdr_enable; /* As it says */ |
604 | extern BOOL prdr_requested; /* Connecting mail server wants PRDR */ | |
605 | #endif | |
059ec3d9 PH |
606 | extern BOOL preserve_message_logs; /* Save msglog files */ |
607 | extern uschar *primary_hostname; /* Primary name of this computer */ | |
608 | extern BOOL print_topbitchars; /* Topbit chars are printing chars */ | |
609 | extern uschar process_info[]; /* For SIGUSR1 output */ | |
921b12ca | 610 | extern int process_info_len; |
059ec3d9 PH |
611 | extern uschar *process_log_path; /* Alternate path */ |
612 | extern BOOL prod_requires_admin; /* TRUE if prodding requires admin */ | |
a3c86431 TL |
613 | |
614 | #ifdef EXPERIMENTAL_PROXY | |
eb57651e TL |
615 | extern uschar *proxy_host_address; /* IP of host being proxied */ |
616 | extern int proxy_host_port; /* Port of host being proxied */ | |
a3c86431 TL |
617 | extern uschar *proxy_required_hosts; /* Hostlist which (require) use proxy protocol */ |
618 | extern BOOL proxy_session; /* TRUE if receiving mail from valid proxy */ | |
619 | extern BOOL proxy_session_failed; /* TRUE if required proxy negotiation failed */ | |
eb57651e TL |
620 | extern uschar *proxy_target_address; /* IP of proxy server inbound */ |
621 | extern int proxy_target_port; /* Port of proxy server inbound */ | |
a3c86431 TL |
622 | #endif |
623 | ||
fffda43a TK |
624 | extern uschar *prvscheck_address; /* Set during prvscheck expansion item */ |
625 | extern uschar *prvscheck_keynum; /* Set during prvscheck expansion item */ | |
626 | extern uschar *prvscheck_result; /* Set during prvscheck expansion item */ | |
059ec3d9 PH |
627 | |
628 | extern uschar *qualify_domain_recipient; /* Domain to qualify recipients with */ | |
629 | extern uschar *qualify_domain_sender; /* Domain to qualify senders with */ | |
630 | extern BOOL queue_2stage; /* Run queue in 2-stage manner */ | |
631 | extern uschar *queue_domains; /* Queue these domains */ | |
632 | extern BOOL queue_list_requires_admin; /* TRUE if -bp requires admin */ | |
633 | extern BOOL queue_run_first_delivery; /* If TRUE, first deliveries only */ | |
634 | extern BOOL queue_run_force; /* TRUE to force during queue run */ | |
635 | extern BOOL queue_run_local; /* Local deliveries only in queue run */ | |
636 | extern BOOL queue_running; /* TRUE for queue running process and */ | |
637 | /* immediate children */ | |
638 | extern pid_t queue_run_pid; /* PID of the queue running process or 0 */ | |
639 | extern int queue_run_pipe; /* Pipe for synchronizing */ | |
640 | extern int queue_interval; /* Queue running interval */ | |
641 | extern BOOL queue_only; /* TRUE to disable immediate delivery */ | |
642 | extern int queue_only_load; /* Max load before auto-queue */ | |
8669f003 | 643 | extern BOOL queue_only_load_latch; /* Latch queue_only_load TRUE */ |
059ec3d9 PH |
644 | extern uschar *queue_only_file; /* Queue if file exists/not-exists */ |
645 | extern BOOL queue_only_override; /* Allow override from command line */ | |
646 | extern BOOL queue_only_policy; /* ACL or local_scan wants queue_only */ | |
647 | extern BOOL queue_run_in_order; /* As opposed to random */ | |
648 | extern int queue_run_max; /* Max queue runners */ | |
649 | extern BOOL queue_smtp; /* Disable all immediate STMP (-odqs)*/ | |
650 | extern uschar *queue_smtp_domains; /* Ditto, for these domains */ | |
651 | ||
652 | extern unsigned int random_seed; /* Seed for random numbers */ | |
fe0dab11 | 653 | extern tree_node *ratelimiters_cmd; /* Results of command ratelimit checks */ |
870f6ba8 TF |
654 | extern tree_node *ratelimiters_conn; /* Results of connection ratelimit checks */ |
655 | extern tree_node *ratelimiters_mail; /* Results of per-mail ratelimit checks */ | |
059ec3d9 PH |
656 | extern uschar *raw_active_hostname; /* Pre-expansion */ |
