RFC3461 support - MIME DSN messages. Bug 118
[exim.git] / src / src / spool_in.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
c4ceed07 5/* Copyright (c) University of Cambridge 1995 - 2012 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
8/* Functions for reading spool files. When compiling for a utility (eximon),
9not all are needed, and some functionality can be cut out. */
10
11
12#include "exim.h"
13
14
15
16#ifndef COMPILE_UTILITY
17/*************************************************
18* Open and lock data file *
19*************************************************/
20
21/* The data file is the one that is used for locking, because the header file
22can get replaced during delivery because of header rewriting. The file has
23to opened with write access so that we can get an exclusive lock, but in
24fact it won't be written to. Just in case there's a major disaster (e.g.
25overwriting some other file descriptor with the value of this one), open it
26with append.
27
28Argument: the id of the message
29Returns: TRUE if file successfully opened and locked
30
31Side effect: deliver_datafile is set to the fd of the open file.
32*/
33
34BOOL
35spool_open_datafile(uschar *id)
36{
37int i;
38struct stat statbuf;
39flock_t lock_data;
40uschar spoolname[256];
41
42/* If split_spool_directory is set, first look for the file in the appropriate
43sub-directory of the input directory. If it is not found there, try the input
44directory itself, to pick up leftovers from before the splitting. If split_
45spool_directory is not set, first look in the main input directory. If it is
46not found there, try the split sub-directory, in case it is left over from a
47splitting state. */
48
49for (i = 0; i < 2; i++)
50 {
51 int save_errno;
52 message_subdir[0] = (split_spool_directory == (i == 0))? id[5] : 0;
53 sprintf(CS spoolname, "%s/input/%s/%s-D", spool_directory, message_subdir, id);
54 deliver_datafile = Uopen(spoolname, O_RDWR | O_APPEND, 0);
55 if (deliver_datafile >= 0) break;
56 save_errno = errno;
57 if (errno == ENOENT)
58 {
59 if (i == 0) continue;
60 if (!queue_running)
61 log_write(0, LOG_MAIN, "Spool file %s-D not found", id);
62 }
63 else log_write(0, LOG_MAIN, "Spool error for %s: %s", spoolname,
64 strerror(errno));
65 errno = save_errno;
66 return FALSE;
67 }
68
69/* File is open and message_subdir is set. Set the close-on-exec flag, and lock
70the file. We lock only the first line of the file (containing the message ID)
71because this apparently is needed for running Exim under Cygwin. If the entire
72file is locked in one process, a sub-process cannot access it, even when passed
73an open file descriptor (at least, I think that's the Cygwin story). On real
74Unix systems it doesn't make any difference as long as Exim is consistent in
75what it locks. */
76
ff790e47 77(void)fcntl(deliver_datafile, F_SETFD, fcntl(deliver_datafile, F_GETFD) |
059ec3d9
PH
78 FD_CLOEXEC);
79
80lock_data.l_type = F_WRLCK;
81lock_data.l_whence = SEEK_SET;
82lock_data.l_start = 0;
83lock_data.l_len = SPOOL_DATA_START_OFFSET;
84
85if (fcntl(deliver_datafile, F_SETLK, &lock_data) < 0)
86 {
87 log_write(L_skip_delivery,
88 LOG_MAIN,
89 "Spool file is locked (another process is handling this message)");
f1e894f3 90 (void)close(deliver_datafile);
059ec3d9
PH
91 deliver_datafile = -1;
92 errno = 0;
93 return FALSE;
94 }
95
96/* Get the size of the data; don't include the leading filename line
97in the count, but add one for the newline before the data. */
98
99if (fstat(deliver_datafile, &statbuf) == 0)
100 {
101 message_body_size = statbuf.st_size - SPOOL_DATA_START_OFFSET;
102 message_size = message_body_size + 1;
103 }
104
105return TRUE;
106}
107#endif /* COMPILE_UTILITY */
108
109
110
111/*************************************************
112* Read non-recipients tree from spool file *
113*************************************************/
114
115/* The tree of non-recipients is written to the spool file in a form that
116makes it easy to read back into a tree. The format is as follows:
117
118 . Each node is preceded by two letter(Y/N) indicating whether it has left
119 or right children. There's one space after the two flags, before the name.
120
121 . The left subtree (if any) then follows, then the right subtree (if any).
122
123This function is entered with the next input line in the buffer. Note we must
124save the right flag before recursing with the same buffer.
