| 1 | /************************************************* |
| 2 | * Exim - an Internet mail transport agent * |
| 3 | *************************************************/ |
| 4 | |
| 5 | /* Copyright (c) University of Cambridge 1995 - 2014 */ |
| 6 | /* See the file NOTICE for conditions of use and distribution. */ |
| 7 | |
| 8 | /* Almost all the global variables are defined together in this one header, so |
| 9 | that they are easy to find. However, those that are visible during the |
| 10 | compilation of the local_scan() function are defined separately in the |
| 11 | local_scan.h header file. */ |
| 12 | |
| 13 | /* First put any specials that are required for some operating systems. */ |
| 14 | |
| 15 | #ifdef NEED_H_ERRNO |
| 16 | extern int h_errno; |
| 17 | #endif |
| 18 | |
| 19 | /* We need to be careful about width of int and atomicity in signal handlers, |
| 20 | especially with the rise of 64-bit systems breaking older assumptions. But |
| 21 | sig_atomic_t comes from signal.h so can't go into mytypes.h without including |
| 22 | signal support in local_scan, which seems precipitous. */ |
| 23 | typedef volatile sig_atomic_t SIGNAL_BOOL; |
| 24 | |
| 25 | /* Now things that are present only when configured. */ |
| 26 | |
| 27 | #ifdef EXIM_PERL |
| 28 | extern uschar *opt_perl_startup; /* Startup code for Perl interpreter */ |
| 29 | extern BOOL opt_perl_at_start; /* Start Perl interpreter at start */ |
| 30 | extern BOOL opt_perl_started; /* Set once interpreter started */ |
| 31 | #endif |
| 32 | |
| 33 | #ifdef EXPAND_DLFUNC |
| 34 | extern tree_node *dlobj_anchor; /* Tree of dynamically-loaded objects */ |
| 35 | #endif |
| 36 | |
| 37 | #ifdef LOOKUP_IBASE |
| 38 | extern uschar *ibase_servers; |
| 39 | #endif |
| 40 | |
| 41 | #ifdef LOOKUP_LDAP |
| 42 | extern uschar *eldap_ca_cert_dir; /* Directory with CA certificates */ |
| 43 | extern uschar *eldap_ca_cert_file; /* CA certificate file */ |
| 44 | extern uschar *eldap_cert_file; /* Certificate file */ |
| 45 | extern uschar *eldap_cert_key; /* Certificate key file */ |
| 46 | extern uschar *eldap_cipher_suite; /* Allowed cipher suite */ |
| 47 | extern uschar *eldap_default_servers; /* List of default servers */ |
| 48 | extern uschar *eldap_require_cert; /* Peer certificate checking strategy */ |
| 49 | extern BOOL eldap_start_tls; /* Use STARTTLS */ |
| 50 | extern int eldap_version; /* LDAP version */ |
| 51 | #endif |
| 52 | |
| 53 | #ifdef LOOKUP_MYSQL |
| 54 | extern uschar *mysql_servers; /* List of servers and connect info */ |
| 55 | #endif |
| 56 | |
| 57 | #ifdef LOOKUP_ORACLE |
| 58 | extern uschar *oracle_servers; /* List of servers and connect info */ |
| 59 | #endif |
| 60 | |
| 61 | #ifdef LOOKUP_PGSQL |
| 62 | extern uschar *pgsql_servers; /* List of servers and connect info */ |
| 63 | #endif |
| 64 | |
| 65 | #ifdef EXPERIMENTAL_REDIS |
| 66 | extern uschar *redis_servers; /* List of servers and connect info */ |
| 67 | #endif |
| 68 | |
| 69 | #ifdef LOOKUP_SQLITE |
| 70 | extern int sqlite_lock_timeout; /* Internal lock waiting timeout */ |
| 71 | #endif |
| 72 | |
| 73 | #ifdef SUPPORT_MOVE_FROZEN_MESSAGES |
| 74 | extern BOOL move_frozen_messages; /* Get them out of the normal directory */ |
| 75 | #endif |
| 76 | |
| 77 | /* These variables are outside the #ifdef because it keeps the code less |
| 78 | cluttered in several places (e.g. during logging) if we can always refer to |
| 79 | them. Also, the tls_ variables are now always visible. */ |
| 80 | |
| 81 | typedef struct { |
| 82 | int active; /* fd/socket when in a TLS session */ |
| 83 | int bits; /* bits used in TLS session */ |
| 84 | BOOL certificate_verified; /* Client certificate verified */ |
| 85 | #ifdef EXPERIMENTAL_DANE |
| 86 | BOOL dane_verified; /* ... via DANE */ |
| 87 | int tlsa_usage; /* TLSA record(s) usage */ |
| 88 | #endif |
| 89 | uschar *cipher; /* Cipher used */ |
| 90 | BOOL on_connect; /* For older MTAs that don't STARTTLS */ |
| 91 | uschar *on_connect_ports; /* Ports always tls-on-connect */ |
| 92 | void *ourcert; /* Certificate we presented, binary */ |
| 93 | void *peercert; /* Certificate of peer, binary */ |
| 94 | uschar *peerdn; /* DN from peer */ |
| 95 | uschar *sni; /* Server Name Indication */ |
| 96 | enum { |
| 97 | OCSP_NOT_REQ=0, /* not requested */ |
| 98 | OCSP_NOT_RESP, /* no response to request */ |
| 99 | OCSP_VFY_NOT_TRIED, /* response not verified */ |
| 100 | OCSP_FAILED, /* verify failed */ |
| 101 | OCSP_VFIED /* verified */ |
| 102 | } ocsp; /* Stapled OCSP status */ |
| 103 | } tls_support; |
| 104 | extern tls_support tls_in; |
| 105 | extern tls_support tls_out; |
| 106 | |
| 107 | #ifdef SUPPORT_TLS |
| 108 | extern BOOL gnutls_compat_mode; /* Less security, more compatibility */ |
| 109 | extern BOOL gnutls_allow_auto_pkcs11; /* Let GnuTLS autoload PKCS11 modules */ |
| 110 | extern uschar *gnutls_require_mac; /* So some can be avoided */ |
| 111 | extern uschar *gnutls_require_kx; /* So some can be avoided */ |
| 112 | extern uschar *gnutls_require_proto; /* So some can be avoided */ |
| 113 | extern uschar *openssl_options; /* OpenSSL compatibility options */ |
| 114 | extern const pcre *regex_STARTTLS; /* For recognizing STARTTLS settings */ |
| 115 | extern uschar *tls_advertise_hosts; /* host for which TLS is advertised */ |
| 116 | extern uschar *tls_certificate; /* Certificate file */ |
| 117 | extern uschar *tls_channelbinding_b64; /* string of base64 channel binding */ |
| 118 | extern uschar *tls_crl; /* CRL File */ |
| 119 | extern int tls_dh_max_bits; /* don't accept higher lib suggestions */ |
| 120 | extern uschar *tls_dhparam; /* DH param file */ |
| 121 | #ifndef DISABLE_OCSP |
| 122 | extern uschar *tls_ocsp_file; /* OCSP stapling proof file */ |
| 123 | #endif |
| 124 | extern BOOL tls_offered; /* Server offered TLS */ |
| 125 | extern uschar *tls_privatekey; /* Private key file */ |
| 126 | extern BOOL tls_remember_esmtp; /* For YAEB */ |
| 127 | extern uschar *tls_require_ciphers; /* So some can be avoided */ |
| 128 | extern uschar *tls_try_verify_hosts; /* Optional client verification */ |
| 129 | extern uschar *tls_verify_certificates;/* Path for certificates to check */ |
| 130 | extern uschar *tls_verify_hosts; /* Mandatory client verification */ |
| 131 | #endif |
| 132 | |
| 133 | extern uschar *dsn_envid; /* DSN envid string */ |
| 134 | extern int dsn_ret; /* DSN ret type*/ |
| 135 | extern const pcre *regex_DSN; /* For recognizing DSN settings */ |
| 136 | extern BOOL smtp_use_dsn; /* Global for passed connections */ |
| 137 | extern uschar *dsn_advertise_hosts; /* host for which TLS is advertised */ |
| 138 | |
| 139 | /* Input-reading functions for messages, so we can use special ones for |
| 140 | incoming TCP/IP. */ |
| 141 | |
| 142 | extern int (*receive_getc)(void); |
| 143 | extern int (*receive_ungetc)(int); |
| 144 | extern int (*receive_feof)(void); |
| 145 | extern int (*receive_ferror)(void); |
| 146 | extern BOOL (*receive_smtp_buffered)(void); |
| 147 | |
| 148 | |
| 149 | /* For clearing, saving, restoring address expansion variables. We have to have |
| 150 | the size of this vector set explicitly, because it is referenced from more than |
| 151 | one module. */ |
| 152 | |
| 153 | extern uschar **address_expansions[ADDRESS_EXPANSIONS_COUNT]; |
| 154 | |
| 155 | /* General global variables */ |
| 156 | |
| 157 | extern BOOL accept_8bitmime; /* Allow *BITMIME incoming */ |
| 158 | extern int body_8bitmime; /* sender declared BODY= ; 7=7BIT, 8=8BITMIME */ |