657 | extern uschar *raw_sender; /* Before rewriting */ | |
658 | extern uschar **raw_recipients; /* Before rewriting */ | |
659 | extern int raw_recipients_count; | |
660 | extern int rcpt_count; /* Count of RCPT commands in a message */ | |
661 | extern int rcpt_fail_count; /* Those that got 5xx */ | |
662 | extern int rcpt_defer_count; /* Those that got 4xx */ | |
663 | extern gid_t real_gid; /* Real gid */ | |
664 | extern uid_t real_uid; /* Real user running program */ | |
665 | extern BOOL really_exim; /* FALSE in utilities */ | |
666 | extern BOOL receive_call_bombout; /* Flag for crashing log */ | |
667 | extern int receive_linecount; /* Mainly for BSMTP errors */ | |
668 | extern int receive_messagecount; /* Mainly for BSMTP errors */ | |
669 | extern int receive_timeout; /* For non-SMTP acceptance */ | |
670 | extern int received_count; /* Count of Received: headers */ | |
671 | extern uschar *received_for; /* For "for" field */ | |
672 | extern uschar *received_header_text; /* Definition of Received: header */ | |
673 | extern int received_headers_max; /* Max count of Received: headers */ | |
674 | extern int received_time; /* Time the message was received */ | |
675 | extern uschar *recipient_data; /* lookup data for recipients */ | |
676 | extern uschar *recipient_unqualified_hosts; /* Permitted unqualified recipients */ | |
2c7db3f5 | 677 | extern uschar *recipient_verify_failure; /* What went wrong */ |
059ec3d9 PH |
678 | extern BOOL recipients_discarded; /* By an ACL */ |
679 | extern int recipients_list_max; /* Maximum number fitting in list */ | |
680 | extern int recipients_max; /* Max permitted */ | |
681 | extern int recipients_max_reject; /* If TRUE, reject whole message */ | |
682 | extern const pcre *regex_AUTH; /* For recognizing AUTH settings */ | |
683 | extern const pcre *regex_check_dns_names; /* For DNS name checking */ | |
684 | extern const pcre *regex_From; /* For recognizing "From_" lines */ | |
f1513293 | 685 | extern const pcre *regex_IGNOREQUOTA; /* For recognizing IGNOREQUOTA (LMTP) */ |
059ec3d9 PH |
686 | extern const pcre *regex_PIPELINING; /* For recognizing PIPELINING */ |
687 | extern const pcre *regex_SIZE; /* For recognizing SIZE settings */ | |
a5bd321b | 688 | extern const pcre *regex_smtp_code; /* For recognizing SMTP codes */ |
059ec3d9 | 689 | extern const pcre *regex_ismsgid; /* Compiled r.e. for message it */ |
a7cbbf50 PP |
690 | #ifdef WHITELIST_D_MACROS |
691 | extern const pcre *regex_whitelisted_macro; /* For -D macro values */ | |
692 | #endif | |
8523533c TK |
693 | #ifdef WITH_CONTENT_SCAN |
694 | extern uschar *regex_match_string; /* regex that matched a line (regex ACL condition) */ | |
695 | #endif | |
059ec3d9 PH |
696 | extern int remote_delivery_count; /* Number of remote addresses */ |
697 | extern int remote_max_parallel; /* Maximum parallel delivery */ | |
698 | extern uschar *remote_sort_domains; /* Remote domain sorting order */ | |
699 | extern retry_config *retries; /* Chain of retry config information */ | |
700 | extern int retry_data_expire; /* When to expire retry data */ | |
701 | extern int retry_interval_max; /* Absolute maximum */ | |
702 | extern int retry_maximum_timeout; /* The maximum timeout */ | |
703 | extern uschar *return_path; /* Return path for a message */ | |
704 | extern BOOL return_path_remove; /* Remove return-path headers */ | |
705 | extern int rewrite_existflags; /* Indicate which headers have rewrites */ | |
706 | extern uschar *rfc1413_hosts; /* RFC hosts */ | |
707 | extern int rfc1413_query_timeout; /* Timeout on RFC 1413 calls */ | |
708 | /* extern BOOL rfc821_domains; */ /* If set, syntax is 821, not 822 => being abolished */ | |
c1d94452 | 709 | extern uid_t root_gid; /* The gid for root */ |
059ec3d9 PH |
710 | extern uid_t root_uid; /* The uid for root */ |