125
126Once the tree is read, we re-construct the balance fields by scanning the tree.
127I forgot to write them out originally, and the compatible fix is to do it this
128way. This initial local recursing function does the necessary.
129
130Arguments:
131 node tree node
132
133Returns: maximum depth below the node, including the node itself
134*/
135
136static int
137count_below(tree_node *node)
138{
139int nleft, nright;
140if (node == NULL) return 0;
141nleft = count_below(node->left);
142nright = count_below(node->right);
143node->balance = (nleft > nright)? 1 : ((nright > nleft)? 2 : 0);
144return 1 + ((nleft > nright)? nleft : nright);
145}
146
147/* This is the real function...
148
149Arguments:
150 connect pointer to the root of the tree
151 f FILE to read data from
152 buffer contains next input line; further lines read into it
153 buffer_size size of the buffer
154
155Returns: FALSE on format error
156*/
157
158static BOOL
159read_nonrecipients_tree(tree_node **connect, FILE *f, uschar *buffer,
160 int buffer_size)
161{
162tree_node *node;
163int n = Ustrlen(buffer);
164BOOL right = buffer[1] == 'Y';
165
166if (n < 5) return FALSE; /* malformed line */
167buffer[n-1] = 0; /* Remove \n */
168node = store_get(sizeof(tree_node) + n - 3);
169*connect = node;
170Ustrcpy(node->name, buffer + 3);
171node->data.ptr = NULL;
172
173if (buffer[0] == 'Y')
174 {
175 if (Ufgets(buffer, buffer_size, f) == NULL ||
176 !read_nonrecipients_tree(&node->left, f, buffer, buffer_size))
177 return FALSE;
178 }
179else node->left = NULL;
180
181if (right)
182 {
183 if (Ufgets(buffer, buffer_size, f) == NULL ||
184 !read_nonrecipients_tree(&node->right, f, buffer, buffer_size))
185 return FALSE;
186 }
187else node->right = NULL;
188
189(void) count_below(*connect);
190return TRUE;
191}
192
193
194
195
196/*************************************************
197* Read spool header file *
198*************************************************/
199
200/* This function reads a spool header file and places the data into the
201appropriate global variables. The header portion is always read, but header
202structures are built only if read_headers is set true. It isn't, for example,
203while generating -bp output.
204
205It may be possible for blocks of nulls (binary zeroes) to get written on the
206end of a file if there is a system crash during writing. It was observed on an
207earlier version of Exim that omitted to fsync() the files - this is thought to
208have been the cause of that incident, but in any case, this code must be robust
209against such an event, and if such a file is encountered, it must be treated as
210malformed.
211
212Arguments:
213 name name of the header file, including the -H
214 read_headers TRUE if in-store header structures are to be built
215 subdir_set TRUE is message_subdir is already set
216
217Returns: spool_read_OK success
218 spool_read_notopen open failed
219 spool_read_enverror error in the envelope portion
220 spool_read_hdrdrror error in the header portion
221*/
222
223int
224spool_read_header(uschar *name, BOOL read_headers, BOOL subdir_set)
225{
226FILE *f = NULL;
227int n;
228int rcount = 0;
229long int uid, gid;
230BOOL inheader = FALSE;
1e70f85b 231uschar *p;
059ec3d9
PH
232
233/* Reset all the global variables to their default values. However, there is
