Commit | Line | Data |
---|---|---|
059ec3d9 PH |
1 | /************************************************* |
2 | * Exim - an Internet mail transport agent * | |
3 | *************************************************/ | |
4 | ||
d4e5e70b | 5 | /* Copyright (c) University of Cambridge 1995 - 2017 */ |
059ec3d9 PH |
6 | /* See the file NOTICE for conditions of use and distribution. */ |
7 | ||
8 | /* Almost all the global variables are defined together in this one header, so | |
9 | that they are easy to find. However, those that are visible during the | |
10 | compilation of the local_scan() function are defined separately in the | |
11 | local_scan.h header file. */ | |
12 | ||
13 | /* First put any specials that are required for some operating systems. */ | |
14 | ||
15 | #ifdef NEED_H_ERRNO | |
16 | extern int h_errno; | |
17 | #endif | |
18 | ||
cd59ab18 PP |
19 | /* We need to be careful about width of int and atomicity in signal handlers, |
20 | especially with the rise of 64-bit systems breaking older assumptions. But | |
21 | sig_atomic_t comes from signal.h so can't go into mytypes.h without including | |
22 | signal support in local_scan, which seems precipitous. */ | |
23 | typedef volatile sig_atomic_t SIGNAL_BOOL; | |
24 | ||
059ec3d9 PH |
25 | /* Now things that are present only when configured. */ |
26 | ||
27 | #ifdef EXIM_PERL | |
28 | extern uschar *opt_perl_startup; /* Startup code for Perl interpreter */ | |
29 | extern BOOL opt_perl_at_start; /* Start Perl interpreter at start */ | |
30 | extern BOOL opt_perl_started; /* Set once interpreter started */ | |
2f680c0c | 31 | extern BOOL opt_perl_taintmode; /* Enable taint mode in Perl */ |
059ec3d9 PH |
32 | #endif |
33 | ||
1a46a8c5 PH |
34 | #ifdef EXPAND_DLFUNC |
35 | extern tree_node *dlobj_anchor; /* Tree of dynamically-loaded objects */ | |
36 | #endif | |
37 | ||
059ec3d9 PH |
38 | #ifdef LOOKUP_IBASE |
39 | extern uschar *ibase_servers; | |
40 | #endif | |
41 | ||
42 | #ifdef LOOKUP_LDAP | |
bc19a55b PP |
43 | extern uschar *eldap_ca_cert_dir; /* Directory with CA certificates */ |
44 | extern uschar *eldap_ca_cert_file; /* CA certificate file */ | |
45 | extern uschar *eldap_cert_file; /* Certificate file */ | |
46 | extern uschar *eldap_cert_key; /* Certificate key file */ | |
47 | extern uschar *eldap_cipher_suite; /* Allowed cipher suite */ | |
059ec3d9 | 48 | extern uschar *eldap_default_servers; /* List of default servers */ |
bc19a55b PP |
49 | extern uschar *eldap_require_cert; /* Peer certificate checking strategy */ |
50 | extern BOOL eldap_start_tls; /* Use STARTTLS */ | |
059ec3d9 PH |
51 | extern int eldap_version; /* LDAP version */ |
52 | #endif | |
53 | ||
54 | #ifdef LOOKUP_MYSQL | |
55 | extern uschar *mysql_servers; /* List of servers and connect info */ | |
56 | #endif | |
57 | ||
58 | #ifdef LOOKUP_ORACLE | |
59 | extern uschar *oracle_servers; /* List of servers and connect info */ | |
60 | #endif | |
61 | ||
62 | #ifdef LOOKUP_PGSQL | |
63 | extern uschar *pgsql_servers; /* List of servers and connect info */ | |
64 | #endif | |
65 | ||
de78e2d5 | 66 | #ifdef LOOKUP_REDIS |
9bdd29ad TL |
67 | extern uschar *redis_servers; /* List of servers and connect info */ |
68 | #endif | |
69 | ||
31480e42 PH |
70 | #ifdef LOOKUP_SQLITE |
71 | extern int sqlite_lock_timeout; /* Internal lock waiting timeout */ | |
72 | #endif | |
73 | ||
059ec3d9 PH |
74 | #ifdef SUPPORT_MOVE_FROZEN_MESSAGES |
75 | extern BOOL move_frozen_messages; /* Get them out of the normal directory */ | |
76 | #endif | |
77 | ||
78 | /* These variables are outside the #ifdef because it keeps the code less | |
79 | cluttered in several places (e.g. during logging) if we can always refer to | |
80 | them. Also, the tls_ variables are now always visible. */ | |
81 | ||
817d9f57 JH |
82 | typedef struct { |
83 | int active; /* fd/socket when in a TLS session */ | |
84 | int bits; /* bits used in TLS session */ | |
85 | BOOL certificate_verified; /* Client certificate verified */ | |
53a7196b JH |
86 | #ifdef EXPERIMENTAL_DANE |
87 | BOOL dane_verified; /* ... via DANE */ | |
594706ea | 88 | int tlsa_usage; /* TLSA record(s) usage */ |
53a7196b | 89 | #endif |
817d9f57 JH |
90 | uschar *cipher; /* Cipher used */ |
91 | BOOL on_connect; /* For older MTAs that don't STARTTLS */ | |
92 | uschar *on_connect_ports; /* Ports always tls-on-connect */ | |
9d1c15ef JH |
93 | void *ourcert; /* Certificate we presented, binary */ |
94 | void *peercert; /* Certificate of peer, binary */ | |
817d9f57 | 95 | uschar *peerdn; /* DN from peer */ |
817d9f57 | 96 | uschar *sni; /* Server Name Indication */ |
44662487 JH |
97 | enum { |
98 | OCSP_NOT_REQ=0, /* not requested */ | |
99 | OCSP_NOT_RESP, /* no response to request */ | |
018058b2 JH |
100 | OCSP_VFY_NOT_TRIED, /* response not verified */ |
101 | OCSP_FAILED, /* verify failed */ | |
44662487 JH |
102 | OCSP_VFIED /* verified */ |
103 | } ocsp; /* Stapled OCSP status */ | |
817d9f57 JH |
104 | } tls_support; |
105 | extern tls_support tls_in; | |
106 | extern tls_support tls_out; | |
059ec3d9 PH |
107 | |
108 | #ifdef SUPPORT_TLS | |
e6060e2c | 109 | extern BOOL gnutls_compat_mode; /* Less security, more compatibility */ |
2519e60d | 110 | extern BOOL gnutls_allow_auto_pkcs11; /* Let GnuTLS autoload PKCS11 modules */ |
77bb000f | 111 | extern uschar *openssl_options; /* OpenSSL compatibility options */ |
059ec3d9 | 112 | extern const pcre *regex_STARTTLS; /* For recognizing STARTTLS settings */ |
059ec3d9 | 113 | extern uschar *tls_certificate; /* Certificate file */ |
44bbabb5 | 114 | extern uschar *tls_channelbinding_b64; /* string of base64 channel binding */ |
059ec3d9 | 115 | extern uschar *tls_crl; /* CRL File */ |
3375e053 | 116 | extern int tls_dh_max_bits; /* don't accept higher lib suggestions */ |
059ec3d9 | 117 | extern uschar *tls_dhparam; /* DH param file */ |
10ca4f1c | 118 | extern uschar *tls_eccurve; /* EC curve */ |
23f3dc67 | 119 | # ifndef DISABLE_OCSP |
3f7eeb86 | 120 | extern uschar *tls_ocsp_file; /* OCSP stapling proof file */ |
23f3dc67 | 121 | # endif |
059ec3d9 PH |
122 | extern uschar *tls_privatekey; /* Private key file */ |
123 | extern BOOL tls_remember_esmtp; /* For YAEB */ | |
124 | extern uschar *tls_require_ciphers; /* So some can be avoided */ | |
125 | extern uschar *tls_try_verify_hosts; /* Optional client verification */ | |
126 | extern uschar *tls_verify_certificates;/* Path for certificates to check */ | |
127 | extern uschar *tls_verify_hosts; /* Mandatory client verification */ | |
128 | #endif | |
23f3dc67 | 129 | extern uschar *tls_advertise_hosts; /* host for which TLS is advertised */ |
059ec3d9 | 130 | |
6c1c3d1d WB |
131 | extern uschar *dsn_envid; /* DSN envid string */ |
132 | extern int dsn_ret; /* DSN ret type*/ | |
133 | extern const pcre *regex_DSN; /* For recognizing DSN settings */ | |
6c1c3d1d | 134 | extern uschar *dsn_advertise_hosts; /* host for which TLS is advertised */ |
059ec3d9 PH |
135 | |
136 | /* Input-reading functions for messages, so we can use special ones for | |
137 | incoming TCP/IP. */ | |
138 | ||
bd8fbe36 | 139 | extern int (*lwr_receive_getc)(unsigned); |
0d81dabc | 140 | extern uschar * (*lwr_receive_getbuf)(unsigned *); |
7e3ce68e | 141 | extern int (*lwr_receive_ungetc)(int); |
bd8fbe36 | 142 | extern int (*receive_getc)(unsigned); |
0d81dabc | 143 | extern uschar * (*receive_getbuf)(unsigned *); |
584e96c6 | 144 | extern void (*receive_get_cache)(void); |
059ec3d9 PH |
145 | extern int (*receive_ungetc)(int); |
146 | extern int (*receive_feof)(void); | |
147 | extern int (*receive_ferror)(void); | |
58eb016e | 148 | extern BOOL (*receive_smtp_buffered)(void); |
059ec3d9 PH |
149 | |
150 | ||
151 | /* For clearing, saving, restoring address expansion variables. We have to have | |
152 | the size of this vector set explicitly, because it is referenced from more than | |
153 | one module. */ | |
154 | ||
55414b25 | 155 | extern const uschar **address_expansions[ADDRESS_EXPANSIONS_COUNT]; |
059ec3d9 PH |
156 | |
157 | /* General global variables */ | |
158 | ||
159 | extern BOOL accept_8bitmime; /* Allow *BITMIME incoming */ | |
bc3c7bb7 | 160 | extern uschar *add_environment; /* List of environment variables to add */ |
71fafd95 | 161 | extern header_line *acl_added_headers; /* Headers added by an ACL */ |
059ec3d9 | 162 | extern tree_node *acl_anchor; /* Tree of named ACLs */ |
525239c1 JH |