| 159 | extern header_line *acl_added_headers; /* Headers added by an ACL */ |
| 160 | extern tree_node *acl_anchor; /* Tree of named ACLs */ |
| 161 | extern uschar *acl_arg[9]; /* Argument to ACL call */ |
| 162 | extern int acl_narg; /* Number of arguments to ACL call */ |
| 163 | extern uschar *acl_not_smtp; /* ACL run for non-SMTP messages */ |
| 164 | #ifdef WITH_CONTENT_SCAN |
| 165 | extern uschar *acl_not_smtp_mime; /* For MIME parts of ditto */ |
| 166 | #endif |
| 167 | extern uschar *acl_not_smtp_start; /* ACL run at the beginning of a non-SMTP session */ |
| 168 | extern uschar *acl_removed_headers; /* Headers deleted by an ACL */ |
| 169 | extern uschar *acl_smtp_auth; /* ACL run for AUTH */ |
| 170 | extern uschar *acl_smtp_connect; /* ACL run on SMTP connection */ |
| 171 | extern uschar *acl_smtp_data; /* ACL run after DATA received */ |
| 172 | #ifndef DISABLE_PRDR |
| 173 | extern uschar *acl_smtp_data_prdr; /* ACL run after DATA received if in PRDR mode*/ |
| 174 | const extern pcre *regex_PRDR; /* For recognizing PRDR settings */ |
| 175 | #endif |
| 176 | #ifndef DISABLE_DKIM |
| 177 | extern uschar *acl_smtp_dkim; /* ACL run for DKIM signatures / domains */ |
| 178 | #endif |
| 179 | extern uschar *acl_smtp_etrn; /* ACL run for ETRN */ |
| 180 | extern uschar *acl_smtp_expn; /* ACL run for EXPN */ |
| 181 | extern uschar *acl_smtp_helo; /* ACL run for HELO/EHLO */ |
| 182 | extern uschar *acl_smtp_mail; /* ACL run for MAIL */ |
| 183 | extern uschar *acl_smtp_mailauth; /* ACL run for MAIL AUTH */ |
| 184 | #ifdef WITH_CONTENT_SCAN |
| 185 | extern uschar *acl_smtp_mime; /* ACL run after DATA, before acl_smtp_data, for each MIME part */ |
| 186 | #endif |
| 187 | extern uschar *acl_smtp_notquit; /* ACL run for disconnects */ |
| 188 | extern uschar *acl_smtp_predata; /* ACL run for DATA command */ |
| 189 | extern uschar *acl_smtp_quit; /* ACL run for QUIT */ |
| 190 | extern uschar *acl_smtp_rcpt; /* ACL run for RCPT */ |
| 191 | extern uschar *acl_smtp_starttls; /* ACL run for STARTTLS */ |
| 192 | extern uschar *acl_smtp_vrfy; /* ACL run for VRFY */ |
| 193 | extern BOOL acl_temp_details; /* TRUE to give details for 4xx error */ |
| 194 | extern tree_node *acl_var_c; /* ACL connection variables */ |
| 195 | extern tree_node *acl_var_m; /* ACL messsage variables */ |
| 196 | extern uschar *acl_verify_message; /* User message for verify failure */ |
| 197 | extern string_item *acl_warn_logged; /* Logged lines */ |
| 198 | extern uschar *acl_wherecodes[]; /* Response codes for ACL fails */ |
| 199 | extern uschar *acl_wherenames[]; /* Names for messages */ |
| 200 | extern BOOL active_local_from_check;/* For adding Sender: (switchable) */ |
| 201 | extern BOOL active_local_sender_retain; /* For keeping Sender: (switchable) */ |
| 202 | extern address_item *addr_duplicate; /* Duplicate address list */ |
| 203 | extern address_item address_defaults; /* Default data for address item */ |
| 204 | extern uschar *address_file; /* Name of file when delivering to one */ |
| 205 | extern uschar *address_pipe; /* Pipe command when delivering to one */ |
| 206 | extern BOOL address_test_mode; /* True for -bt */ |
| 207 | extern tree_node *addresslist_anchor; /* Tree of defined address lists */ |
| 208 | extern int addresslist_count; /* Number defined */ |
| 209 | extern gid_t *admin_groups; /* List of admin groups */ |
| 210 | extern BOOL admin_user; /* True if caller can do admin */ |
| 211 | extern BOOL allow_auth_unadvertised;/* As it says */ |
| 212 | extern BOOL allow_domain_literals; /* As it says */ |
| 213 | extern BOOL allow_mx_to_ip; /* Allow MX records to -> ip address */ |
| 214 | extern BOOL allow_unqualified_recipient; /* As it says */ |
| 215 | extern BOOL allow_unqualified_sender; /* Ditto */ |
| 216 | extern BOOL allow_utf8_domains; /* For experimenting */ |
| 217 | extern uschar *authenticated_fail_id; /* ID that failed authentication */ |
| 218 | extern uschar *authenticated_id; /* ID that was authenticated */ |
| 219 | extern uschar *authenticated_sender; /* From AUTH on MAIL */ |
| 220 | extern BOOL authentication_failed; /* TRUE if AUTH was tried and failed */ |
| 221 | extern uschar *auth_advertise_hosts; /* Only advertise to these */ |
| 222 | extern auth_info auths_available[]; /* Vector of available auth mechanisms */ |
| 223 | extern auth_instance *auths; /* Chain of instantiated auths */ |
| 224 | extern auth_instance auth_defaults; /* Default values */ |
| 225 | extern uschar *auth_defer_msg; /* Error message for log */ |
| 226 | extern uschar *auth_defer_user_msg; /* Error message for user */ |
| 227 | extern uschar *auth_vars[]; /* $authn variables */ |
| 228 | extern int auto_thaw; /* Auto-thaw interval */ |
| 229 | #ifdef WITH_CONTENT_SCAN |
| 230 | extern BOOL av_failed; /* TRUE if the AV process failed */ |
| 231 | extern uschar *av_scanner; /* AntiVirus scanner to use for the malware condition */ |
| 232 | #endif |
| 233 | |
| 234 | extern BOOL background_daemon; /* Set FALSE to keep in foreground */ |
| 235 | extern uschar *base62_chars; /* Table of base-62 characters */ |
| 236 | extern uschar *bi_command; /* Command for -bi option */ |
| 237 | extern uschar *big_buffer; /* Used for various temp things */ |
| 238 | extern int big_buffer_size; /* Current size (can expand) */ |
| 239 | #ifdef EXPERIMENTAL_BRIGHTMAIL |
| 240 | extern uschar *bmi_alt_location; /* expansion variable that contains the alternate location for the rcpt (available during routing) */ |
| 241 | extern uschar *bmi_base64_tracker_verdict; /* expansion variable with base-64 encoded OLD verdict string (available during routing) */ |
| 242 | extern uschar *bmi_base64_verdict; /* expansion variable with base-64 encoded verdict string (available during routing) */ |
| 243 | extern uschar *bmi_config_file; /* Brightmail config file */ |
| 244 | extern int bmi_deliver; /* Flag that determines if the message should be delivered to the rcpt (available during routing) */ |
| 245 | extern int bmi_run; /* Flag that determines if message should be run through Brightmail server */ |
| 246 | extern uschar *bmi_verdicts; /* BASE64-encoded verdicts with recipient lists */ |
| 247 | #endif |
| 248 | extern uschar *bounce_message_file; /* Template file */ |
| 249 | extern uschar *bounce_message_text; /* One-liner */ |
| 250 | extern uschar *bounce_recipient; /* When writing an errmsg */ |
| 251 | extern BOOL bounce_return_body; /* Include body in returned message */ |
| 252 | extern BOOL bounce_return_message; /* Include message in bounce */ |
| 253 | extern int bounce_return_size_limit; /* Max amount to return */ |
| 254 | extern uschar *bounce_sender_authentication; /* AUTH address for bounces */ |
| 255 | extern int bsmtp_transaction_linecount; /* Start of last transaction */ |
| 256 | |
| 257 | extern int callout_cache_domain_positive_expire; /* Time for positive domain callout cache records to expire */ |
| 258 | extern int callout_cache_domain_negative_expire; /* Time for negative domain callout cache records to expire */ |
| 259 | extern int callout_cache_positive_expire; /* Time for positive callout cache records to expire */ |
| 260 | extern int callout_cache_negative_expire; /* Time for negative callout cache records to expire */ |
| 261 | extern uschar *callout_random_local_part; /* Local part to be used to check if server called will accept any local part */ |
| 262 | extern uschar *check_dns_names_pattern;/* Regex for syntax check */ |
| 263 | extern int check_log_inodes; /* Minimum for message acceptance */ |