711 | extern router_info routers_available[];/* Vector of available routers */ | |
712 | extern router_instance *routers; /* Chain of instantiated routers */ | |
713 | extern router_instance router_defaults;/* Default values */ | |
181d9bf8 | 714 | extern uschar *router_name; /* Name of router last started */ |
059ec3d9 PH |
715 | extern BOOL running_in_test_harness; /*TRUE when running_status is patched */ |
716 | extern ip_address_item *running_interfaces; /* Host's running interfaces */ | |
717 | extern uschar *running_status; /* Flag string for testing */ | |
718 | extern int runrc; /* rc from ${run} */ | |
719 | ||
720 | extern uschar *search_error_message; /* Details of lookup problem */ | |
721 | extern BOOL search_find_defer; /* Set TRUE if lookup deferred */ | |
722 | extern uschar *self_hostname; /* Self host after routing->directors */ | |
723 | extern unsigned int sender_address_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender */ | |
2a3eea10 | 724 | extern uschar *sender_address_data; /* address_data from sender verify */ |
059ec3d9 PH |
725 | extern BOOL sender_address_forced; /* Set by -f */ |
726 | extern uschar *sender_address_unrewritten; /* Set if rewritten by verify */ | |
727 | extern uschar *sender_data; /* lookup result for senders */ | |
728 | extern unsigned int sender_domain_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender domain */ | |
729 | extern uschar *sender_fullhost; /* Sender host name + address */ | |
730 | extern uschar *sender_helo_name; /* Host name from HELO/EHLO */ | |
731 | extern uschar **sender_host_aliases; /* Points to list of alias names */ | |
732 | extern unsigned int sender_host_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for incoming host */ | |
1f4a55da | 733 | extern BOOL sender_host_dnssec; /* true if sender_host_name verified in DNSSEC */ |
059ec3d9 PH |
734 | extern BOOL sender_host_notsocket; /* Set for -bs and -bS */ |
735 | extern BOOL sender_host_unknown; /* TRUE for -bs and -bS except inetd */ | |
736 | extern uschar *sender_ident; /* Sender identity via RFC 1413 */ | |
737 | extern BOOL sender_local; /* TRUE for local senders */ | |
2fe1a124 | 738 | extern BOOL sender_name_forced; /* Set by -F */ |
870f6ba8 TF |
739 | extern uschar *sender_rate; /* Sender rate computed by ACL */ |
740 | extern uschar *sender_rate_limit; /* Configured rate limit */ | |
741 | extern uschar *sender_rate_period; /* Configured smoothing period */ | |
059ec3d9 PH |
742 | extern uschar *sender_rcvhost; /* Host data for Received: */ |
743 | extern BOOL sender_set_untrusted; /* Sender set by untrusted caller */ | |
744 | extern uschar *sender_unqualified_hosts; /* Permitted unqualified senders */ | |
2c7db3f5 | 745 | extern uschar *sender_verify_failure; /* What went wrong */ |
059ec3d9 PH |
746 | extern address_item *sender_verified_list; /* Saved chain of sender verifies */ |
747 | extern address_item *sender_verified_failed; /* The one that caused denial */ | |
41c7c167 PH |
748 | extern uschar *sending_ip_address; /* Address of outgoing (SMTP) interface */ |
749 | extern int sending_port; /* Port of outgoing interface */ | |
cd59ab18 | 750 | extern SIGNAL_BOOL sigalrm_seen; /* Flag for sigalrm_handler */ |
059ec3d9 PH |
751 | extern uschar **sighup_argv; /* Args for re-execing after SIGHUP */ |
752 | extern int smtp_accept_count; /* Count of connections */ | |
753 | extern BOOL smtp_accept_keepalive; /* Set keepalive on incoming */ | |
754 | extern int smtp_accept_max; /* Max SMTP connections */ | |
755 | extern int smtp_accept_max_nonmail;/* Max non-mail commands in one con */ | |
756 | extern uschar *smtp_accept_max_nonmail_hosts; /* Limit non-mail cmds from these hosts */ | |
757 | extern int smtp_accept_max_per_connection; /* Max msgs per connection */ | |