163 | extern uschar *acl_arg[9]; /* Argument to ACL call */ |
164 | extern int acl_narg; /* Number of arguments to ACL call */ | |
e1d04f48 | 165 | extern int acl_level; /* Nesting depth and debug indent */ |
059ec3d9 | 166 | extern uschar *acl_not_smtp; /* ACL run for non-SMTP messages */ |
54cdb463 PH |
167 | #ifdef WITH_CONTENT_SCAN |
168 | extern uschar *acl_not_smtp_mime; /* For MIME parts of ditto */ | |
169 | #endif | |
45b91596 | 170 | extern uschar *acl_not_smtp_start; /* ACL run at the beginning of a non-SMTP session */ |
e7568d51 | 171 | extern uschar *acl_removed_headers; /* Headers deleted by an ACL */ |
059ec3d9 PH |
172 | extern uschar *acl_smtp_auth; /* ACL run for AUTH */ |
173 | extern uschar *acl_smtp_connect; /* ACL run on SMTP connection */ | |
174 | extern uschar *acl_smtp_data; /* ACL run after DATA received */ | |
8ccd00b1 | 175 | #ifndef DISABLE_PRDR |
fd98a5c6 JH |
176 | extern uschar *acl_smtp_data_prdr; /* ACL run after DATA received if in PRDR mode*/ |
177 | const extern pcre *regex_PRDR; /* For recognizing PRDR settings */ | |
178 | #endif | |
80a47a2c TK |
179 | #ifndef DISABLE_DKIM |
180 | extern uschar *acl_smtp_dkim; /* ACL run for DKIM signatures / domains */ | |
181 | #endif | |
059ec3d9 PH |
182 | extern uschar *acl_smtp_etrn; /* ACL run for ETRN */ |
183 | extern uschar *acl_smtp_expn; /* ACL run for EXPN */ | |
184 | extern uschar *acl_smtp_helo; /* ACL run for HELO/EHLO */ | |
185 | extern uschar *acl_smtp_mail; /* ACL run for MAIL */ | |
186 | extern uschar *acl_smtp_mailauth; /* ACL run for MAIL AUTH */ | |
8523533c TK |
187 | #ifdef WITH_CONTENT_SCAN |
188 | extern uschar *acl_smtp_mime; /* ACL run after DATA, before acl_smtp_data, for each MIME part */ | |
189 | #endif | |
8f128379 | 190 | extern uschar *acl_smtp_notquit; /* ACL run for disconnects */ |
059ec3d9 PH |
191 | extern uschar *acl_smtp_predata; /* ACL run for DATA command */ |
192 | extern uschar *acl_smtp_quit; /* ACL run for QUIT */ | |
193 | extern uschar *acl_smtp_rcpt; /* ACL run for RCPT */ | |
194 | extern uschar *acl_smtp_starttls; /* ACL run for STARTTLS */ | |
195 | extern uschar *acl_smtp_vrfy; /* ACL run for VRFY */ | |
196 | extern BOOL acl_temp_details; /* TRUE to give details for 4xx error */ | |
38a0a95f | 197 | extern tree_node *acl_var_c; /* ACL connection variables */ |
85ffcba6 | 198 | extern tree_node *acl_var_m; /* ACL message variables */ |
059ec3d9 | 199 | extern uschar *acl_verify_message; /* User message for verify failure */ |
059ec3d9 | 200 | extern string_item *acl_warn_logged; /* Logged lines */ |
a5bd321b | 201 | extern uschar *acl_wherecodes[]; /* Response codes for ACL fails */ |
059ec3d9 | 202 | extern uschar *acl_wherenames[]; /* Names for messages */ |
69358f02 PH |
203 | extern BOOL active_local_from_check;/* For adding Sender: (switchable) */ |
204 | extern BOOL active_local_sender_retain; /* For keeping Sender: (switchable) */ | |
059ec3d9 PH |
205 | extern address_item *addr_duplicate; /* Duplicate address list */ |
206 | extern address_item address_defaults; /* Default data for address item */ | |
207 | extern uschar *address_file; /* Name of file when delivering to one */ | |
208 | extern uschar *address_pipe; /* Pipe command when delivering to one */ | |
209 | extern BOOL address_test_mode; /* True for -bt */ | |
210 | extern tree_node *addresslist_anchor; /* Tree of defined address lists */ | |
211 | extern int addresslist_count; /* Number defined */ | |
212 | extern gid_t *admin_groups; /* List of admin groups */ | |
213 | extern BOOL admin_user; /* True if caller can do admin */ | |
c46782ef | 214 | extern BOOL allow_auth_unadvertised;/* As it says */ |
059ec3d9 PH |
215 | extern BOOL allow_domain_literals; /* As it says */ |
216 | extern BOOL allow_mx_to_ip; /* Allow MX records to -> ip address */ | |
217 | extern BOOL allow_unqualified_recipient; /* As it says */ | |
218 | extern BOOL allow_unqualified_sender; /* Ditto */ | |
219 | extern BOOL allow_utf8_domains; /* For experimenting */ | |
2d07a215 | 220 | extern uschar *authenticated_fail_id; /* ID that failed authentication */ |
059ec3d9 PH |
221 | extern uschar *authenticated_id; /* ID that was authenticated */ |
222 | extern uschar *authenticated_sender; /* From AUTH on MAIL */ | |
223 | extern BOOL authentication_failed; /* TRUE if AUTH was tried and failed */ | |
224 | extern uschar *auth_advertise_hosts; /* Only advertise to these */ | |
225 | extern auth_info auths_available[]; /* Vector of available auth mechanisms */ | |
226 | extern auth_instance *auths; /* Chain of instantiated auths */ | |
227 | extern auth_instance auth_defaults; /* Default values */ | |
228 | extern uschar *auth_defer_msg; /* Error message for log */ | |
229 | extern uschar *auth_defer_user_msg; /* Error message for user */ | |
f78eb7c6 | 230 | extern uschar *auth_vars[]; /* $authn variables */ |
059ec3d9 | 231 | extern int auto_thaw; /* Auto-thaw interval */ |
8523533c | 232 | #ifdef WITH_CONTENT_SCAN |
9e949f00 | 233 | extern BOOL av_failed; /* TRUE if the AV process failed */ |
8523533c TK |
234 | extern uschar *av_scanner; /* AntiVirus scanner to use for the malware condition */ |
235 | #endif | |
059ec3d9 PH |
236 | |
237 | extern BOOL background_daemon; /* Set FALSE to keep in foreground */ | |
238 | extern uschar *base62_chars; /* Table of base-62 characters */ | |
239 | extern uschar *bi_command; /* Command for -bi option */ | |
240 | extern uschar *big_buffer; /* Used for various temp things */ | |
241 | extern int big_buffer_size; /* Current size (can expand) */ | |
8523533c TK |
242 | #ifdef EXPERIMENTAL_BRIGHTMAIL |
243 | extern uschar *bmi_alt_location; /* expansion variable that contains the alternate location for the rcpt (available during routing) */ | |
244 | extern uschar *bmi_base64_tracker_verdict; /* expansion variable with base-64 encoded OLD verdict string (available during routing) */ | |
245 | extern uschar *bmi_base64_verdict; /* expansion variable with base-64 encoded verdict string (available during routing) */ | |
246 | extern uschar *bmi_config_file; /* Brightmail config file */ | |
247 | extern int bmi_deliver; /* Flag that determines if the message should be delivered to the rcpt (available during routing) */ | |
248 | extern int bmi_run; /* Flag that determines if message should be run through Brightmail server */ | |
249 | extern uschar *bmi_verdicts; /* BASE64-encoded verdicts with recipient lists */ | |
250 | #endif | |
32b8ce41 | 251 | extern int bsmtp_transaction_linecount; /* Start of last transaction */ |
939c3e34 | 252 | extern int body_8bitmime; /* sender declared BODY= ; 7=7BIT, 8=8BITMIME */ |
059ec3d9 PH |
253 | extern uschar *bounce_message_file; /* Template file */ |
254 | extern uschar *bounce_message_text; /* One-liner */ | |
255 | extern uschar *bounce_recipient; /* When writing an errmsg */ | |
256 | extern BOOL bounce_return_body; /* Include body in returned message */ | |
62b7cd08 | 257 | extern int bounce_return_linesize_limit; /* Max line length in return */ |
059ec3d9 PH |
258 | extern BOOL bounce_return_message; /* Include message in bounce */ |
259 | extern int bounce_return_size_limit; /* Max amount to return */ | |
260 | extern uschar *bounce_sender_authentication; /* AUTH address for bounces */ | |
32b8ce41 | 261 | extern uschar *builtin_macros_create_trigger; /* config file line causing lazy-create */ |
059ec3d9 | 262 | |
055e2cb4 | 263 | extern uschar *callout_address; /* Address used for a malware/spamd/verify etc. callout */ |
059ec3d9 PH |
264 | extern int callout_cache_domain_positive_expire; /* Time for positive domain callout cache records to expire */ |
265 | extern int callout_cache_domain_negative_expire; /* Time for negative domain callout cache records to expire */ | |
266 | extern int callout_cache_positive_expire; /* Time for positive callout cache records to expire */ | |
267 | extern int callout_cache_negative_expire; /* Time for negative callout cache records to expire */ | |
268 | extern uschar *callout_random_local_part; /* Local part to be used to check if server called will accept any local part */ | |
269 | extern uschar *check_dns_names_pattern;/* Regex for syntax check */ | |
270 | extern int check_log_inodes; /* Minimum for message acceptance */ | |
271 | extern int check_log_space; /* Minimum for message acceptance */ | |
a0d6ba8a | 272 | extern BOOL check_rfc2047_length; /* Check RFC 2047 encoded string length */ |
059ec3d9 PH |