| 264 | extern int check_log_space; /* Minimum for message acceptance */ |
| 265 | extern BOOL check_rfc2047_length; /* Check RFC 2047 encoded string length */ |
| 266 | extern int check_spool_inodes; /* Minimum for message acceptance */ |
| 267 | extern int check_spool_space; /* Minimum for message acceptance */ |
| 268 | extern uschar *client_authenticator; /* Authenticator name used for smtp delivery */ |
| 269 | extern uschar *client_authenticated_id; /* "login" name used for SMTP AUTH */ |
| 270 | extern uschar *client_authenticated_sender; /* AUTH option to SMTP MAIL FROM (not yet used) */ |
| 271 | extern int clmacro_count; /* Number of command line macros */ |
| 272 | extern uschar *clmacros[]; /* Copy of them, for re-exec */ |
| 273 | extern int connection_max_messages;/* Max down one SMTP connection */ |
| 274 | extern BOOL config_changed; /* True if -C used */ |
| 275 | extern FILE *config_file; /* Configuration file */ |
| 276 | extern uschar *config_filename; /* Configuration file name */ |
| 277 | #ifdef CONFIGURE_GROUP |
| 278 | extern gid_t config_gid; /* Additional group owner */ |
| 279 | #endif |
| 280 | extern int config_lineno; /* Line number */ |
| 281 | extern uschar *config_main_filelist; /* List of possible config files */ |
| 282 | extern uschar *config_main_filename; /* File name actually used */ |
| 283 | extern uschar *config_main_directory; /* Directory where the main config file was found */ |
| 284 | #ifdef CONFIGURE_OWNER |
| 285 | extern uid_t config_uid; /* Additional owner */ |
| 286 | #endif |
| 287 | extern uschar *continue_hostname; /* Host for continued delivery */ |
| 288 | extern uschar *continue_host_address; /* IP address for ditto */ |
| 289 | extern BOOL continue_more; /* Flag more addresses waiting */ |
| 290 | extern int continue_sequence; /* Sequence num for continued delivery */ |
| 291 | extern uschar *continue_transport; /* Transport for continued delivery */ |
| 292 | |
| 293 | extern uschar *csa_status; /* Client SMTP Authorization result */ |
| 294 | |
| 295 | typedef struct { |
| 296 | BOOL delivery; /* When to attempt */ |
| 297 | int fd; /* Open connection */ |
| 298 | int nrcpt; /* Count of addresses */ |
| 299 | uschar * interface; /* (address of) */ |
| 300 | host_item host; /* Host used */ |
| 301 | address_item addr; /* (Chain of) addresses */ |
| 302 | } cut_t; |
| 303 | extern cut_t cutthrough; /* Deliver-concurrently */ |
| 304 | |
| 305 | extern BOOL daemon_listen; /* True if listening required */ |
| 306 | extern uschar *daemon_smtp_port; /* Can be a list of ports */ |
| 307 | extern int daemon_startup_retries; /* Number of times to retry */ |
| 308 | extern int daemon_startup_sleep; /* Sleep between retries */ |
| 309 | |
| 310 | #ifdef EXPERIMENTAL_DCC |
| 311 | extern BOOL dcc_direct_add_header; /* directly add header */ |
| 312 | extern uschar *dcc_header; /* dcc header */ |
| 313 | extern uschar *dcc_result; /* dcc result */ |
| 314 | extern uschar *dccifd_address; /* address of the dccifd daemon */ |
| 315 | extern uschar *dccifd_options; /* options for the dccifd daemon */ |
| 316 | #endif |
| 317 | |
| 318 | extern BOOL debug_daemon; /* Debug the daemon process only */ |
| 319 | extern int debug_fd; /* The fd for debug_file */ |
| 320 | extern FILE *debug_file; /* Where to write debugging info */ |
| 321 | extern bit_table debug_options[]; /* Table of debug options */ |
| 322 | extern int debug_options_count; /* Size of table */ |
| 323 | extern int delay_warning[]; /* Times between warnings */ |
| 324 | extern uschar *delay_warning_condition; /* Condition string for warnings */ |
| 325 | extern BOOL delivery_date_remove; /* Remove delivery-date headers */ |
| 326 | |
| 327 | extern uschar *deliver_address_data; /* Arbitrary data for an address */ |
| 328 | extern int deliver_datafile; /* FD for data part of message */ |
| 329 | extern uschar *deliver_domain; /* The local domain for delivery */ |
| 330 | extern uschar *deliver_domain_data; /* From domain lookup */ |
| 331 | extern uschar *deliver_domain_orig; /* The original local domain for delivery */ |
| 332 | extern uschar *deliver_domain_parent; /* The parent domain for delivery */ |
| 333 | extern BOOL deliver_drop_privilege; /* TRUE for unprivileged delivery */ |
| 334 | extern BOOL deliver_firsttime; /* True for first delivery attempt */ |
| 335 | extern BOOL deliver_force; /* TRUE if delivery was forced */ |
| 336 | extern BOOL deliver_freeze; /* TRUE if delivery is frozen */ |
| 337 | extern time_t deliver_frozen_at; /* Time of freezing */ |
| 338 | extern uschar *deliver_home; /* Home directory for pipes */ |
| 339 | extern uschar *deliver_host; /* (First) host for routed local deliveries */ |
| 340 | /* Remote host for filter */ |
| 341 | extern uschar *deliver_host_address; /* Address for remote delivery filter */ |
| 342 | extern int deliver_host_port; /* Address for remote delivery filter */ |
| 343 | extern uschar *deliver_in_buffer; /* Buffer for copying file */ |
| 344 | extern ino_t deliver_inode; /* Inode for appendfile */ |
| 345 | extern uschar *deliver_localpart; /* The local part for delivery */ |
| 346 | extern uschar *deliver_localpart_data; /* From local part lookup */ |
| 347 | extern uschar *deliver_localpart_orig; /* The original local part for delivery */ |
| 348 | extern uschar *deliver_localpart_parent; /* The parent local part for delivery */ |
| 349 | extern uschar *deliver_localpart_prefix; /* The stripped prefix, if any */ |
| 350 | extern uschar *deliver_localpart_suffix; /* The stripped suffix, if any */ |
| 351 | extern BOOL deliver_force_thaw; /* TRUE to force thaw in queue run */ |
| 352 | extern BOOL deliver_manual_thaw; /* TRUE if manually thawed */ |
| 353 | extern uschar *deliver_out_buffer; /* Buffer for copying file */ |
| 354 | extern int deliver_queue_load_max; /* Different value for queue running */ |
| 355 | extern address_item *deliver_recipients; /* Current set of addresses */ |
| 356 | extern uschar *deliver_selectstring; /* For selecting by recipient */ |
| 357 | extern BOOL deliver_selectstring_regex; /* String is regex */ |
| 358 | extern uschar *deliver_selectstring_sender; /* For selecting by sender */ |
| 359 | extern BOOL deliver_selectstring_sender_regex; /* String is regex */ |
| 360 | #ifdef WITH_OLD_DEMIME |
| 361 | extern int demime_errorlevel; /* Severity of MIME error */ |
| 362 | extern int demime_ok; /* Nonzero if message has been demimed */ |
| 363 | extern uschar *demime_reason; /* Reason for broken MIME container */ |
| 364 | #endif |
| 365 | extern BOOL disable_callout_flush; /* Don't flush before callouts */ |
| 366 | extern BOOL disable_delay_flush; /* Don't flush before "delay" in ACL */ |
| 367 | #ifdef ENABLE_DISABLE_FSYNC |
| 368 | extern BOOL disable_fsync; /* Not for normal use */ |
| 369 | #endif |
| 370 | extern BOOL disable_ipv6; /* Don't do any IPv6 things */ |
| 371 | extern BOOL disable_logging; /* Disables log writing when TRUE */ |
| 372 | |
| 373 | #ifndef DISABLE_DKIM |
| 374 | extern uschar *dkim_cur_signer; /* Expansion variable, holds the current "signer" domain or identity during a acl_smtp_dkim run */ |
| 375 | extern uschar *dkim_signers; /* Expansion variable, holds colon-separated list of domains and identities that have signed a message */ |
| 376 | extern uschar *dkim_signing_domain; /* Expansion variable, domain used for signing a message. */ |
| 377 | extern uschar *dkim_signing_selector; /* Expansion variable, selector used for signing a message. */ |