758 | extern uschar *smtp_accept_max_per_host; /* Max SMTP cons from one IP addr */ | |
759 | extern int smtp_accept_queue; /* Queue after so many connections */ | |
760 | extern int smtp_accept_queue_per_connection; /* Queue after so many msgs */ | |
761 | extern int smtp_accept_reserve; /* Reserve these SMTP connections */ | |
762 | extern uschar *smtp_active_hostname; /* Hostname for this message */ | |
763 | extern BOOL smtp_authenticated; /* Sending client has authenticated */ | |
764 | extern uschar *smtp_banner; /* Banner string (to be expanded) */ | |
765 | extern BOOL smtp_check_spool_space; /* TRUE to check SMTP SIZE value */ | |
b4ed4da0 | 766 | extern int smtp_ch_index; /* Index in smtp_connection_had */ |
3ee512ff PH |
767 | extern uschar *smtp_cmd_argument; /* For all SMTP commands */ |
768 | extern uschar *smtp_cmd_buffer; /* SMTP command buffer */ | |
b4ed4da0 PH |
769 | extern time_t smtp_connection_start; /* Start time of SMTP connection */ |
770 | extern uschar smtp_connection_had[]; /* Recent SMTP commands */ | |
059ec3d9 PH |
771 | extern int smtp_connect_backlog; /* Max backlog permitted */ |
772 | extern double smtp_delay_mail; /* Current MAIL delay */ | |
773 | extern double smtp_delay_rcpt; /* Current RCPT delay */ | |
774 | extern BOOL smtp_enforce_sync; /* Enforce sync rules */ | |
775 | extern uschar *smtp_etrn_command; /* Command to run */ | |
776 | extern BOOL smtp_etrn_serialize; /* Only one at once */ | |
777 | extern FILE *smtp_in; /* Incoming SMTP input file */ | |
778 | extern int smtp_load_reserve; /* Only from reserved if load > this */ | |
779 | extern int smtp_mailcmd_count; /* Count of MAIL commands */ | |
780 | extern int smtp_max_synprot_errors;/* Max syntax/protocol errors */ | |
781 | extern int smtp_max_unknown_commands; /* As it says */ | |
8f128379 | 782 | extern uschar *smtp_notquit_reason; /* Global for disconnect reason */ |
059ec3d9 PH |
783 | extern FILE *smtp_out; /* Incoming SMTP output file */ |
784 | extern uschar *smtp_ratelimit_hosts; /* Rate limit these hosts */ | |
785 | extern uschar *smtp_ratelimit_mail; /* Parameters for MAIL limiting */ | |
786 | extern uschar *smtp_ratelimit_rcpt; /* Parameters for RCPT limiting */ | |
787 | extern uschar *smtp_read_error; /* Message for SMTP input error */ | |
788 | extern int smtp_receive_timeout; /* Applies to each received line */ | |
789 | extern uschar *smtp_reserve_hosts; /* Hosts for reserved slots */ | |
790 | extern BOOL smtp_return_error_details; /* TRUE to return full info */ | |
791 | extern int smtp_rlm_base; /* Base interval for MAIL rate limit */ | |
792 | extern double smtp_rlm_factor; /* Factor for MAIL rate limit */ | |
793 | extern int smtp_rlm_limit; /* Max delay */ | |
794 | extern int smtp_rlm_threshold; /* Threshold for RCPT rate limit */ | |
795 | extern int smtp_rlr_base; /* Base interval for RCPT rate limit */ | |
796 | extern double smtp_rlr_factor; /* Factor for RCPT rate limit */ | |
797 | extern int smtp_rlr_limit; /* Max delay */ | |
798 | extern int smtp_rlr_threshold; /* Threshold for RCPT rate limit */ | |
799 | extern BOOL smtp_use_pipelining; /* Global for passed connections */ | |
800 | extern BOOL smtp_use_size; /* Global for passed connections */ | |
8523533c TK |
801 | |
802 | #ifdef WITH_CONTENT_SCAN | |
803 | extern uschar *spamd_address; /* address for the spamassassin daemon */ | |
804 | extern uschar *spam_bar; /* the spam "bar" (textual representation of spam_score) */ | |
805 | extern uschar *spam_report; /* the spamd report (multiline) */ | |
806 | extern uschar *spam_score; /* the spam score (float) */ | |
807 | extern uschar *spam_score_int; /* spam_score * 10 (int) */ | |
808 | #endif | |
809 | #ifdef EXPERIMENTAL_SPF | |
65a7d8c3 | 810 | extern uschar *spf_guess; /* spf best-guess record */ |