273 | extern int check_spool_inodes; /* Minimum for message acceptance */ |
274 | extern int check_spool_space; /* Minimum for message acceptance */ | |
aa368db3 | 275 | extern uschar *chunking_advertise_hosts; /* RFC 3030 CHUNKING */ |
18481de3 | 276 | extern unsigned chunking_datasize; |
7e3ce68e JH |
277 | extern unsigned chunking_data_left; |
278 | extern BOOL chunking_offered; | |
18481de3 | 279 | extern chunking_state_t chunking_state; |
c8e2fc1e JH |
280 | extern uschar *client_authenticator; /* Authenticator name used for smtp delivery */ |
281 | extern uschar *client_authenticated_id; /* "login" name used for SMTP AUTH */ | |
282 | extern uschar *client_authenticated_sender; /* AUTH option to SMTP MAIL FROM (not yet used) */ | |
059ec3d9 PH |
283 | extern int clmacro_count; /* Number of command line macros */ |
284 | extern uschar *clmacros[]; /* Copy of them, for re-exec */ | |
f33875c3 | 285 | extern BOOL commandline_checks_require_admin; /* belt and braces for insecure setups */ |
059ec3d9 PH |
286 | extern int connection_max_messages;/* Max down one SMTP connection */ |
287 | extern BOOL config_changed; /* True if -C used */ | |
288 | extern FILE *config_file; /* Configuration file */ | |
18d6b513 | 289 | extern const uschar *config_filename; /* Configuration file name */ |
35edf2ff | 290 | extern gid_t config_gid; /* Additional group owner */ |
059ec3d9 PH |
291 | extern int config_lineno; /* Line number */ |
292 | extern uschar *config_main_filelist; /* List of possible config files */ | |
293 | extern uschar *config_main_filename; /* File name actually used */ | |
98b8312f | 294 | extern uschar *config_main_directory; /* Directory where the main config file was found */ |
059ec3d9 | 295 | extern uid_t config_uid; /* Additional owner */ |
5013d912 | 296 | extern uschar *continue_proxy_cipher; /* TLS cipher for proxied continued delivery */ |
059ec3d9 PH |
297 | extern uschar *continue_hostname; /* Host for continued delivery */ |
298 | extern uschar *continue_host_address; /* IP address for ditto */ | |
299 | extern BOOL continue_more; /* Flag more addresses waiting */ | |
300 | extern int continue_sequence; /* Sequence num for continued delivery */ | |
301 | extern uschar *continue_transport; /* Transport for continued delivery */ | |
302 | ||
e5a9dba6 | 303 | extern uschar *csa_status; /* Client SMTP Authorization result */ |
5032d1cf JH |
304 | |
305 | typedef struct { | |
57cc2785 | 306 | unsigned callout_hold_only:1; /* Conn is only for verify callout */ |
ff5929e3 | 307 | unsigned delivery:1; /* When to attempt */ |
4c04137d | 308 | unsigned defer_pass:1; /* Pass 4xx to caller rather than spooling */ |
57cc2785 | 309 | unsigned is_tls:1; /* Conn has TLS active */ |
5032d1cf JH |
310 | int fd; /* Open connection */ |
311 | int nrcpt; /* Count of addresses */ | |
57cc2785 | 312 | uschar * transport; /* Name of transport */ |
5032d1cf | 313 | uschar * interface; /* (address of) */ |
57cc2785 JH |
314 | uschar * snd_ip; /* sending_ip_address */ |
315 | int snd_port; /* sending_port */ | |
316 | unsigned peer_options; /* smtp_peer_options */ | |
5032d1cf JH |
317 | host_item host; /* Host used */ |
318 | address_item addr; /* (Chain of) addresses */ | |
319 | } cut_t; | |
320 | extern cut_t cutthrough; /* Deliver-concurrently */ | |
e5a9dba6 | 321 | |
059ec3d9 PH |
322 | extern BOOL daemon_listen; /* True if listening required */ |
323 | extern uschar *daemon_smtp_port; /* Can be a list of ports */ | |
4aee0225 PH |
324 | extern int daemon_startup_retries; /* Number of times to retry */ |
325 | extern int daemon_startup_sleep; /* Sleep between retries */ | |
6a8f9482 TK |
326 | |
327 | #ifdef EXPERIMENTAL_DCC | |
328 | extern BOOL dcc_direct_add_header; /* directly add header */ | |
329 | extern uschar *dcc_header; /* dcc header */ | |
330 | extern uschar *dcc_result; /* dcc result */ | |
331 | extern uschar *dccifd_address; /* address of the dccifd daemon */ | |
332 | extern uschar *dccifd_options; /* options for the dccifd daemon */ | |
333 | #endif | |
334 | ||
3d235903 | 335 | extern BOOL debug_daemon; /* Debug the daemon process only */ |
059ec3d9 PH |
336 | extern int debug_fd; /* The fd for debug_file */ |
337 | extern FILE *debug_file; /* Where to write debugging info */ | |
6c6d6e48 | 338 | extern int debug_notall[]; /* Debug options excluded from +all */ |
059ec3d9 PH |
339 | extern bit_table debug_options[]; /* Table of debug options */ |
340 | extern int debug_options_count; /* Size of table */ | |
64073d9c | 341 | extern BOOL debug_store; /* Do extra checks on store_reset */ |
059ec3d9 PH |
342 | extern int delay_warning[]; /* Times between warnings */ |
343 | extern uschar *delay_warning_condition; /* Condition string for warnings */ | |
344 | extern BOOL delivery_date_remove; /* Remove delivery-date headers */ | |
345 | ||
346 | extern uschar *deliver_address_data; /* Arbitrary data for an address */ | |
347 | extern int deliver_datafile; /* FD for data part of message */ | |
55414b25 | 348 | extern const uschar *deliver_domain; /* The local domain for delivery */ |
059ec3d9 | 349 | extern uschar *deliver_domain_data; /* From domain lookup */ |
55414b25 JH |
350 | extern const uschar *deliver_domain_orig; /* The original local domain for delivery */ |
351 | extern const uschar *deliver_domain_parent; /* The parent domain for delivery */ | |
059ec3d9 PH |
352 | extern BOOL deliver_drop_privilege; /* TRUE for unprivileged delivery */ |
353 | extern BOOL deliver_firsttime; /* True for first delivery attempt */ | |
354 | extern BOOL deliver_force; /* TRUE if delivery was forced */ | |
355 | extern BOOL deliver_freeze; /* TRUE if delivery is frozen */ | |
19050083 | 356 | extern time_t deliver_frozen_at; /* Time of freezing */ |
059ec3d9 | 357 | extern uschar *deliver_home; /* Home directory for pipes */ |
55414b25 | 358 | extern const uschar *deliver_host; /* (First) host for routed local deliveries */ |
059ec3d9 | 359 | /* Remote host for filter */ |
55414b25 | 360 | extern const uschar *deliver_host_address; /* Address for remote delivery filter */ |
a7538db1 | 361 | extern int deliver_host_port; /* Address for remote delivery filter */ |
059ec3d9 PH |
362 | extern uschar *deliver_in_buffer; /* Buffer for copying file */ |
363 | extern ino_t deliver_inode; /* Inode for appendfile */ | |
364 | extern uschar *deliver_localpart; /* The local part for delivery */ | |
365 | extern uschar *deliver_localpart_data; /* From local part lookup */ | |
366 | extern uschar *deliver_localpart_orig; /* The original local part for delivery */ | |
367 | extern uschar *deliver_localpart_parent; /* The parent local part for delivery */ | |
368 | extern uschar *deliver_localpart_prefix; /* The stripped prefix, if any */ | |
369 | extern uschar *deliver_localpart_suffix; /* The stripped suffix, if any */ | |
370 | extern BOOL deliver_force_thaw; /* TRUE to force thaw in queue run */ | |
371 | extern BOOL deliver_manual_thaw; /* TRUE if manually thawed */ | |
372 | extern uschar *deliver_out_buffer; /* Buffer for copying file */ | |
373 | extern int deliver_queue_load_max; /* Different value for queue running */ | |
374 | extern address_item *deliver_recipients; /* Current set of addresses */ | |
375 | extern uschar *deliver_selectstring; /* For selecting by recipient */ | |
376 | extern BOOL deliver_selectstring_regex; /* String is regex */ | |
377 | extern uschar *deliver_selectstring_sender; /* For selecting by sender */ | |
378 | extern BOOL deliver_selectstring_sender_regex; /* String is regex */ | |
4c590bd1 | 379 | extern BOOL disable_callout_flush; /* Don't flush before callouts */ |
047bdd8c | 380 | extern BOOL disable_delay_flush; /* Don't flush before "delay" in ACL */ |
54fc8428 PH |
381 | #ifdef ENABLE_DISABLE_FSYNC |
382 | extern BOOL disable_fsync; /* Not for normal use */ | |
383 | #endif | |
7e66e54d | 384 | extern BOOL disable_ipv6; /* Don't do any IPv6 things */ |
059ec3d9 PH |
385 | extern BOOL disable_logging; /* Disables log writing when TRUE */ |
386 | ||
80a47a2c | 387 | #ifndef DISABLE_DKIM |
abe1010c | 388 | extern BOOL dkim_collect_input; /* Runtime flag that tracks wether SMTP input is fed to DKIM validation */ |
2df588c9 | 389 | extern uschar *dkim_cur_signer; /* Expansion variable, holds the current "signer" domain or identity during a acl_smtp_dkim run */ |
abe1010c JH |
390 | extern BOOL dkim_disable_verify; /* Set via ACL control statement. When set, DKIM verification is disabled for the current message */ |