| 378 | extern uschar *dkim_verify_signers; /* Colon-separated list of domains for each of which we call the DKIM ACL */ |
| 379 | extern BOOL dkim_collect_input; /* Runtime flag that tracks wether SMTP input is fed to DKIM validation */ |
| 380 | extern BOOL dkim_disable_verify; /* Set via ACL control statement. When set, DKIM verification is disabled for the current message */ |
| 381 | #endif |
| 382 | #ifdef EXPERIMENTAL_DMARC |
| 383 | extern BOOL dmarc_has_been_checked; /* Global variable to check if test has been called yet */ |
| 384 | extern uschar *dmarc_ar_header; /* Expansion variable, suggested header for dmarc auth results */ |
| 385 | extern uschar *dmarc_domain_policy; /* Expansion for declared policy of used domain */ |
| 386 | extern uschar *dmarc_forensic_sender; /* Set sender address for forensic reports */ |
| 387 | extern uschar *dmarc_history_file; /* Expansion variable, file to store dmarc results */ |
| 388 | extern uschar *dmarc_status; /* Expansion variable, one word value */ |
| 389 | extern uschar *dmarc_status_text; /* Expansion variable, human readable value */ |
| 390 | extern uschar *dmarc_tld_file; /* Mozilla TLDs text file */ |
| 391 | extern uschar *dmarc_used_domain; /* Expansion variable, domain libopendmarc chose for DMARC policy lookup */ |
| 392 | extern BOOL dmarc_disable_verify; /* Set via ACL control statement. When set, DMARC verification is disabled for the current message */ |
| 393 | extern BOOL dmarc_enable_forensic; /* Set via ACL control statement. When set, DMARC forensic reports are enabled for the current message */ |
| 394 | #endif |
| 395 | |
| 396 | extern uschar *dns_again_means_nonexist; /* Domains that are badly set up */ |
| 397 | extern int dns_csa_search_limit; /* How deep to search for CSA SRV records */ |
| 398 | extern BOOL dns_csa_use_reverse; /* Check CSA in reverse DNS? (non-standard) */ |
| 399 | extern uschar *dns_ipv4_lookup; /* For these domains, don't look for AAAA (or A6) */ |
| 400 | #ifdef EXPERIMENTAL_DANE |
| 401 | extern int dns_dane_ok; /* Ok to use DANE when checking TLS authenticity */ |
| 402 | #endif |
| 403 | extern int dns_retrans; /* Retransmission time setting */ |
| 404 | extern int dns_retry; /* Number of retries */ |
| 405 | extern int dns_dnssec_ok; /* When constructing DNS query, set DO flag */ |
| 406 | extern int dns_use_edns0; /* Coerce EDNS0 support on/off in resolver. */ |
| 407 | extern uschar *dnslist_domain; /* DNS (black) list domain */ |
| 408 | extern uschar *dnslist_matched; /* DNS (black) list matched key */ |
| 409 | extern uschar *dnslist_text; /* DNS (black) list text message */ |
| 410 | extern uschar *dnslist_value; /* DNS (black) list IP address */ |
| 411 | extern tree_node *domainlist_anchor; /* Tree of defined domain lists */ |
| 412 | extern int domainlist_count; /* Number defined */ |
| 413 | extern BOOL dont_deliver; /* TRUE for -N option */ |
| 414 | extern BOOL dot_ends; /* TRUE if "." ends non-SMTP input */ |
| 415 | |
| 416 | /* This option is now a no-opt, retained for compatibility */ |
| 417 | extern BOOL drop_cr; /* For broken local MUAs */ |
| 418 | |
| 419 | extern uschar *dsn_from; /* From: string for DSNs */ |
| 420 | |
| 421 | extern BOOL enable_dollar_recipients; /* Make $recipients available */ |
| 422 | extern int envelope_to_remove; /* Remove envelope_to_headers */ |
| 423 | extern int errno_quota; /* Quota errno in this OS */ |
| 424 | extern int error_handling; /* Error handling style */ |
| 425 | extern uschar *errors_copy; /* For taking copies of errors */ |
| 426 | extern uschar *errors_reply_to; /* Reply-to for error messages */ |
| 427 | extern int errors_sender_rc; /* Return after message to sender*/ |
| 428 | |
| 429 | #ifdef EXPERIMENTAL_EVENT |
| 430 | extern uschar *event_action; /* expansion for delivery events */ |
| 431 | extern uschar *event_data; /* event data */ |
| 432 | extern int event_defer_errno; /* error number set when a remote delivery is deferred with a host error */ |
| 433 | extern uschar *event_name; /* event classification */ |
| 434 | #endif |
| 435 | |
| 436 | extern gid_t exim_gid; /* To be used with exim_uid */ |
| 437 | extern BOOL exim_gid_set; /* TRUE if exim_gid set */ |
| 438 | extern uschar *exim_path; /* Path to exec exim */ |
| 439 | extern const uschar *exim_sieve_extension_list[]; /* list of sieve extensions */ |
| 440 | extern uid_t exim_uid; /* Non-root uid for exim */ |
| 441 | extern BOOL exim_uid_set; /* TRUE if exim_uid set */ |
| 442 | extern int expand_forbid; /* RDO flags for forbidding things */ |
| 443 | extern int expand_nlength[]; /* Lengths of numbered strings */ |
| 444 | extern int expand_nmax; /* Max numerical value */ |
| 445 | extern uschar *expand_nstring[]; /* Numbered strings */ |
| 446 | extern BOOL expand_string_forcedfail; /* TRUE if failure was "expected" */ |
| 447 | extern BOOL extract_addresses_remove_arguments; /* Controls -t behaviour */ |
| 448 | extern uschar *extra_local_interfaces; /* Local, non-listen interfaces */ |
| 449 | |
| 450 | extern int fake_response; /* Fake FAIL or DEFER response to data */ |
| 451 | extern uschar *fake_response_text; /* User defined message for the above. Default is in globals.c. */ |
| 452 | extern int filter_n[FILTER_VARIABLE_COUNT]; /* filter variables */ |
| 453 | extern BOOL filter_running; /* TRUE while running a filter */ |
| 454 | extern int filter_sn[FILTER_VARIABLE_COUNT]; /* variables set by system filter */ |
| 455 | extern int filter_test; /* Filter test type */ |
| 456 | extern uschar *filter_test_sfile; /* System filter test file */ |
| 457 | extern uschar *filter_test_ufile; /* User filter test file */ |
| 458 | extern uschar *filter_thisaddress; /* For address looping */ |
| 459 | extern int finduser_retries; /* Retry count for getpwnam() */ |
| 460 | extern uid_t fixed_never_users[]; /* Can't be overridden */ |
| 461 | #ifdef WITH_OLD_DEMIME |
| 462 | extern uschar *found_extension; /* demime acl condition: file extension found */ |
| 463 | #endif |
| 464 | extern uschar *freeze_tell; /* Message on (some) freezings */ |
| 465 | extern uschar *freeze_tell_config; /* The configured setting */ |
| 466 | extern uschar *fudged_queue_times; /* For use in test harness */ |
| 467 | |
| 468 | extern uschar *gecos_name; /* To be expanded when pattern matches */ |
| 469 | extern uschar *gecos_pattern; /* Pattern to match */ |
| 470 | extern rewrite_rule *global_rewrite_rules; /* Chain of rewriting rules */ |
| 471 | |
| 472 | extern int header_insert_maxlen; /* Max for inserting headers */ |
| 473 | extern int header_maxsize; /* Max total length for header */ |
| 474 | extern int header_line_maxsize; /* Max for an individual line */ |
| 475 | extern header_name header_names[]; /* Table of header names */ |
| 476 | extern int header_names_size; /* Number of entries */ |
| 477 | extern BOOL header_rewritten; /* TRUE if header changed by router */ |
| 478 | extern uschar *helo_accept_junk_hosts; /* Allowed to use junk arg */ |
| 479 | extern uschar *helo_allow_chars; /* Rogue chars to allow in HELO/EHLO */ |
| 480 | extern uschar *helo_lookup_domains; /* If these given, lookup host name */ |
| 481 | extern uschar *helo_try_verify_hosts; /* Soft check HELO argument for these */ |
| 482 | extern BOOL helo_verified; /* True if HELO verified */ |
| 483 | extern BOOL helo_verify_failed; /* True if attempt failed */ |
| 484 | extern uschar *helo_verify_hosts; /* Hard check HELO argument for these */ |
| 485 | extern const uschar *hex_digits; /* Used in several places */ |