8523533c | 811 | extern uschar *spf_header_comment; /* spf header comment */ |
8fe685ad | 812 | extern uschar *spf_received; /* Received-SPF: header */ |
8523533c TK |
813 | extern uschar *spf_result; /* spf result in string form */ |
814 | extern uschar *spf_smtp_comment; /* spf comment to include in SMTP reply */ | |
815 | #endif | |
059ec3d9 PH |
816 | extern BOOL split_spool_directory; /* TRUE to use multiple subdirs */ |
817 | extern uschar *spool_directory; /* Name of spool directory */ | |
8523533c TK |
818 | #ifdef EXPERIMENTAL_SRS |
819 | extern uschar *srs_config; /* SRS config secret:max age:hash length:use timestamp:use hash */ | |
820 | extern uschar *srs_db_address; /* SRS db address */ | |
821 | extern uschar *srs_db_key; /* SRS db key */ | |
384152a6 TK |
822 | extern int srs_hashlength; /* SRS hash length */ |
823 | extern int srs_hashmin; /* SRS minimum hash length */ | |
824 | extern int srs_maxage; /* SRS max age */ | |
8523533c TK |
825 | extern uschar *srs_orig_sender; /* SRS original sender */ |
826 | extern uschar *srs_orig_recipient; /* SRS original recipient */ | |
827 | extern uschar *srs_recipient; /* SRS recipient */ | |
384152a6 | 828 | extern uschar *srs_secrets; /* SRS secrets list */ |
8523533c | 829 | extern uschar *srs_status; /* SRS staus */ |
384152a6 TK |
830 | extern BOOL srs_usehash; /* SRS use hash flag */ |
831 | extern BOOL srs_usetimestamp; /* SRS use timestamp flag */ | |
8523533c | 832 | #endif |
38a0a95f | 833 | extern BOOL strict_acl_vars; /* ACL variables have to be set before being used */ |
059ec3d9 | 834 | extern int string_datestamp_offset;/* After insertion by string_format */ |
f1e5fef5 PP |
835 | extern int string_datestamp_length;/* After insertion by string_format */ |
836 | extern int string_datestamp_type; /* After insertion by string_format */ | |
059ec3d9 PH |
837 | extern BOOL strip_excess_angle_brackets; /* Surrounding route-addrs */ |
838 | extern BOOL strip_trailing_dot; /* Remove dots at ends of domains */ | |
839 | extern uschar *submission_domain; /* Domain for submission mode */ | |
840 | extern BOOL submission_mode; /* Can be forced from ACL */ | |
2fe1a124 | 841 | extern uschar *submission_name; /* User name set from ACL */ |
8800895a | 842 | extern BOOL suppress_local_fixups; /* Can be forced from ACL */ |
f4ee74ac | 843 | extern BOOL suppress_local_fixups_default; /* former is reset to this; override with -G */ |
059ec3d9 PH |
844 | extern BOOL synchronous_delivery; /* TRUE if -odi is set */ |
845 | extern BOOL syslog_duplication; /* FALSE => no duplicate logging */ | |
846 | extern int syslog_facility; /* As defined by Syslog.h */ | |
847 | extern uschar *syslog_processname; /* 'ident' param to openlog() */ | |
848 | extern BOOL syslog_timestamp; /* TRUE if time on syslogs */ | |
849 | extern uschar *system_filter; /* Name of system filter file */ | |
850 | ||
851 | extern uschar *system_filter_directory_transport; /* Transports for the */ | |
852 | extern uschar *system_filter_file_transport; /* system filter */ | |
853 | extern uschar *system_filter_pipe_transport; | |
854 | extern uschar *system_filter_reply_transport; | |
855 | ||
856 | extern gid_t system_filter_gid; /* Gid for running system filter */ | |
857 | extern BOOL system_filter_gid_set; /* TRUE if gid set */ | |
858 | extern uid_t system_filter_uid; /* Uid for running system filter */ | |
859 | extern BOOL system_filter_uid_set; /* TRUE if uid set */ | |
860 | extern BOOL system_filtering; /* TRUE when running system filter */ | |
861 | ||
862 | extern BOOL tcp_nodelay; /* Controls TCP_NODELAY on daemon */ | |
5dc43717 JJ |
863 | #ifdef USE_TCP_WRAPPERS |
864 | extern uschar *tcp_wrappers_daemon_name; /* tcpwrappers daemon lookup name */ | |
865 | #endif | |
8669f003 | 866 | extern int test_harness_load_avg; /* For use when testing */ |