391 | extern int dkim_key_length; /* Expansion variable, length of signing key in bits */ | |
9e5d6b55 | 392 | extern uschar *dkim_signers; /* Expansion variable, holds colon-separated list of domains and identities that have signed a message */ |
80a47a2c TK |
393 | extern uschar *dkim_signing_domain; /* Expansion variable, domain used for signing a message. */ |
394 | extern uschar *dkim_signing_selector; /* Expansion variable, selector used for signing a message. */ | |
395 | extern uschar *dkim_verify_signers; /* Colon-separated list of domains for each of which we call the DKIM ACL */ | |
a79d8834 JH |
396 | extern uschar *dkim_verify_status; /* result for this signature */ |
397 | extern uschar *dkim_verify_reason; /* result for this signature */ | |
f7572e5a | 398 | #endif |
4840604e | 399 | #ifdef EXPERIMENTAL_DMARC |
4a8ce2d8 | 400 | extern BOOL dmarc_has_been_checked; /* Global variable to check if test has been called yet */ |
4840604e | 401 | extern uschar *dmarc_ar_header; /* Expansion variable, suggested header for dmarc auth results */ |
8c8b8274 | 402 | extern uschar *dmarc_domain_policy; /* Expansion for declared policy of used domain */ |
4840604e TL |
403 | extern uschar *dmarc_forensic_sender; /* Set sender address for forensic reports */ |
404 | extern uschar *dmarc_history_file; /* Expansion variable, file to store dmarc results */ | |
405 | extern uschar *dmarc_status; /* Expansion variable, one word value */ | |
406 | extern uschar *dmarc_status_text; /* Expansion variable, human readable value */ | |
407 | extern uschar *dmarc_tld_file; /* Mozilla TLDs text file */ | |
408 | extern uschar *dmarc_used_domain; /* Expansion variable, domain libopendmarc chose for DMARC policy lookup */ | |
409 | extern BOOL dmarc_disable_verify; /* Set via ACL control statement. When set, DMARC verification is disabled for the current message */ | |
410 | extern BOOL dmarc_enable_forensic; /* Set via ACL control statement. When set, DMARC forensic reports are enabled for the current message */ | |
411 | #endif | |
f7572e5a | 412 | |
059ec3d9 | 413 | extern uschar *dns_again_means_nonexist; /* Domains that are badly set up */ |
e5a9dba6 PH |
414 | extern int dns_csa_search_limit; /* How deep to search for CSA SRV records */ |
415 | extern BOOL dns_csa_use_reverse; /* Check CSA in reverse DNS? (non-standard) */ | |
059ec3d9 | 416 | extern uschar *dns_ipv4_lookup; /* For these domains, don't look for AAAA (or A6) */ |
e682570f TL |
417 | #ifdef EXPERIMENTAL_DANE |
418 | extern int dns_dane_ok; /* Ok to use DANE when checking TLS authenticity */ | |
419 | #endif | |
059ec3d9 PH |
420 | extern int dns_retrans; /* Retransmission time setting */ |
421 | extern int dns_retry; /* Number of retries */ | |
0fbd9bff | 422 | extern int dns_dnssec_ok; /* When constructing DNS query, set DO flag */ |
9820a77f | 423 | extern uschar *dns_trust_aa; /* DNSSEC trust AA as AD */ |
e97d1f08 | 424 | extern int dns_use_edns0; /* Coerce EDNS0 support on/off in resolver. */ |
059ec3d9 | 425 | extern uschar *dnslist_domain; /* DNS (black) list domain */ |
93655c46 | 426 | extern uschar *dnslist_matched; /* DNS (black) list matched key */ |
059ec3d9 PH |
427 | extern uschar *dnslist_text; /* DNS (black) list text message */ |
428 | extern uschar *dnslist_value; /* DNS (black) list IP address */ | |
429 | extern tree_node *domainlist_anchor; /* Tree of defined domain lists */ | |
430 | extern int domainlist_count; /* Number defined */ | |
431 | extern BOOL dont_deliver; /* TRUE for -N option */ | |
432 | extern BOOL dot_ends; /* TRUE if "." ends non-SMTP input */ | |
433 | ||
434 | /* This option is now a no-opt, retained for compatibility */ | |
435 | extern BOOL drop_cr; /* For broken local MUAs */ | |
436 | ||
0e22dfd1 PH |
437 | extern uschar *dsn_from; /* From: string for DSNs */ |
438 | ||
059ec3d9 | 439 | extern BOOL enable_dollar_recipients; /* Make $recipients available */ |
a207d5dd | 440 | extern BOOL envelope_to_remove; /* Remove envelope_to_headers */ |
059ec3d9 PH |
441 | extern int errno_quota; /* Quota errno in this OS */ |
442 | extern int error_handling; /* Error handling style */ | |
443 | extern uschar *errors_copy; /* For taking copies of errors */ | |
444 | extern uschar *errors_reply_to; /* Reply-to for error messages */ | |
445 | extern int errors_sender_rc; /* Return after message to sender*/ | |
774ef2d7 | 446 | |
0cbf2b82 | 447 | #ifndef DISABLE_EVENT |
774ef2d7 JH |
448 | extern uschar *event_action; /* expansion for delivery events */ |
449 | extern uschar *event_data; /* event data */ | |
450 | extern int event_defer_errno; /* error number set when a remote delivery is deferred with a host error */ | |
55414b25 | 451 | extern const uschar *event_name; /* event classification */ |
774ef2d7 JH |
452 | #endif |
453 | ||
059ec3d9 PH |
454 | extern gid_t exim_gid; /* To be used with exim_uid */ |
455 | extern BOOL exim_gid_set; /* TRUE if exim_gid set */ | |
456 | extern uschar *exim_path; /* Path to exec exim */ | |
98a90c36 | 457 | extern const uschar *exim_sieve_extension_list[]; /* list of sieve extensions */ |
059ec3d9 PH |
458 | extern uid_t exim_uid; /* Non-root uid for exim */ |
459 | extern BOOL exim_uid_set; /* TRUE if exim_uid set */ | |
e1d04f48 | 460 | extern int expand_level; /* Nesting depth; indent for debug */ |
059ec3d9 PH |
461 | extern int expand_forbid; /* RDO flags for forbidding things */ |
462 | extern int expand_nlength[]; /* Lengths of numbered strings */ | |
463 | extern int expand_nmax; /* Max numerical value */ | |
464 | extern uschar *expand_nstring[]; /* Numbered strings */ | |
465 | extern BOOL expand_string_forcedfail; /* TRUE if failure was "expected" */ | |
466 | extern BOOL extract_addresses_remove_arguments; /* Controls -t behaviour */ | |
467 | extern uschar *extra_local_interfaces; /* Local, non-listen interfaces */ | |
468 | ||
29aba418 TF |
469 | extern int fake_response; /* Fake FAIL or DEFER response to data */ |
470 | extern uschar *fake_response_text; /* User defined message for the above. Default is in globals.c. */ | |
059ec3d9 PH |
471 | extern int filter_n[FILTER_VARIABLE_COUNT]; /* filter variables */ |
472 | extern BOOL filter_running; /* TRUE while running a filter */ | |
473 | extern int filter_sn[FILTER_VARIABLE_COUNT]; /* variables set by system filter */ | |
f05da2e8 PH |
474 | extern int filter_test; /* Filter test type */ |
475 | extern uschar *filter_test_sfile; /* System filter test file */ | |
476 | extern uschar *filter_test_ufile; /* User filter test file */ | |
059ec3d9 PH |
477 | extern uschar *filter_thisaddress; /* For address looping */ |
478 | extern int finduser_retries; /* Retry count for getpwnam() */ | |
479 | extern uid_t fixed_never_users[]; /* Can't be overridden */ | |
480 | extern uschar *freeze_tell; /* Message on (some) freezings */ | |
6a3f1455 | 481 | extern uschar *freeze_tell_config; /* The configured setting */ |
059ec3d9 PH |
482 | extern uschar *fudged_queue_times; /* For use in test harness */ |
483 | ||
484 | extern uschar *gecos_name; /* To be expanded when pattern matches */ | |
485 | extern uschar *gecos_pattern; /* Pattern to match */ | |
486 | extern rewrite_rule *global_rewrite_rules; /* Chain of rewriting rules */ | |
487 | ||
488 | extern int header_insert_maxlen; /* Max for inserting headers */ | |
489 | extern int header_maxsize; /* Max total length for header */ | |
490 | extern int header_line_maxsize; /* Max for an individual line */ | |
491 | extern header_name header_names[]; /* Table of header names */ | |
492 | extern int header_names_size; /* Number of entries */ | |
493 | extern BOOL header_rewritten; /* TRUE if header changed by router */ | |
494 | extern uschar *helo_accept_junk_hosts; /* Allowed to use junk arg */ | |
495 | extern uschar *helo_allow_chars; /* Rogue chars to allow in HELO/EHLO */ | |
496 | extern uschar *helo_lookup_domains; /* If these given, lookup host name */ | |
497 | extern uschar *helo_try_verify_hosts; /* Soft check HELO argument for these */ | |
498 | extern BOOL helo_verified; /* True if HELO verified */ | |
d7b47fd0 | 499 | extern BOOL helo_verify_failed; /* True if attempt failed */ |
059ec3d9 | 500 | extern uschar *helo_verify_hosts; /* Hard check HELO argument for these */ |
1ba28e2b | 501 | extern const uschar *hex_digits; /* Used in several places */ |
059ec3d9 PH |