| 486 | extern uschar *hold_domains; /* Hold up deliveries to these */ |
| 487 | extern BOOL host_find_failed_syntax;/* DNS syntax check failure */ |
| 488 | extern BOOL host_checking_callout; /* TRUE if real callout wanted */ |
| 489 | extern uschar *host_data; /* Obtained from lookup in ACL */ |
| 490 | extern uschar *host_lookup; /* For which IP addresses are always looked up */ |
| 491 | extern BOOL host_lookup_deferred; /* TRUE if lookup deferred */ |
| 492 | extern BOOL host_lookup_failed; /* TRUE if lookup failed */ |
| 493 | extern uschar *host_lookup_order; /* Order of host lookup types */ |
| 494 | extern uschar *host_lookup_msg; /* Text for why it failed */ |
| 495 | extern int host_number; /* For sharing spools */ |
| 496 | extern uschar *host_number_string; /* For expanding */ |
| 497 | extern uschar *host_reject_connection; /* Reject these hosts */ |
| 498 | extern tree_node *hostlist_anchor; /* Tree of defined host lists */ |
| 499 | extern int hostlist_count; /* Number defined */ |
| 500 | extern uschar *hosts_connection_nolog; /* Limits the logging option */ |
| 501 | extern uschar *hosts_treat_as_local; /* For routing */ |
| 502 | |
| 503 | extern int ignore_bounce_errors_after; /* Keep them for this time. */ |
| 504 | extern BOOL ignore_fromline_local; /* Local SMTP ignore fromline */ |
| 505 | extern uschar *ignore_fromline_hosts; /* Hosts permitted to send "From " */ |
| 506 | extern BOOL inetd_wait_mode; /* Whether running in inetd wait mode */ |
| 507 | extern int inetd_wait_timeout; /* Timeout for inetd wait mode */ |
| 508 | extern BOOL is_inetd; /* True for inetd calls */ |
| 509 | extern uschar *iterate_item; /* Item from iterate list */ |
| 510 | |
| 511 | extern int journal_fd; /* Fd for journal file */ |
| 512 | |
| 513 | extern int keep_malformed; /* Time to keep malformed messages */ |
| 514 | |
| 515 | extern uschar *eldap_dn; /* Where LDAP DNs are left */ |
| 516 | extern int load_average; /* Most recently read load average */ |
| 517 | extern BOOL local_error_message; /* True if handling one of these */ |
| 518 | extern BOOL local_from_check; /* For adding Sender: (global value) */ |
| 519 | extern uschar *local_from_prefix; /* Permitted prefixes */ |
| 520 | extern uschar *local_from_suffix; /* Permitted suffixes */ |
| 521 | extern uschar *local_interfaces; /* For forcing specific interfaces */ |
| 522 | extern uschar *local_scan_data; /* Text returned by local_scan() */ |
| 523 | extern optionlist local_scan_options[];/* Option list for local_scan() */ |
| 524 | extern int local_scan_options_count; /* Size of the list */ |
| 525 | extern int local_scan_timeout; /* Timeout for local_scan() */ |
| 526 | extern BOOL local_sender_retain; /* Retain Sender: (with no From: check) */ |
| 527 | extern gid_t local_user_gid; /* As it says; may be set in routers */ |
| 528 | extern uid_t local_user_uid; /* As it says; may be set in routers */ |
| 529 | extern tree_node *localpartlist_anchor;/* Tree of defined localpart lists */ |
| 530 | extern int localpartlist_count; /* Number defined */ |
| 531 | extern uschar *log_buffer; /* For constructing log entries */ |
| 532 | extern unsigned int log_extra_selector;/* Bit map of logging options other than used by log_write() */ |
| 533 | extern uschar *log_file_path; /* If unset, use default */ |
| 534 | extern bit_table log_options[]; /* Table of options */ |
| 535 | extern int log_options_count; /* Size of table */ |
| 536 | extern int log_reject_target; /* Target log for ACL rejections */ |
| 537 | extern uschar *log_selector_string; /* As supplied in the config */ |
| 538 | extern FILE *log_stderr; /* Copy of stderr for log use, or NULL */ |
| 539 | extern BOOL log_testing_mode; /* TRUE in various testing modes */ |
| 540 | extern BOOL log_timezone; /* TRUE to include the timezone in log lines */ |
| 541 | extern unsigned int log_write_selector;/* Bit map of logging options for log_write() */ |
| 542 | extern uschar *login_sender_address; /* The actual sender address */ |
| 543 | extern lookup_info **lookup_list; /* Array of pointers to available lookups */ |
| 544 | extern int lookup_list_count; /* Number of entries in the list */ |
| 545 | extern uschar *lookup_dnssec_authenticated; /* AD status of dns lookup */ |
| 546 | extern int lookup_open_max; /* Max lookup files to cache */ |
| 547 | extern uschar *lookup_value; /* Value looked up from file */ |
| 548 | |
| 549 | extern macro_item *macros; /* Configuration macros */ |
| 550 | extern uschar *mailstore_basename; /* For mailstore deliveries */ |
| 551 | #ifdef WITH_CONTENT_SCAN |
| 552 | extern uschar *malware_name; /* Name of virus or malware ("W32/Klez-H") */ |
| 553 | #endif |
| 554 | extern int max_received_linelength;/* What it says */ |
| 555 | extern int max_username_length; /* For systems with broken getpwnam() */ |
| 556 | extern int message_age; /* In seconds */ |
| 557 | extern uschar *message_body; /* Start of message body for filter */ |
| 558 | extern uschar *message_body_end; /* End of message body for filter */ |
| 559 | extern BOOL message_body_newlines; /* FALSE => remove newlines */ |
| 560 | extern int message_body_size; /* Sic */ |
| 561 | extern int message_body_visible; /* Amount visible in message_body */ |
| 562 | extern int message_ended; /* State of message reading and how ended */ |
| 563 | extern uschar *message_headers; /* When built */ |
| 564 | extern uschar message_id_option[]; /* -E<message-id> for use as option */ |
| 565 | extern uschar *message_id_external; /* External form of following */ |
| 566 | extern uschar *message_id_domain; /* Expanded to form domain-part of message_id */ |
| 567 | extern uschar *message_id_text; /* Expanded to form message_id */ |
| 568 | extern struct timeval message_id_tv; /* Time used to create last message_id */ |
| 569 | extern int message_linecount; /* As it says */ |
| 570 | extern BOOL message_logs; /* TRUE to write message logs */ |
| 571 | extern int message_size; /* Size of message */ |
| 572 | extern uschar *message_size_limit; /* As it says */ |
| 573 | extern uschar message_subdir[]; /* Subdirectory for messages */ |
| 574 | extern uschar *message_reference; /* Reference for error messages */ |
| 575 | |
| 576 | /* MIME ACL expandables */ |
| 577 | #ifdef WITH_CONTENT_SCAN |
| 578 | extern int mime_anomaly_level; |
| 579 | extern const uschar *mime_anomaly_text; |
| 580 | extern uschar *mime_boundary; |
| 581 | extern uschar *mime_charset; |
| 582 | extern uschar *mime_content_description; |
| 583 | extern uschar *mime_content_disposition; |
| 584 | extern uschar *mime_content_id; |
| 585 | extern unsigned int mime_content_size; |
| 586 | extern uschar *mime_content_transfer_encoding; |
| 587 | extern uschar *mime_content_type; |
| 588 | extern uschar *mime_decoded_filename; |
| 589 | extern uschar *mime_filename; |
| 590 | extern int mime_is_multipart; |
| 591 | extern int mime_is_coverletter; |
| 592 | extern int mime_is_rfc822; |
| 593 | extern int mime_part_count; |
| 594 | #endif |
| 595 | |
| 596 | extern BOOL mua_wrapper; /* TRUE when Exim is wrapping an MUA */ |
| 597 | |
| 598 | extern uid_t *never_users; /* List of uids never to be used */ |
| 599 | #ifdef WITH_CONTENT_SCAN |
| 600 | extern BOOL no_mbox_unspool; /* don't unlink files in /scan directory */ |
| 601 | #endif |
| 602 | extern BOOL no_multiline_responses; /* For broken clients */ |
| 603 | |
| 604 | extern optionlist optionlist_auths[]; /* These option lists are made */ |