059ec3d9 PH |
867 | extern int thismessage_size_limit; /* Limit for this message */ |
868 | extern int timeout_frozen_after; /* Max time to keep frozen messages */ | |
869 | extern BOOL timestamps_utc; /* Use UTC for all times */ | |
d68218c7 JH |
870 | |
871 | #ifdef EXPERIMENTAL_TPDA | |
872 | extern int tpda_defer_errno; /* error number set when a remote delivery is deferred with a host error */ | |
873 | extern uschar *tpda_defer_errstr; /* error string set when a remote delivery is deferred with a host error */ | |
874 | extern uschar *tpda_delivery_ip; /* IP of host, which has accepted delivery */ | |
875 | extern int tpda_delivery_port; /* port of host, which has accepted delivery */ | |
876 | extern uschar *tpda_delivery_fqdn; /* FQDN of host, which has accepted delivery */ | |
877 | extern uschar *tpda_delivery_local_part;/* local part of address being delivered */ | |
878 | extern uschar *tpda_delivery_domain; /* domain part of address being delivered */ | |
879 | extern uschar *tpda_delivery_confirmation; /* SMTP confirmation message */ | |
880 | #endif | |
881 | ||
181d9bf8 | 882 | extern uschar *transport_name; /* Name of transport last started */ |
059ec3d9 | 883 | extern int transport_count; /* Count of bytes transported */ |
332f5cf3 | 884 | extern int transport_newlines; /* Accurate count of number of newline chars transported */ |
059ec3d9 PH |
885 | extern uschar **transport_filter_argv; /* For on-the-fly filtering */ |
886 | extern int transport_filter_timeout; /* Timeout for same */ | |
2e2a30b4 | 887 | extern BOOL transport_filter_timed_out; /* True if it did */ |
059ec3d9 PH |
888 | |
889 | extern transport_info transports_available[]; /* Vector of available transports */ | |
890 | extern transport_instance *transports; /* Chain of instantiated transports */ | |
891 | extern transport_instance transport_defaults; /* Default values */ | |
892 | ||
893 | extern int transport_write_timeout;/* Set to time out individual writes */ | |
894 | ||
895 | extern tree_node *tree_dns_fails; /* Tree of DNS lookup failures */ | |
896 | extern tree_node *tree_duplicates; /* Tree of duplicate addresses */ | |
897 | extern tree_node *tree_nonrecipients; /* Tree of nonrecipient addresses */ | |
898 | extern tree_node *tree_unusable; /* Tree of unusable addresses */ | |
899 | ||
900 | extern BOOL trusted_caller; /* Caller is trusted */ | |
e2f5dc15 | 901 | extern BOOL trusted_config; /* Configuration file is trusted */ |
059ec3d9 PH |
902 | extern gid_t *trusted_groups; /* List of trusted groups */ |
903 | extern uid_t *trusted_users; /* List of trusted users */ | |
904 | extern uschar *timezone_string; /* Required timezone setting */ | |
905 | ||
906 | extern uschar *unknown_login; /* To use when login id unknown */ | |
907 | extern uschar *unknown_username; /* Ditto */ | |
908 | extern uschar *untrusted_set_sender; /* Let untrusted users set these senders */ | |
909 | extern uschar *uucp_from_pattern; /* For recognizing "From " lines */ | |
910 | extern uschar *uucp_from_sender; /* For building the sender */ | |
911 | ||
912 | extern uschar *warn_message_file; /* Template for warning messages */ | |
913 | extern uschar *warnmsg_delay; /* String form of delay time */ | |
914 | extern uschar *warnmsg_recipients; /* Recipients of warning message */ | |
915 | extern BOOL write_rejectlog; /* Control of reject logging */ | |
916 | ||
917 | extern uschar *version_copyright; /* Copyright notice */ | |
918 | extern uschar *version_date; /* Date of compilation */ | |
919 | extern uschar *version_cnumber; /* Compile number */ | |
920 | extern uschar *version_string; /* Version string */ | |
921 | ||
922 | extern int warning_count; /* Delay warnings sent for this msg */ | |
923 | ||
924 | /* End of globals.h */ |