502 | extern uschar *hold_domains; /* Hold up deliveries to these */ |
503 | extern BOOL host_find_failed_syntax;/* DNS syntax check failure */ | |
504 | extern BOOL host_checking_callout; /* TRUE if real callout wanted */ | |
505 | extern uschar *host_data; /* Obtained from lookup in ACL */ | |
506 | extern uschar *host_lookup; /* For which IP addresses are always looked up */ | |
b08b24c8 | 507 | extern BOOL host_lookup_deferred; /* TRUE if lookup deferred */ |
059ec3d9 PH |
508 | extern BOOL host_lookup_failed; /* TRUE if lookup failed */ |
509 | extern uschar *host_lookup_order; /* Order of host lookup types */ | |
510 | extern uschar *host_lookup_msg; /* Text for why it failed */ | |
511 | extern int host_number; /* For sharing spools */ | |
512 | extern uschar *host_number_string; /* For expanding */ | |
513 | extern uschar *host_reject_connection; /* Reject these hosts */ | |
514 | extern tree_node *hostlist_anchor; /* Tree of defined host lists */ | |
515 | extern int hostlist_count; /* Number defined */ | |
516 | extern uschar *hosts_connection_nolog; /* Limits the logging option */ | |
517 | extern uschar *hosts_treat_as_local; /* For routing */ | |
518 | ||
519 | extern int ignore_bounce_errors_after; /* Keep them for this time. */ | |
520 | extern BOOL ignore_fromline_local; /* Local SMTP ignore fromline */ | |
521 | extern uschar *ignore_fromline_hosts; /* Hosts permitted to send "From " */ | |
9ee44efb PP |
522 | extern BOOL inetd_wait_mode; /* Whether running in inetd wait mode */ |
523 | extern int inetd_wait_timeout; /* Timeout for inetd wait mode */ | |
3615fa9a | 524 | extern uschar *initial_cwd; /* The directory we where in at startup */ |
059ec3d9 | 525 | extern BOOL is_inetd; /* True for inetd calls */ |
0ce9abe6 | 526 | extern uschar *iterate_item; /* Item from iterate list */ |
059ec3d9 PH |
527 | |
528 | extern int journal_fd; /* Fd for journal file */ | |
529 | ||
bc3c7bb7 | 530 | extern uschar *keep_environment; /* Whitelist for environment variables */ |
059ec3d9 PH |
531 | extern int keep_malformed; /* Time to keep malformed messages */ |
532 | ||
533 | extern uschar *eldap_dn; /* Where LDAP DNs are left */ | |
534 | extern int load_average; /* Most recently read load average */ | |
535 | extern BOOL local_error_message; /* True if handling one of these */ | |
69358f02 | 536 | extern BOOL local_from_check; /* For adding Sender: (global value) */ |
059ec3d9 PH |
537 | extern uschar *local_from_prefix; /* Permitted prefixes */ |
538 | extern uschar *local_from_suffix; /* Permitted suffixes */ | |
539 | extern uschar *local_interfaces; /* For forcing specific interfaces */ | |
540 | extern uschar *local_scan_data; /* Text returned by local_scan() */ | |
541 | extern optionlist local_scan_options[];/* Option list for local_scan() */ | |
542 | extern int local_scan_options_count; /* Size of the list */ | |
543 | extern int local_scan_timeout; /* Timeout for local_scan() */ | |
544 | extern BOOL local_sender_retain; /* Retain Sender: (with no From: check) */ | |
545 | extern gid_t local_user_gid; /* As it says; may be set in routers */ | |
546 | extern uid_t local_user_uid; /* As it says; may be set in routers */ | |
547 | extern tree_node *localpartlist_anchor;/* Tree of defined localpart lists */ | |
548 | extern int localpartlist_count; /* Number defined */ | |
549 | extern uschar *log_buffer; /* For constructing log entries */ | |
6c6d6e48 | 550 | extern int log_default[]; /* Initialization list for log_selector */ |
059ec3d9 | 551 | extern uschar *log_file_path; /* If unset, use default */ |
6c6d6e48 | 552 | extern int log_notall[]; /* Log options excluded from +all */ |
059ec3d9 PH |
553 | extern bit_table log_options[]; /* Table of options */ |
554 | extern int log_options_count; /* Size of table */ | |
6ea85e9a | 555 | extern int log_reject_target; /* Target log for ACL rejections */ |
6c6d6e48 | 556 | extern unsigned int log_selector[]; /* Bit map of logging options */ |
059ec3d9 PH |
557 | extern uschar *log_selector_string; /* As supplied in the config */ |
558 | extern FILE *log_stderr; /* Copy of stderr for log use, or NULL */ | |
559 | extern BOOL log_testing_mode; /* TRUE in various testing modes */ | |
560 | extern BOOL log_timezone; /* TRUE to include the timezone in log lines */ | |
561 | extern uschar *login_sender_address; /* The actual sender address */ | |
e6d225ae | 562 | extern lookup_info **lookup_list; /* Array of pointers to available lookups */ |
059ec3d9 | 563 | extern int lookup_list_count; /* Number of entries in the list */ |
4e0983dc | 564 | extern uschar *lookup_dnssec_authenticated; /* AD status of dns lookup */ |
059ec3d9 PH |
565 | extern int lookup_open_max; /* Max lookup files to cache */ |
566 | extern uschar *lookup_value; /* Value looked up from file */ | |
567 | ||
568 | extern macro_item *macros; /* Configuration macros */ | |
c193398d | 569 | extern macro_item *mlast; /* Last item in macro list */ |
059ec3d9 | 570 | extern uschar *mailstore_basename; /* For mailstore deliveries */ |
8523533c TK |
571 | #ifdef WITH_CONTENT_SCAN |
572 | extern uschar *malware_name; /* Name of virus or malware ("W32/Klez-H") */ | |
573 | #endif | |
d677b2f2 | 574 | extern int max_received_linelength;/* What it says */ |
059ec3d9 PH |
575 | extern int max_username_length; /* For systems with broken getpwnam() */ |
576 | extern int message_age; /* In seconds */ | |
577 | extern uschar *message_body; /* Start of message body for filter */ | |
578 | extern uschar *message_body_end; /* End of message body for filter */ | |
ddea74fa | 579 | extern BOOL message_body_newlines; /* FALSE => remove newlines */ |
059ec3d9 PH |
580 | extern int message_body_size; /* Sic */ |
581 | extern int message_body_visible; /* Amount visible in message_body */ | |
582 | extern int message_ended; /* State of message reading and how ended */ | |
583 | extern uschar *message_headers; /* When built */ | |
584 | extern uschar message_id_option[]; /* -E<message-id> for use as option */ | |
585 | extern uschar *message_id_external; /* External form of following */ | |
586 | extern uschar *message_id_domain; /* Expanded to form domain-part of message_id */ | |
587 | extern uschar *message_id_text; /* Expanded to form message_id */ | |
588 | extern struct timeval message_id_tv; /* Time used to create last message_id */ | |
589 | extern int message_linecount; /* As it says */ | |
590 | extern BOOL message_logs; /* TRUE to write message logs */ | |
591 | extern int message_size; /* Size of message */ | |
592 | extern uschar *message_size_limit; /* As it says */ | |
8c5d388a | 593 | #ifdef SUPPORT_I18N |
eb02f5df | 594 | extern BOOL message_smtputf8; /* Internationalized mail handling */ |
3c8b3577 | 595 | extern int message_utf8_downconvert; /* convert from utf8 */ |
7ade712c | 596 | const extern pcre *regex_UTF8; /* For recognizing SMTPUTF8 settings */ |
eb02f5df | 597 | #endif |
059ec3d9 PH |
598 | extern uschar message_subdir[]; /* Subdirectory for messages */ |
599 | extern uschar *message_reference; /* Reference for error messages */ | |
8523533c TK |
600 | |
601 | /* MIME ACL expandables */ | |
602 | #ifdef WITH_CONTENT_SCAN | |
603 | extern int mime_anomaly_level; | |
1ba28e2b | 604 | extern const uschar *mime_anomaly_text; |
8523533c TK |
605 | extern uschar *mime_boundary; |
606 | extern uschar *mime_charset; | |
607 | extern uschar *mime_content_description; | |
608 | extern uschar *mime_content_disposition; | |
609 | extern uschar *mime_content_id; | |
610 | extern unsigned int mime_content_size; | |
611 | extern uschar *mime_content_transfer_encoding; | |
612 | extern uschar *mime_content_type; | |
613 | extern uschar *mime_decoded_filename; | |
614 | extern uschar *mime_filename; | |
615 | extern int mime_is_multipart; | |
616 | extern int mime_is_coverletter; | |
617 | extern int mime_is_rfc822; | |
618 | extern int mime_part_count; | |
619 | #endif | |
620 | ||
059ec3d9 PH |
621 | extern BOOL mua_wrapper; /* TRUE when Exim is wrapping an MUA */ |
622 | ||
623 | extern uid_t *never_users; /* List of uids never to be used */ | |
8523533c TK |
624 | #ifdef WITH_CONTENT_SCAN |
625 | extern BOOL no_mbox_unspool; /* don't unlink files in /scan directory */ | |
626 | #endif | |
059ec3d9 PH |
627 | extern BOOL no_multiline_responses; /* For broken clients */ |
628 | ||
fb05276a JH |
629 | extern const int on; /* For setsockopt */ |
630 | extern const int off; | |
631 | ||
059ec3d9 PH |