| 605 | extern int optionlist_auths_size; /* global so that readconf can */ |
| 606 | extern optionlist optionlist_routers[]; /* see them for printing out */ |
| 607 | extern int optionlist_routers_size; /* the options. */ |
| 608 | extern optionlist optionlist_transports[]; |
| 609 | extern int optionlist_transports_size; |
| 610 | |
| 611 | extern uid_t original_euid; /* Original effective uid */ |
| 612 | extern gid_t originator_gid; /* Gid of whoever wrote spool file */ |
| 613 | extern uschar *originator_login; /* Login of same */ |
| 614 | extern uschar *originator_name; /* Full name of same */ |
| 615 | extern uid_t originator_uid; /* Uid of ditto */ |
| 616 | extern uschar *override_local_interfaces; /* Value of -oX argument */ |
| 617 | extern uschar *override_pid_file_path; /* Value of -oP argument */ |
| 618 | |
| 619 | extern BOOL parse_allow_group; /* Allow group syntax */ |
| 620 | extern BOOL parse_found_group; /* In the middle of a group */ |
| 621 | extern uschar *percent_hack_domains; /* Local domains for which '% operates */ |
| 622 | extern uschar *pid_file_path; /* For writing daemon pids */ |
| 623 | extern uschar *pipelining_advertise_hosts; /* As it says */ |
| 624 | extern BOOL pipelining_enable; /* As it says */ |
| 625 | #ifndef DISABLE_PRDR |
| 626 | extern BOOL prdr_enable; /* As it says */ |
| 627 | extern BOOL prdr_requested; /* Connecting mail server wants PRDR */ |
| 628 | #endif |
| 629 | extern BOOL preserve_message_logs; /* Save msglog files */ |
| 630 | extern uschar *primary_hostname; /* Primary name of this computer */ |
| 631 | extern BOOL print_topbitchars; /* Topbit chars are printing chars */ |
| 632 | extern uschar process_info[]; /* For SIGUSR1 output */ |
| 633 | extern int process_info_len; |
| 634 | extern uschar *process_log_path; /* Alternate path */ |
| 635 | extern BOOL prod_requires_admin; /* TRUE if prodding requires admin */ |
| 636 | |
| 637 | #ifdef EXPERIMENTAL_PROXY |
| 638 | extern uschar *proxy_host_address; /* IP of host being proxied */ |
| 639 | extern int proxy_host_port; /* Port of host being proxied */ |
| 640 | extern uschar *proxy_required_hosts; /* Hostlist which (require) use proxy protocol */ |
| 641 | extern BOOL proxy_session; /* TRUE if receiving mail from valid proxy */ |
| 642 | extern BOOL proxy_session_failed; /* TRUE if required proxy negotiation failed */ |
| 643 | extern uschar *proxy_target_address; /* IP of proxy server inbound */ |
| 644 | extern int proxy_target_port; /* Port of proxy server inbound */ |
| 645 | #endif |
| 646 | |
| 647 | extern uschar *prvscheck_address; /* Set during prvscheck expansion item */ |
| 648 | extern uschar *prvscheck_keynum; /* Set during prvscheck expansion item */ |
| 649 | extern uschar *prvscheck_result; /* Set during prvscheck expansion item */ |
| 650 | |
| 651 | extern uschar *qualify_domain_recipient; /* Domain to qualify recipients with */ |
| 652 | extern uschar *qualify_domain_sender; /* Domain to qualify senders with */ |
| 653 | extern BOOL queue_2stage; /* Run queue in 2-stage manner */ |
| 654 | extern uschar *queue_domains; /* Queue these domains */ |
| 655 | extern BOOL queue_list_requires_admin; /* TRUE if -bp requires admin */ |
| 656 | extern BOOL queue_run_first_delivery; /* If TRUE, first deliveries only */ |
| 657 | extern BOOL queue_run_force; /* TRUE to force during queue run */ |
| 658 | extern BOOL queue_run_local; /* Local deliveries only in queue run */ |
| 659 | extern BOOL queue_running; /* TRUE for queue running process and */ |
| 660 | /* immediate children */ |
| 661 | extern pid_t queue_run_pid; /* PID of the queue running process or 0 */ |
| 662 | extern int queue_run_pipe; /* Pipe for synchronizing */ |
| 663 | extern int queue_interval; /* Queue running interval */ |
| 664 | extern BOOL queue_only; /* TRUE to disable immediate delivery */ |
| 665 | extern int queue_only_load; /* Max load before auto-queue */ |
| 666 | extern BOOL queue_only_load_latch; /* Latch queue_only_load TRUE */ |
| 667 | extern uschar *queue_only_file; /* Queue if file exists/not-exists */ |
| 668 | extern BOOL queue_only_override; /* Allow override from command line */ |
| 669 | extern BOOL queue_only_policy; /* ACL or local_scan wants queue_only */ |
| 670 | extern BOOL queue_run_in_order; /* As opposed to random */ |
| 671 | extern int queue_run_max; /* Max queue runners */ |
| 672 | extern BOOL queue_smtp; /* Disable all immediate STMP (-odqs)*/ |
| 673 | extern uschar *queue_smtp_domains; /* Ditto, for these domains */ |
| 674 | |
| 675 | extern unsigned int random_seed; /* Seed for random numbers */ |
| 676 | extern tree_node *ratelimiters_cmd; /* Results of command ratelimit checks */ |
| 677 | extern tree_node *ratelimiters_conn; /* Results of connection ratelimit checks */ |
| 678 | extern tree_node *ratelimiters_mail; /* Results of per-mail ratelimit checks */ |
| 679 | extern uschar *raw_active_hostname; /* Pre-expansion */ |
| 680 | extern uschar *raw_sender; /* Before rewriting */ |
| 681 | extern uschar **raw_recipients; /* Before rewriting */ |
| 682 | extern int raw_recipients_count; |
| 683 | extern int rcpt_count; /* Count of RCPT commands in a message */ |
| 684 | extern int rcpt_fail_count; /* Those that got 5xx */ |
| 685 | extern int rcpt_defer_count; /* Those that got 4xx */ |
| 686 | extern gid_t real_gid; /* Real gid */ |
| 687 | extern uid_t real_uid; /* Real user running program */ |
| 688 | extern BOOL really_exim; /* FALSE in utilities */ |
| 689 | extern BOOL receive_call_bombout; /* Flag for crashing log */ |
| 690 | extern int receive_linecount; /* Mainly for BSMTP errors */ |
| 691 | extern int receive_messagecount; /* Mainly for BSMTP errors */ |
| 692 | extern int receive_timeout; /* For non-SMTP acceptance */ |
| 693 | extern int received_count; /* Count of Received: headers */ |
| 694 | extern uschar *received_for; /* For "for" field */ |
| 695 | extern uschar *received_header_text; /* Definition of Received: header */ |
| 696 | extern int received_headers_max; /* Max count of Received: headers */ |
| 697 | extern int received_time; /* Time the message was received */ |
| 698 | extern uschar *recipient_data; /* lookup data for recipients */ |
| 699 | extern uschar *recipient_unqualified_hosts; /* Permitted unqualified recipients */ |
| 700 | extern uschar *recipient_verify_failure; /* What went wrong */ |
| 701 | extern BOOL recipients_discarded; /* By an ACL */ |
| 702 | extern int recipients_list_max; /* Maximum number fitting in list */ |
| 703 | extern int recipients_max; /* Max permitted */ |
| 704 | extern int recipients_max_reject; /* If TRUE, reject whole message */ |
| 705 | extern const pcre *regex_AUTH; /* For recognizing AUTH settings */ |
| 706 | extern const pcre *regex_check_dns_names; /* For DNS name checking */ |
| 707 | extern const pcre *regex_From; /* For recognizing "From_" lines */ |
| 708 | extern const pcre *regex_IGNOREQUOTA; /* For recognizing IGNOREQUOTA (LMTP) */ |
| 709 | extern const pcre *regex_PIPELINING; /* For recognizing PIPELINING */ |
| 710 | extern const pcre *regex_SIZE; /* For recognizing SIZE settings */ |
| 711 | extern const pcre *regex_smtp_code; /* For recognizing SMTP codes */ |
| 712 | extern const pcre *regex_ismsgid; /* Compiled r.e. for message it */ |
| 713 | #ifdef WHITELIST_D_MACROS |
| 714 | extern const pcre *regex_whitelisted_macro; /* For -D macro values */ |
| 715 | #endif |
| 716 | #ifdef WITH_CONTENT_SCAN |
| 717 | extern uschar *regex_match_string; /* regex that matched a line (regex ACL condition) */ |
| 718 | #endif |