234one exception. DO NOT change the default value of dont_deliver, because it may
235be forced by an external setting. */
236
38a0a95f 237acl_var_c = acl_var_m = NULL;
059ec3d9
PH
238authenticated_id = NULL;
239authenticated_sender = NULL;
240allow_unqualified_recipient = FALSE;
241allow_unqualified_sender = FALSE;
242body_linecount = 0;
243body_zerocount = 0;
244deliver_firsttime = FALSE;
245deliver_freeze = FALSE;
246deliver_frozen_at = 0;
247deliver_manual_thaw = FALSE;
248/* dont_deliver must NOT be reset */
249header_list = header_last = NULL;
b08b24c8 250host_lookup_deferred = FALSE;
059ec3d9
PH
251host_lookup_failed = FALSE;
252interface_address = NULL;
253interface_port = 0;
254local_error_message = FALSE;
255local_scan_data = NULL;
d677b2f2 256max_received_linelength = 0;
059ec3d9
PH
257message_linecount = 0;
258received_protocol = NULL;
259received_count = 0;
260recipients_list = NULL;
261sender_address = NULL;
262sender_fullhost = NULL;
263sender_helo_name = NULL;
264sender_host_address = NULL;
265sender_host_name = NULL;
266sender_host_port = 0;
267sender_host_authenticated = NULL;
268sender_ident = NULL;
269sender_local = FALSE;
270sender_set_untrusted = FALSE;
1f5b4c3d 271smtp_active_hostname = primary_hostname;
059ec3d9
PH
272tree_nonrecipients = NULL;
273
8523533c
TK
274#ifdef EXPERIMENTAL_BRIGHTMAIL
275bmi_run = 0;
276bmi_verdicts = NULL;
277#endif
278
80a47a2c 279#ifndef DISABLE_DKIM
9e5d6b55 280dkim_signers = NULL;
80a47a2c
TK
281dkim_disable_verify = FALSE;
282dkim_collect_input = FALSE;
f7572e5a
TK
283#endif
284
059ec3d9 285#ifdef SUPPORT_TLS
817d9f57
JH
286tls_in.certificate_verified = FALSE;
287tls_in.cipher = NULL;
9d1c15ef
JH
288tls_in.ourcert = NULL;
289tls_in.peercert = NULL;
817d9f57
JH
290tls_in.peerdn = NULL;
291tls_in.sni = NULL;
44662487 292tls_in.ocsp = OCSP_NOT_REQ;
7be682ca 293#endif
059ec3d9 294
8523533c 295#ifdef WITH_CONTENT_SCAN
8523533c
TK
296spam_score_int = NULL;
297#endif
298
6c1c3d1d
WB
299#ifdef EXPERIMENTAL_DSN
300dsn_ret = 0;
301dsn_envid = NULL;
302#endif
303
059ec3d9
PH
304/* Generate the full name and open the file. If message_subdir is already
305set, just look in the given directory. Otherwise, look in both the split
306and unsplit directories, as for the data file above. */
307
308for (n = 0; n < 2; n++)
309 {
310 if (!subdir_set)
311 message_subdir[0] = (split_spool_directory == (n == 0))? name[5] : 0;
312 sprintf(CS big_buffer, "%s/input/%s/%s", spool_directory, message_subdir,
313 name);
314 f = Ufopen(big_buffer, "rb");
315 if (f != NULL) break;
316 if (n != 0 || subdir_set || errno != ENOENT) return spool_read_notopen;
317 }
318
319errno = 0;
320
321#ifndef COMPILE_UTILITY
322DEBUG(D_deliver) debug_printf("reading spool file %s\n", name);
323#endif /* COMPILE_UTILITY */
324
325/* The first line of a spool file contains the message id followed by -H (i.e.
326the file name), in order to make the file self-identifying. */
327
328if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
329if (Ustrlen(big_buffer) != MESSAGE_ID_LENGTH + 3 ||
330 Ustrncmp(big_buffer, name, MESSAGE_ID_LENGTH + 2) != 0)
331 goto SPOOL_FORMAT_ERROR;
332
333/* The next three lines in the header file are in a fixed format. The first
334contains the login, uid, and gid of the user who caused the file to be written.