632 | extern optionlist optionlist_auths[]; /* These option lists are made */ |
633 | extern int optionlist_auths_size; /* global so that readconf can */ | |
634 | extern optionlist optionlist_routers[]; /* see them for printing out */ | |
635 | extern int optionlist_routers_size; /* the options. */ | |
636 | extern optionlist optionlist_transports[]; | |
637 | extern int optionlist_transports_size; | |
638 | ||
639 | extern uid_t original_euid; /* Original effective uid */ | |
640 | extern gid_t originator_gid; /* Gid of whoever wrote spool file */ | |
641 | extern uschar *originator_login; /* Login of same */ | |
642 | extern uschar *originator_name; /* Full name of same */ | |
643 | extern uid_t originator_uid; /* Uid of ditto */ | |
644 | extern uschar *override_local_interfaces; /* Value of -oX argument */ | |
645 | extern uschar *override_pid_file_path; /* Value of -oP argument */ | |
646 | ||
647 | extern BOOL parse_allow_group; /* Allow group syntax */ | |
648 | extern BOOL parse_found_group; /* In the middle of a group */ | |
649 | extern uschar *percent_hack_domains; /* Local domains for which '% operates */ | |
650 | extern uschar *pid_file_path; /* For writing daemon pids */ | |
651 | extern uschar *pipelining_advertise_hosts; /* As it says */ | |
cf8b11a5 | 652 | extern BOOL pipelining_enable; /* As it says */ |
8ccd00b1 | 653 | #ifndef DISABLE_PRDR |
fd98a5c6 JH |
654 | extern BOOL prdr_enable; /* As it says */ |
655 | extern BOOL prdr_requested; /* Connecting mail server wants PRDR */ | |
656 | #endif | |
059ec3d9 PH |
657 | extern BOOL preserve_message_logs; /* Save msglog files */ |
658 | extern uschar *primary_hostname; /* Primary name of this computer */ | |
659 | extern BOOL print_topbitchars; /* Topbit chars are printing chars */ | |
660 | extern uschar process_info[]; /* For SIGUSR1 output */ | |
921b12ca | 661 | extern int process_info_len; |
059ec3d9 PH |
662 | extern uschar *process_log_path; /* Alternate path */ |
663 | extern BOOL prod_requires_admin; /* TRUE if prodding requires admin */ | |
a3c86431 | 664 | |
e6d2a989 | 665 | #if defined(SUPPORT_PROXY) || defined(SUPPORT_SOCKS) |
cee5f132 | 666 | extern uschar *hosts_proxy; /* Hostlist which (require) use proxy protocol */ |
e6d2a989 JH |
667 | extern uschar *proxy_external_address; /* IP of remote interface of proxy */ |
668 | extern int proxy_external_port; /* Port on remote interface of proxy */ | |
669 | extern uschar *proxy_local_address; /* IP of local interface of proxy */ | |
670 | extern int proxy_local_port; /* Port on local interface of proxy */ | |
a3c86431 TL |
671 | extern BOOL proxy_session; /* TRUE if receiving mail from valid proxy */ |
672 | extern BOOL proxy_session_failed; /* TRUE if required proxy negotiation failed */ | |
673 | #endif | |
674 | ||
fffda43a TK |
675 | extern uschar *prvscheck_address; /* Set during prvscheck expansion item */ |
676 | extern uschar *prvscheck_keynum; /* Set during prvscheck expansion item */ | |
677 | extern uschar *prvscheck_result; /* Set during prvscheck expansion item */ | |
059ec3d9 | 678 | |
55414b25 | 679 | extern const uschar *qualify_domain_recipient; /* Domain to qualify recipients with */ |
059ec3d9 PH |
680 | extern uschar *qualify_domain_sender; /* Domain to qualify senders with */ |
681 | extern BOOL queue_2stage; /* Run queue in 2-stage manner */ | |
682 | extern uschar *queue_domains; /* Queue these domains */ | |
683 | extern BOOL queue_list_requires_admin; /* TRUE if -bp requires admin */ | |
684 | extern BOOL queue_run_first_delivery; /* If TRUE, first deliveries only */ | |
685 | extern BOOL queue_run_force; /* TRUE to force during queue run */ | |
686 | extern BOOL queue_run_local; /* Local deliveries only in queue run */ | |
687 | extern BOOL queue_running; /* TRUE for queue running process and */ | |
688 | /* immediate children */ | |
689 | extern pid_t queue_run_pid; /* PID of the queue running process or 0 */ | |
690 | extern int queue_run_pipe; /* Pipe for synchronizing */ | |
691 | extern int queue_interval; /* Queue running interval */ | |
a2da3176 | 692 | extern uschar *queue_name; /* Name of queue, if nondefault spooling */ |
059ec3d9 PH |
693 | extern BOOL queue_only; /* TRUE to disable immediate delivery */ |
694 | extern int queue_only_load; /* Max load before auto-queue */ | |
8669f003 | 695 | extern BOOL queue_only_load_latch; /* Latch queue_only_load TRUE */ |
059ec3d9 PH |
696 | extern uschar *queue_only_file; /* Queue if file exists/not-exists */ |
697 | extern BOOL queue_only_override; /* Allow override from command line */ | |
698 | extern BOOL queue_only_policy; /* ACL or local_scan wants queue_only */ | |
699 | extern BOOL queue_run_in_order; /* As opposed to random */ | |
0cd5fd23 | 700 | extern uschar *queue_run_max; /* Max queue runners */ |
4c04137d | 701 | extern BOOL queue_smtp; /* Disable all immediate SMTP (-odqs)*/ |
059ec3d9 PH |
702 | extern uschar *queue_smtp_domains; /* Ditto, for these domains */ |
703 | ||
704 | extern unsigned int random_seed; /* Seed for random numbers */ | |
fe0dab11 | 705 | extern tree_node *ratelimiters_cmd; /* Results of command ratelimit checks */ |
870f6ba8 TF |
706 | extern tree_node *ratelimiters_conn; /* Results of connection ratelimit checks */ |
707 | extern tree_node *ratelimiters_mail; /* Results of per-mail ratelimit checks */ | |
059ec3d9 PH |
708 | extern uschar *raw_active_hostname; /* Pre-expansion */ |
709 | extern uschar *raw_sender; /* Before rewriting */ | |
710 | extern uschar **raw_recipients; /* Before rewriting */ | |
711 | extern int raw_recipients_count; | |
712 | extern int rcpt_count; /* Count of RCPT commands in a message */ | |
713 | extern int rcpt_fail_count; /* Those that got 5xx */ | |
714 | extern int rcpt_defer_count; /* Those that got 4xx */ | |
715 | extern gid_t real_gid; /* Real gid */ | |
716 | extern uid_t real_uid; /* Real user running program */ | |
717 | extern BOOL really_exim; /* FALSE in utilities */ | |
718 | extern BOOL receive_call_bombout; /* Flag for crashing log */ | |
719 | extern int receive_linecount; /* Mainly for BSMTP errors */ | |
720 | extern int receive_messagecount; /* Mainly for BSMTP errors */ | |
721 | extern int receive_timeout; /* For non-SMTP acceptance */ | |
722 | extern int received_count; /* Count of Received: headers */ | |
723 | extern uschar *received_for; /* For "for" field */ | |
724 | extern uschar *received_header_text; /* Definition of Received: header */ | |
725 | extern int received_headers_max; /* Max count of Received: headers */ | |
32dfdf8b | 726 | extern struct timeval received_time; /* Time the message was received */ |
059ec3d9 PH |
727 | extern uschar *recipient_data; /* lookup data for recipients */ |
728 | extern uschar *recipient_unqualified_hosts; /* Permitted unqualified recipients */ | |
2c7db3f5 | 729 | extern uschar *recipient_verify_failure; /* What went wrong */ |
059ec3d9 PH |
730 | extern BOOL recipients_discarded; /* By an ACL */ |
731 | extern int recipients_list_max; /* Maximum number fitting in list */ | |
732 | extern int recipients_max; /* Max permitted */ | |
a207d5dd | 733 | extern BOOL recipients_max_reject; /* If TRUE, reject whole message */ |
059ec3d9 PH |
734 | extern const pcre *regex_AUTH; /* For recognizing AUTH settings */ |
735 | extern const pcre *regex_check_dns_names; /* For DNS name checking */ | |
736 | extern const pcre *regex_From; /* For recognizing "From_" lines */ | |
f98442df | 737 | extern const pcre *regex_CHUNKING; /* For recognizing CHUNKING (RFC 3030) */ |
f1513293 | 738 | extern const pcre *regex_IGNOREQUOTA; /* For recognizing IGNOREQUOTA (LMTP) */ |
059ec3d9 PH |
739 | extern const pcre *regex_PIPELINING; /* For recognizing PIPELINING */ |
740 | extern const pcre *regex_SIZE; /* For recognizing SIZE settings */ | |
741 | extern const pcre *regex_ismsgid; /* Compiled r.e. for message it */ | |
f38917cc JH |
742 | extern const pcre *regex_smtp_code; /* For recognizing SMTP codes */ |
743 | extern uschar *regex_vars[]; /* $regexN variables */ | |
a7cbbf50 PP |
744 | #ifdef WHITELIST_D_MACROS |
745 | extern const pcre *regex_whitelisted_macro; /* For -D macro values */ | |
746 | #endif | |
8523533c TK |
747 | #ifdef WITH_CONTENT_SCAN |
748 | extern uschar *regex_match_string; /* regex that matched a line (regex ACL condition) */ | |
749 | #endif | |
059ec3d9 PH |
750 | extern int remote_delivery_count; /* Number of remote addresses */ |