| 719 | extern int remote_delivery_count; /* Number of remote addresses */ |
| 720 | extern int remote_max_parallel; /* Maximum parallel delivery */ |
| 721 | extern uschar *remote_sort_domains; /* Remote domain sorting order */ |
| 722 | extern retry_config *retries; /* Chain of retry config information */ |
| 723 | extern int retry_data_expire; /* When to expire retry data */ |
| 724 | extern int retry_interval_max; /* Absolute maximum */ |
| 725 | extern int retry_maximum_timeout; /* The maximum timeout */ |
| 726 | extern uschar *return_path; /* Return path for a message */ |
| 727 | extern BOOL return_path_remove; /* Remove return-path headers */ |
| 728 | extern int rewrite_existflags; /* Indicate which headers have rewrites */ |
| 729 | extern uschar *rfc1413_hosts; /* RFC hosts */ |
| 730 | extern int rfc1413_query_timeout; /* Timeout on RFC 1413 calls */ |
| 731 | /* extern BOOL rfc821_domains; */ /* If set, syntax is 821, not 822 => being abolished */ |
| 732 | extern uid_t root_gid; /* The gid for root */ |
| 733 | extern uid_t root_uid; /* The uid for root */ |
| 734 | extern router_info routers_available[];/* Vector of available routers */ |
| 735 | extern router_instance *routers; /* Chain of instantiated routers */ |
| 736 | extern router_instance router_defaults;/* Default values */ |
| 737 | extern uschar *router_name; /* Name of router last started */ |
| 738 | extern BOOL running_in_test_harness; /*TRUE when running_status is patched */ |
| 739 | extern ip_address_item *running_interfaces; /* Host's running interfaces */ |
| 740 | extern uschar *running_status; /* Flag string for testing */ |
| 741 | extern int runrc; /* rc from ${run} */ |
| 742 | |
| 743 | extern uschar *search_error_message; /* Details of lookup problem */ |
| 744 | extern BOOL search_find_defer; /* Set TRUE if lookup deferred */ |
| 745 | extern uschar *self_hostname; /* Self host after routing->directors */ |
| 746 | extern unsigned int sender_address_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender */ |
| 747 | extern uschar *sender_address_data; /* address_data from sender verify */ |
| 748 | extern BOOL sender_address_forced; /* Set by -f */ |
| 749 | extern uschar *sender_address_unrewritten; /* Set if rewritten by verify */ |
| 750 | extern uschar *sender_data; /* lookup result for senders */ |
| 751 | extern unsigned int sender_domain_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender domain */ |
| 752 | extern uschar *sender_fullhost; /* Sender host name + address */ |
| 753 | extern uschar *sender_helo_name; /* Host name from HELO/EHLO */ |
| 754 | extern uschar **sender_host_aliases; /* Points to list of alias names */ |
| 755 | extern unsigned int sender_host_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for incoming host */ |
| 756 | extern BOOL sender_host_dnssec; /* true if sender_host_name verified in DNSSEC */ |
| 757 | extern BOOL sender_host_notsocket; /* Set for -bs and -bS */ |
| 758 | extern BOOL sender_host_unknown; /* TRUE for -bs and -bS except inetd */ |
| 759 | extern uschar *sender_ident; /* Sender identity via RFC 1413 */ |
| 760 | extern BOOL sender_local; /* TRUE for local senders */ |
| 761 | extern BOOL sender_name_forced; /* Set by -F */ |
| 762 | extern uschar *sender_rate; /* Sender rate computed by ACL */ |
| 763 | extern uschar *sender_rate_limit; /* Configured rate limit */ |
| 764 | extern uschar *sender_rate_period; /* Configured smoothing period */ |
| 765 | extern uschar *sender_rcvhost; /* Host data for Received: */ |
| 766 | extern BOOL sender_set_untrusted; /* Sender set by untrusted caller */ |
| 767 | extern uschar *sender_unqualified_hosts; /* Permitted unqualified senders */ |
| 768 | extern uschar *sender_verify_failure; /* What went wrong */ |
| 769 | extern address_item *sender_verified_list; /* Saved chain of sender verifies */ |
| 770 | extern address_item *sender_verified_failed; /* The one that caused denial */ |
| 771 | extern uschar *sending_ip_address; /* Address of outgoing (SMTP) interface */ |
| 772 | extern int sending_port; /* Port of outgoing interface */ |
| 773 | extern SIGNAL_BOOL sigalrm_seen; /* Flag for sigalrm_handler */ |
| 774 | extern uschar **sighup_argv; /* Args for re-execing after SIGHUP */ |
| 775 | extern int smtp_accept_count; /* Count of connections */ |
| 776 | extern BOOL smtp_accept_keepalive; /* Set keepalive on incoming */ |
| 777 | extern int smtp_accept_max; /* Max SMTP connections */ |
| 778 | extern int smtp_accept_max_nonmail;/* Max non-mail commands in one con */ |
| 779 | extern uschar *smtp_accept_max_nonmail_hosts; /* Limit non-mail cmds from these hosts */ |
| 780 | extern int smtp_accept_max_per_connection; /* Max msgs per connection */ |
| 781 | extern uschar *smtp_accept_max_per_host; /* Max SMTP cons from one IP addr */ |
| 782 | extern int smtp_accept_queue; /* Queue after so many connections */ |
| 783 | extern int smtp_accept_queue_per_connection; /* Queue after so many msgs */ |
| 784 | extern int smtp_accept_reserve; /* Reserve these SMTP connections */ |
| 785 | extern uschar *smtp_active_hostname; /* Hostname for this message */ |
| 786 | extern BOOL smtp_authenticated; /* Sending client has authenticated */ |
| 787 | extern uschar *smtp_banner; /* Banner string (to be expanded) */ |
| 788 | extern BOOL smtp_check_spool_space; /* TRUE to check SMTP SIZE value */ |
| 789 | extern int smtp_ch_index; /* Index in smtp_connection_had */ |
| 790 | extern uschar *smtp_cmd_argument; /* For all SMTP commands */ |
| 791 | extern uschar *smtp_cmd_buffer; /* SMTP command buffer */ |
| 792 | extern time_t smtp_connection_start; /* Start time of SMTP connection */ |
| 793 | extern uschar smtp_connection_had[]; /* Recent SMTP commands */ |
| 794 | extern int smtp_connect_backlog; /* Max backlog permitted */ |
| 795 | extern double smtp_delay_mail; /* Current MAIL delay */ |
| 796 | extern double smtp_delay_rcpt; /* Current RCPT delay */ |
| 797 | extern BOOL smtp_enforce_sync; /* Enforce sync rules */ |
| 798 | extern uschar *smtp_etrn_command; /* Command to run */ |
| 799 | extern BOOL smtp_etrn_serialize; /* Only one at once */ |
| 800 | extern FILE *smtp_in; /* Incoming SMTP input file */ |
| 801 | extern int smtp_load_reserve; /* Only from reserved if load > this */ |
| 802 | extern int smtp_mailcmd_count; /* Count of MAIL commands */ |
| 803 | extern int smtp_max_synprot_errors;/* Max syntax/protocol errors */ |
| 804 | extern int smtp_max_unknown_commands; /* As it says */ |
| 805 | extern uschar *smtp_notquit_reason; /* Global for disconnect reason */ |
| 806 | extern FILE *smtp_out; /* Incoming SMTP output file */ |
| 807 | extern uschar *smtp_ratelimit_hosts; /* Rate limit these hosts */ |
| 808 | extern uschar *smtp_ratelimit_mail; /* Parameters for MAIL limiting */ |
| 809 | extern uschar *smtp_ratelimit_rcpt; /* Parameters for RCPT limiting */ |
| 810 | extern uschar *smtp_read_error; /* Message for SMTP input error */ |
| 811 | extern int smtp_receive_timeout; /* Applies to each received line */ |
| 812 | extern uschar *smtp_receive_timeout_s; /* ... expandable version */ |
| 813 | extern uschar *smtp_reserve_hosts; /* Hosts for reserved slots */ |
| 814 | extern BOOL smtp_return_error_details; /* TRUE to return full info */ |
| 815 | extern int smtp_rlm_base; /* Base interval for MAIL rate limit */ |
| 816 | extern double smtp_rlm_factor; /* Factor for MAIL rate limit */ |
| 817 | extern int smtp_rlm_limit; /* Max delay */ |
| 818 | extern int smtp_rlm_threshold; /* Threshold for RCPT rate limit */ |