751 | extern int remote_max_parallel; /* Maximum parallel delivery */ | |
752 | extern uschar *remote_sort_domains; /* Remote domain sorting order */ | |
753 | extern retry_config *retries; /* Chain of retry config information */ | |
754 | extern int retry_data_expire; /* When to expire retry data */ | |
755 | extern int retry_interval_max; /* Absolute maximum */ | |
756 | extern int retry_maximum_timeout; /* The maximum timeout */ | |
757 | extern uschar *return_path; /* Return path for a message */ | |
758 | extern BOOL return_path_remove; /* Remove return-path headers */ | |
759 | extern int rewrite_existflags; /* Indicate which headers have rewrites */ | |
760 | extern uschar *rfc1413_hosts; /* RFC hosts */ | |
761 | extern int rfc1413_query_timeout; /* Timeout on RFC 1413 calls */ | |
762 | /* extern BOOL rfc821_domains; */ /* If set, syntax is 821, not 822 => being abolished */ | |
c1d94452 | 763 | extern uid_t root_gid; /* The gid for root */ |
059ec3d9 PH |
764 | extern uid_t root_uid; /* The uid for root */ |
765 | extern router_info routers_available[];/* Vector of available routers */ | |
766 | extern router_instance *routers; /* Chain of instantiated routers */ | |
767 | extern router_instance router_defaults;/* Default values */ | |
181d9bf8 | 768 | extern uschar *router_name; /* Name of router last started */ |
059ec3d9 PH |
769 | extern BOOL running_in_test_harness; /*TRUE when running_status is patched */ |
770 | extern ip_address_item *running_interfaces; /* Host's running interfaces */ | |
771 | extern uschar *running_status; /* Flag string for testing */ | |
772 | extern int runrc; /* rc from ${run} */ | |
773 | ||
774 | extern uschar *search_error_message; /* Details of lookup problem */ | |
775 | extern BOOL search_find_defer; /* Set TRUE if lookup deferred */ | |
776 | extern uschar *self_hostname; /* Self host after routing->directors */ | |
777 | extern unsigned int sender_address_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender */ | |
2a3eea10 | 778 | extern uschar *sender_address_data; /* address_data from sender verify */ |
059ec3d9 PH |
779 | extern BOOL sender_address_forced; /* Set by -f */ |
780 | extern uschar *sender_address_unrewritten; /* Set if rewritten by verify */ | |
781 | extern uschar *sender_data; /* lookup result for senders */ | |
782 | extern unsigned int sender_domain_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender domain */ | |
783 | extern uschar *sender_fullhost; /* Sender host name + address */ | |
1705dd20 | 784 | extern BOOL sender_helo_dnssec; /* True if HELO verify used DNS and was DNSSEC */ |
059ec3d9 PH |
785 | extern uschar *sender_helo_name; /* Host name from HELO/EHLO */ |
786 | extern uschar **sender_host_aliases; /* Points to list of alias names */ | |
787 | extern unsigned int sender_host_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for incoming host */ | |
1f4a55da | 788 | extern BOOL sender_host_dnssec; /* true if sender_host_name verified in DNSSEC */ |
059ec3d9 PH |
789 | extern BOOL sender_host_notsocket; /* Set for -bs and -bS */ |
790 | extern BOOL sender_host_unknown; /* TRUE for -bs and -bS except inetd */ | |
791 | extern uschar *sender_ident; /* Sender identity via RFC 1413 */ | |
792 | extern BOOL sender_local; /* TRUE for local senders */ | |
2fe1a124 | 793 | extern BOOL sender_name_forced; /* Set by -F */ |
870f6ba8 TF |
794 | extern uschar *sender_rate; /* Sender rate computed by ACL */ |
795 | extern uschar *sender_rate_limit; /* Configured rate limit */ | |
796 | extern uschar *sender_rate_period; /* Configured smoothing period */ | |
059ec3d9 PH |
797 | extern uschar *sender_rcvhost; /* Host data for Received: */ |
798 | extern BOOL sender_set_untrusted; /* Sender set by untrusted caller */ | |
799 | extern uschar *sender_unqualified_hosts; /* Permitted unqualified senders */ | |
2c7db3f5 | 800 | extern uschar *sender_verify_failure; /* What went wrong */ |
059ec3d9 PH |
801 | extern address_item *sender_verified_list; /* Saved chain of sender verifies */ |
802 | extern address_item *sender_verified_failed; /* The one that caused denial */ | |
41c7c167 PH |
803 | extern uschar *sending_ip_address; /* Address of outgoing (SMTP) interface */ |
804 | extern int sending_port; /* Port of outgoing interface */ | |
cd59ab18 | 805 | extern SIGNAL_BOOL sigalrm_seen; /* Flag for sigalrm_handler */ |
059ec3d9 | 806 | extern uschar **sighup_argv; /* Args for re-execing after SIGHUP */ |
4c04137d | 807 | extern int slow_lookup_log; /* Log DNS lookups taking longer than N millisecs */ |
059ec3d9 PH |
808 | extern int smtp_accept_count; /* Count of connections */ |
809 | extern BOOL smtp_accept_keepalive; /* Set keepalive on incoming */ | |
810 | extern int smtp_accept_max; /* Max SMTP connections */ | |
811 | extern int smtp_accept_max_nonmail;/* Max non-mail commands in one con */ | |
812 | extern uschar *smtp_accept_max_nonmail_hosts; /* Limit non-mail cmds from these hosts */ | |
813 | extern int smtp_accept_max_per_connection; /* Max msgs per connection */ | |
814 | extern uschar *smtp_accept_max_per_host; /* Max SMTP cons from one IP addr */ | |
815 | extern int smtp_accept_queue; /* Queue after so many connections */ | |
816 | extern int smtp_accept_queue_per_connection; /* Queue after so many msgs */ | |
817 | extern int smtp_accept_reserve; /* Reserve these SMTP connections */ | |
818 | extern uschar *smtp_active_hostname; /* Hostname for this message */ | |
819 | extern BOOL smtp_authenticated; /* Sending client has authenticated */ | |
820 | extern uschar *smtp_banner; /* Banner string (to be expanded) */ | |
821 | extern BOOL smtp_check_spool_space; /* TRUE to check SMTP SIZE value */ | |
b4ed4da0 | 822 | extern int smtp_ch_index; /* Index in smtp_connection_had */ |
3ee512ff PH |
823 | extern uschar *smtp_cmd_argument; /* For all SMTP commands */ |
824 | extern uschar *smtp_cmd_buffer; /* SMTP command buffer */ | |
0f1a8658 | 825 | extern struct timeval smtp_connection_start; /* Start time of SMTP connection */ |
b4ed4da0 | 826 | extern uschar smtp_connection_had[]; /* Recent SMTP commands */ |
059ec3d9 PH |
827 | extern int smtp_connect_backlog; /* Max backlog permitted */ |
828 | extern double smtp_delay_mail; /* Current MAIL delay */ | |
829 | extern double smtp_delay_rcpt; /* Current RCPT delay */ | |
830 | extern BOOL smtp_enforce_sync; /* Enforce sync rules */ | |
831 | extern uschar *smtp_etrn_command; /* Command to run */ | |
832 | extern BOOL smtp_etrn_serialize; /* Only one at once */ | |
833 | extern FILE *smtp_in; /* Incoming SMTP input file */ | |
834 | extern int smtp_load_reserve; /* Only from reserved if load > this */ | |
835 | extern int smtp_mailcmd_count; /* Count of MAIL commands */ | |
836 | extern int smtp_max_synprot_errors;/* Max syntax/protocol errors */ | |
837 | extern int smtp_max_unknown_commands; /* As it says */ | |
8f128379 | 838 | extern uschar *smtp_notquit_reason; /* Global for disconnect reason */ |
059ec3d9 PH |
839 | extern FILE *smtp_out; /* Incoming SMTP output file */ |
840 | extern uschar *smtp_ratelimit_hosts; /* Rate limit these hosts */ | |
841 | extern uschar *smtp_ratelimit_mail; /* Parameters for MAIL limiting */ | |
842 | extern uschar *smtp_ratelimit_rcpt; /* Parameters for RCPT limiting */ | |
843 | extern uschar *smtp_read_error; /* Message for SMTP input error */ | |
844 | extern int smtp_receive_timeout; /* Applies to each received line */ | |
1ad6489e | 845 | extern uschar *smtp_receive_timeout_s; /* ... expandable version */ |
059ec3d9 PH |
846 | extern uschar *smtp_reserve_hosts; /* Hosts for reserved slots */ |
847 | extern BOOL smtp_return_error_details; /* TRUE to return full info */ | |
848 | extern int smtp_rlm_base; /* Base interval for MAIL rate limit */ | |
849 | extern double smtp_rlm_factor; /* Factor for MAIL rate limit */ | |
850 | extern int smtp_rlm_limit; /* Max delay */ | |
851 | extern int smtp_rlm_threshold; /* Threshold for RCPT rate limit */ | |
852 | extern int smtp_rlr_base; /* Base interval for RCPT rate limit */ | |
853 | extern double smtp_rlr_factor; /* Factor for RCPT rate limit */ | |
854 | extern int smtp_rlr_limit; /* Max delay */ | |
855 | extern int smtp_rlr_threshold; /* Threshold for RCPT rate limit */ | |
2d14f397 JH |
856 | extern unsigned smtp_peer_options; /* Global flags for passed connections */ |
857 | extern unsigned smtp_peer_options_wrap; /* stacked version hidden by TLS */ | |