| 819 | extern int smtp_rlr_base; /* Base interval for RCPT rate limit */ |
| 820 | extern double smtp_rlr_factor; /* Factor for RCPT rate limit */ |
| 821 | extern int smtp_rlr_limit; /* Max delay */ |
| 822 | extern int smtp_rlr_threshold; /* Threshold for RCPT rate limit */ |
| 823 | extern BOOL smtp_use_pipelining; /* Global for passed connections */ |
| 824 | extern BOOL smtp_use_size; /* Global for passed connections */ |
| 825 | |
| 826 | #ifdef WITH_CONTENT_SCAN |
| 827 | extern uschar *spamd_address; /* address for the spamassassin daemon */ |
| 828 | extern uschar *spam_bar; /* the spam "bar" (textual representation of spam_score) */ |
| 829 | extern uschar *spam_report; /* the spamd report (multiline) */ |
| 830 | extern uschar *spam_score; /* the spam score (float) */ |
| 831 | extern uschar *spam_score_int; /* spam_score * 10 (int) */ |
| 832 | #endif |
| 833 | #ifdef EXPERIMENTAL_SPF |
| 834 | extern uschar *spf_guess; /* spf best-guess record */ |
| 835 | extern uschar *spf_header_comment; /* spf header comment */ |
| 836 | extern uschar *spf_received; /* Received-SPF: header */ |
| 837 | extern uschar *spf_result; /* spf result in string form */ |
| 838 | extern uschar *spf_smtp_comment; /* spf comment to include in SMTP reply */ |
| 839 | #endif |
| 840 | extern BOOL split_spool_directory; /* TRUE to use multiple subdirs */ |
| 841 | extern uschar *spool_directory; /* Name of spool directory */ |
| 842 | #ifdef EXPERIMENTAL_SRS |
| 843 | extern uschar *srs_config; /* SRS config secret:max age:hash length:use timestamp:use hash */ |
| 844 | extern uschar *srs_db_address; /* SRS db address */ |
| 845 | extern uschar *srs_db_key; /* SRS db key */ |
| 846 | extern int srs_hashlength; /* SRS hash length */ |
| 847 | extern int srs_hashmin; /* SRS minimum hash length */ |
| 848 | extern int srs_maxage; /* SRS max age */ |
| 849 | extern uschar *srs_orig_sender; /* SRS original sender */ |
| 850 | extern uschar *srs_orig_recipient; /* SRS original recipient */ |
| 851 | extern uschar *srs_recipient; /* SRS recipient */ |
| 852 | extern uschar *srs_secrets; /* SRS secrets list */ |
| 853 | extern uschar *srs_status; /* SRS staus */ |
| 854 | extern BOOL srs_usehash; /* SRS use hash flag */ |
| 855 | extern BOOL srs_usetimestamp; /* SRS use timestamp flag */ |
| 856 | #endif |
| 857 | extern BOOL strict_acl_vars; /* ACL variables have to be set before being used */ |
| 858 | extern int string_datestamp_offset;/* After insertion by string_format */ |
| 859 | extern int string_datestamp_length;/* After insertion by string_format */ |
| 860 | extern int string_datestamp_type; /* After insertion by string_format */ |
| 861 | extern BOOL strip_excess_angle_brackets; /* Surrounding route-addrs */ |
| 862 | extern BOOL strip_trailing_dot; /* Remove dots at ends of domains */ |
| 863 | extern uschar *submission_domain; /* Domain for submission mode */ |
| 864 | extern BOOL submission_mode; /* Can be forced from ACL */ |
| 865 | extern uschar *submission_name; /* User name set from ACL */ |
| 866 | extern BOOL suppress_local_fixups; /* Can be forced from ACL */ |
| 867 | extern BOOL suppress_local_fixups_default; /* former is reset to this; override with -G */ |
| 868 | extern BOOL synchronous_delivery; /* TRUE if -odi is set */ |
| 869 | extern BOOL syslog_duplication; /* FALSE => no duplicate logging */ |
| 870 | extern int syslog_facility; /* As defined by Syslog.h */ |
| 871 | extern uschar *syslog_processname; /* 'ident' param to openlog() */ |
| 872 | extern BOOL syslog_timestamp; /* TRUE if time on syslogs */ |
| 873 | extern uschar *system_filter; /* Name of system filter file */ |
| 874 | |
| 875 | extern uschar *system_filter_directory_transport; /* Transports for the */ |
| 876 | extern uschar *system_filter_file_transport; /* system filter */ |
| 877 | extern uschar *system_filter_pipe_transport; |
| 878 | extern uschar *system_filter_reply_transport; |
| 879 | |
| 880 | extern gid_t system_filter_gid; /* Gid for running system filter */ |
| 881 | extern BOOL system_filter_gid_set; /* TRUE if gid set */ |
| 882 | extern uid_t system_filter_uid; /* Uid for running system filter */ |
| 883 | extern BOOL system_filter_uid_set; /* TRUE if uid set */ |
| 884 | extern BOOL system_filtering; /* TRUE when running system filter */ |
| 885 | |
| 886 | extern BOOL tcp_nodelay; /* Controls TCP_NODELAY on daemon */ |
| 887 | #ifdef USE_TCP_WRAPPERS |
| 888 | extern uschar *tcp_wrappers_daemon_name; /* tcpwrappers daemon lookup name */ |
| 889 | #endif |
| 890 | extern int test_harness_load_avg; /* For use when testing */ |
| 891 | extern int thismessage_size_limit; /* Limit for this message */ |
| 892 | extern int timeout_frozen_after; /* Max time to keep frozen messages */ |
| 893 | extern BOOL timestamps_utc; /* Use UTC for all times */ |
| 894 | |
| 895 | extern uschar *transport_name; /* Name of transport last started */ |
| 896 | extern int transport_count; /* Count of bytes transported */ |
| 897 | extern int transport_newlines; /* Accurate count of number of newline chars transported */ |
| 898 | extern uschar **transport_filter_argv; /* For on-the-fly filtering */ |
| 899 | extern int transport_filter_timeout; /* Timeout for same */ |
| 900 | extern BOOL transport_filter_timed_out; /* True if it did */ |
| 901 | |
| 902 | extern transport_info transports_available[]; /* Vector of available transports */ |
| 903 | extern transport_instance *transports; /* Chain of instantiated transports */ |
| 904 | extern transport_instance transport_defaults; /* Default values */ |
| 905 | |
| 906 | extern int transport_write_timeout;/* Set to time out individual writes */ |
| 907 | |
| 908 | extern tree_node *tree_dns_fails; /* Tree of DNS lookup failures */ |
| 909 | extern tree_node *tree_duplicates; /* Tree of duplicate addresses */ |
| 910 | extern tree_node *tree_nonrecipients; /* Tree of nonrecipient addresses */ |
| 911 | extern tree_node *tree_unusable; /* Tree of unusable addresses */ |
| 912 | |
| 913 | extern BOOL trusted_caller; /* Caller is trusted */ |
| 914 | extern BOOL trusted_config; /* Configuration file is trusted */ |
| 915 | extern gid_t *trusted_groups; /* List of trusted groups */ |
| 916 | extern uid_t *trusted_users; /* List of trusted users */ |
| 917 | extern uschar *timezone_string; /* Required timezone setting */ |
| 918 | |
| 919 | extern uschar *unknown_login; /* To use when login id unknown */ |
| 920 | extern uschar *unknown_username; /* Ditto */ |
| 921 | extern uschar *untrusted_set_sender; /* Let untrusted users set these senders */ |
| 922 | extern uschar *uucp_from_pattern; /* For recognizing "From " lines */ |
| 923 | extern uschar *uucp_from_sender; /* For building the sender */ |
| 924 | |
| 925 | extern uschar *warn_message_file; /* Template for warning messages */ |
| 926 | extern uschar *warnmsg_delay; /* String form of delay time */ |
| 927 | extern uschar *warnmsg_recipients; /* Recipients of warning message */ |
| 928 | extern BOOL write_rejectlog; /* Control of reject logging */ |
| 929 | |
| 930 | extern uschar *verify_mode; /* Running a router in verify mode */ |
| 931 | extern uschar *version_copyright; /* Copyright notice */ |
| 932 | extern uschar *version_date; /* Date of compilation */ |
| 933 | extern uschar *version_cnumber; /* Compile number */ |
| 934 | extern uschar *version_string; /* Version string */ |
| 935 | |
| 936 | extern int warning_count; /* Delay warnings sent for this msg */ |
| 937 | |
| 938 | /* End of globals.h */ |