8c5d388a | 858 | #ifdef SUPPORT_I18N |
3d1451ea JH |
859 | extern uschar *smtputf8_advertise_hosts; /* ingress control */ |
860 | #endif | |
8523533c TK |
861 | |
862 | #ifdef WITH_CONTENT_SCAN | |
863 | extern uschar *spamd_address; /* address for the spamassassin daemon */ | |
864 | extern uschar *spam_bar; /* the spam "bar" (textual representation of spam_score) */ | |
865 | extern uschar *spam_report; /* the spamd report (multiline) */ | |
c5f280e2 | 866 | extern uschar *spam_action; /* the spamd recommended-action */ |
8523533c TK |
867 | extern uschar *spam_score; /* the spam score (float) */ |
868 | extern uschar *spam_score_int; /* spam_score * 10 (int) */ | |
869 | #endif | |
870 | #ifdef EXPERIMENTAL_SPF | |
65a7d8c3 | 871 | extern uschar *spf_guess; /* spf best-guess record */ |
8523533c | 872 | extern uschar *spf_header_comment; /* spf header comment */ |
8fe685ad | 873 | extern uschar *spf_received; /* Received-SPF: header */ |
8523533c TK |
874 | extern uschar *spf_result; /* spf result in string form */ |
875 | extern uschar *spf_smtp_comment; /* spf comment to include in SMTP reply */ | |
876 | #endif | |
059ec3d9 PH |
877 | extern BOOL split_spool_directory; /* TRUE to use multiple subdirs */ |
878 | extern uschar *spool_directory; /* Name of spool directory */ | |
328c5688 JH |
879 | extern BOOL spool_file_wireformat; /* current -D file has CRLF rather than NL */ |
880 | extern BOOL spool_wireformat; /* can write wireformat -D files */ | |
8523533c TK |
881 | #ifdef EXPERIMENTAL_SRS |
882 | extern uschar *srs_config; /* SRS config secret:max age:hash length:use timestamp:use hash */ | |
883 | extern uschar *srs_db_address; /* SRS db address */ | |
884 | extern uschar *srs_db_key; /* SRS db key */ | |
384152a6 TK |
885 | extern int srs_hashlength; /* SRS hash length */ |
886 | extern int srs_hashmin; /* SRS minimum hash length */ | |
887 | extern int srs_maxage; /* SRS max age */ | |
8523533c TK |
888 | extern uschar *srs_orig_sender; /* SRS original sender */ |
889 | extern uschar *srs_orig_recipient; /* SRS original recipient */ | |
890 | extern uschar *srs_recipient; /* SRS recipient */ | |
384152a6 | 891 | extern uschar *srs_secrets; /* SRS secrets list */ |
8523533c | 892 | extern uschar *srs_status; /* SRS staus */ |
384152a6 TK |
893 | extern BOOL srs_usehash; /* SRS use hash flag */ |
894 | extern BOOL srs_usetimestamp; /* SRS use timestamp flag */ | |
8523533c | 895 | #endif |
38a0a95f | 896 | extern BOOL strict_acl_vars; /* ACL variables have to be set before being used */ |
059ec3d9 | 897 | extern int string_datestamp_offset;/* After insertion by string_format */ |
f1e5fef5 PP |
898 | extern int string_datestamp_length;/* After insertion by string_format */ |
899 | extern int string_datestamp_type; /* After insertion by string_format */ | |
059ec3d9 PH |
900 | extern BOOL strip_excess_angle_brackets; /* Surrounding route-addrs */ |
901 | extern BOOL strip_trailing_dot; /* Remove dots at ends of domains */ | |
902 | extern uschar *submission_domain; /* Domain for submission mode */ | |
903 | extern BOOL submission_mode; /* Can be forced from ACL */ | |
2fe1a124 | 904 | extern uschar *submission_name; /* User name set from ACL */ |
8800895a | 905 | extern BOOL suppress_local_fixups; /* Can be forced from ACL */ |
f4ee74ac | 906 | extern BOOL suppress_local_fixups_default; /* former is reset to this; override with -G */ |
059ec3d9 PH |
907 | extern BOOL synchronous_delivery; /* TRUE if -odi is set */ |
908 | extern BOOL syslog_duplication; /* FALSE => no duplicate logging */ | |
909 | extern int syslog_facility; /* As defined by Syslog.h */ | |
2333e06f | 910 | extern BOOL syslog_pid; /* TRUE if PID on syslogs */ |
059ec3d9 PH |
911 | extern uschar *syslog_processname; /* 'ident' param to openlog() */ |
912 | extern BOOL syslog_timestamp; /* TRUE if time on syslogs */ | |
913 | extern uschar *system_filter; /* Name of system filter file */ | |
914 | ||
915 | extern uschar *system_filter_directory_transport; /* Transports for the */ | |
916 | extern uschar *system_filter_file_transport; /* system filter */ | |
917 | extern uschar *system_filter_pipe_transport; | |
918 | extern uschar *system_filter_reply_transport; | |
919 | ||
920 | extern gid_t system_filter_gid; /* Gid for running system filter */ | |
921 | extern BOOL system_filter_gid_set; /* TRUE if gid set */ | |
922 | extern uid_t system_filter_uid; /* Uid for running system filter */ | |
923 | extern BOOL system_filter_uid_set; /* TRUE if uid set */ | |
924 | extern BOOL system_filtering; /* TRUE when running system filter */ | |
925 | ||
6af7e591 | 926 | extern BOOL tcp_fastopen_ok; /* appears to be supported by kernel */ |
0ab63f3d | 927 | extern blob tcp_fastopen_nodata; /* for zero-data TFO connect requests */ |
1ccd5f67 | 928 | extern BOOL tcp_in_fastopen; /* conn usefully used fastopen */ |
a2673768 | 929 | extern BOOL tcp_in_fastopen_logged; /* one-time logging */ |
059ec3d9 | 930 | extern BOOL tcp_nodelay; /* Controls TCP_NODELAY on daemon */ |
1ccd5f67 | 931 | extern int tcp_out_fastopen; /* 0: no 1: conn used 2: useful */ |
a2673768 | 932 | extern BOOL tcp_out_fastopen_logged; /* one-time logging */ |
5dc43717 JJ |
933 | #ifdef USE_TCP_WRAPPERS |
934 | extern uschar *tcp_wrappers_daemon_name; /* tcpwrappers daemon lookup name */ | |
935 | #endif | |
8669f003 | 936 | extern int test_harness_load_avg; /* For use when testing */ |
059ec3d9 PH |
937 | extern int thismessage_size_limit; /* Limit for this message */ |
938 | extern int timeout_frozen_after; /* Max time to keep frozen messages */ | |
939 | extern BOOL timestamps_utc; /* Use UTC for all times */ | |
d68218c7 | 940 | |
181d9bf8 | 941 | extern uschar *transport_name; /* Name of transport last started */ |
059ec3d9 | 942 | extern int transport_count; /* Count of bytes transported */ |
332f5cf3 | 943 | extern int transport_newlines; /* Accurate count of number of newline chars transported */ |
55414b25 | 944 | extern const uschar **transport_filter_argv; /* For on-the-fly filtering */ |
059ec3d9 | 945 | extern int transport_filter_timeout; /* Timeout for same */ |
2e2a30b4 | 946 | extern BOOL transport_filter_timed_out; /* True if it did */ |
059ec3d9 PH |
947 | |
948 | extern transport_info transports_available[]; /* Vector of available transports */ | |
949 | extern transport_instance *transports; /* Chain of instantiated transports */ | |
950 | extern transport_instance transport_defaults; /* Default values */ | |
951 | ||
952 | extern int transport_write_timeout;/* Set to time out individual writes */ | |
953 | ||
954 | extern tree_node *tree_dns_fails; /* Tree of DNS lookup failures */ | |
955 | extern tree_node *tree_duplicates; /* Tree of duplicate addresses */ | |
956 | extern tree_node *tree_nonrecipients; /* Tree of nonrecipient addresses */ | |
957 | extern tree_node *tree_unusable; /* Tree of unusable addresses */ | |
958 | ||
959 | extern BOOL trusted_caller; /* Caller is trusted */ | |
e2f5dc15 | 960 | extern BOOL trusted_config; /* Configuration file is trusted */ |
059ec3d9 PH |
961 | extern gid_t *trusted_groups; /* List of trusted groups */ |
962 | extern uid_t *trusted_users; /* List of trusted users */ | |
963 | extern uschar *timezone_string; /* Required timezone setting */ | |
964 | ||
965 | extern uschar *unknown_login; /* To use when login id unknown */ | |
966 | extern uschar *unknown_username; /* Ditto */ | |
967 | extern uschar *untrusted_set_sender; /* Let untrusted users set these senders */ | |
968 | extern uschar *uucp_from_pattern; /* For recognizing "From " lines */ | |
969 | extern uschar *uucp_from_sender; /* For building the sender */ | |
970 | ||
971 | extern uschar *warn_message_file; /* Template for warning messages */ | |
972 | extern uschar *warnmsg_delay; /* String form of delay time */ | |
973 | extern uschar *warnmsg_recipients; /* Recipients of warning message */ | |
974 | extern BOOL write_rejectlog; /* Control of reject logging */ | |
975 | ||
aec45841 | 976 | extern uschar *verify_mode; /* Running a router in verify mode */ |
059ec3d9 PH |
977 | extern uschar *version_copyright; /* Copyright notice */ |
978 | extern uschar *version_date; /* Date of compilation */ | |
979 | extern uschar *version_cnumber; /* Compile number */ | |
980 | extern uschar *version_string; /* Version string */ | |
981 | ||
982 | extern int warning_count; /* Delay warnings sent for this msg */ | |
983 | ||
984 | /* End of globals.h */ |