ebb6e6d5
PH
335There are known cases where a negative gid is used, so we allow for both
336negative uids and gids. The second contains the mail address of the message's
337sender, enclosed in <>. The third contains the time the message was received,
338and the number of warning messages for delivery delays that have been sent. */
059ec3d9
PH
339
340if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
341
1e70f85b
PH
342p = big_buffer + Ustrlen(big_buffer);
343while (p > big_buffer && isspace(p[-1])) p--;
344*p = 0;
345if (!isdigit(p[-1])) goto SPOOL_FORMAT_ERROR;
ebb6e6d5 346while (p > big_buffer && (isdigit(p[-1]) || '-' == p[-1])) p--;
1e70f85b
PH
347gid = Uatoi(p);
348if (p <= big_buffer || *(--p) != ' ') goto SPOOL_FORMAT_ERROR;
349*p = 0;
350if (!isdigit(p[-1])) goto SPOOL_FORMAT_ERROR;
ebb6e6d5 351while (p > big_buffer && (isdigit(p[-1]) || '-' == p[-1])) p--;
1e70f85b
PH
352uid = Uatoi(p);
353if (p <= big_buffer || *(--p) != ' ') goto SPOOL_FORMAT_ERROR;
354*p = 0;
8e669ac1 355
1e70f85b 356originator_login = string_copy(big_buffer);
059ec3d9
PH
357originator_uid = (uid_t)uid;
358originator_gid = (gid_t)gid;
359
360if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
361n = Ustrlen(big_buffer);
362if (n < 3 || big_buffer[0] != '<' || big_buffer[n-2] != '>')
363 goto SPOOL_FORMAT_ERROR;
364
365sender_address = store_get(n-2);
366Ustrncpy(sender_address, big_buffer+1, n-3);
367sender_address[n-3] = 0;
368
369if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
370if (sscanf(CS big_buffer, "%d %d", &received_time, &warning_count) != 2)
371 goto SPOOL_FORMAT_ERROR;
372
373message_age = time(NULL) - received_time;
374
375#ifndef COMPILE_UTILITY
376DEBUG(D_deliver) debug_printf("user=%s uid=%ld gid=%ld sender=%s\n",
377 originator_login, (long int)originator_uid, (long int)originator_gid,
378 sender_address);
379#endif /* COMPILE_UTILITY */
380
08955dd3
PH
381/* Now there may be a number of optional lines, each starting with "-". If you
382add a new setting here, make sure you set the default above.
059ec3d9 383
08955dd3
PH
384Because there are now quite a number of different possibilities, we use a
385switch on the first character to avoid too many failing tests. Thanks to Nico
386Erfurth for the patch that implemented this. I have made it even more efficient
387by not re-scanning the first two characters.
388
389To allow new versions of Exim that add additional flags to interwork with older
390versions that do not understand them, just ignore any lines starting with "-"
391that we don't recognize. Otherwise it wouldn't be possible to back off a new
392version that left new-style flags written on the spool. */
393
394p = big_buffer + 2;
059ec3d9
PH
395for (;;)
396 {
397 if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
398 if (big_buffer[0] != '-') break;
059ec3d9 399 big_buffer[Ustrlen(big_buffer) - 1] = 0;
47ca6d6c 400
08955dd3 401 switch(big_buffer[1])
059ec3d9 402 {
08955dd3
PH
403 case 'a':
404
405 /* Nowadays we use "-aclc" and "-aclm" for the different types of ACL
406 variable, because Exim allows any number of them, with arbitrary names.
407 The line in the spool file is "-acl[cm] <name> <length>". The name excludes
408 the c or m. */
409
410 if (Ustrncmp(p, "clc ", 4) == 0 ||
411 Ustrncmp(p, "clm ", 4) == 0)
412 {
413 uschar *name, *endptr;
414 int count;
415 tree_node *node;
416 endptr = Ustrchr(big_buffer + 6, ' ');
417 if (endptr == NULL) goto SPOOL_FORMAT_ERROR;
418 name = string_sprintf("%c%.*s", big_buffer[4], endptr - big_buffer - 6,
419 big_buffer + 6);
420 if (sscanf(CS endptr, " %d", &count) != 1) goto SPOOL_FORMAT_ERROR;
421 node = acl_var_create(name);
422 node->data.ptr = store_get(count + 1);
423 if (fread(node->data.ptr, 1, count+1, f) < count) goto SPOOL_READ_ERROR;
424 ((uschar*)node->data.ptr)[count] = 0;
425 }
426
427 else if (Ustrcmp(p, "llow_unqualified_recipient") == 0)
428 allow_unqualified_recipient = TRUE;
429 else if (Ustrcmp(p, "llow_unqualified_sender") == 0)
430 allow_unqualified_sender = TRUE;
431
432 else if (Ustrncmp(p, "uth_id", 6) == 0)
433 authenticated_id = string_copy(big_buffer + 9);
434 else if (Ustrncmp(p, "uth_sender", 10) == 0)
435 authenticated_sender = string_copy(big_buffer + 13);
436 else if (Ustrncmp(p, "ctive_hostname", 14) == 0)
437 smtp_active_hostname = string_copy(big_buffer + 17);
438
439 /* For long-term backward compatibility, we recognize "-acl", which was
440 used before the number of ACL variables changed from 10 to 20. This was
441 before the subsequent change to an arbitrary number of named variables.
442 This code is retained so that upgrades from very old versions can still
443 handle old-format spool files. The value given after "-acl" is a number
444 that is 0-9 for connection variables, and 10-19 for message variables. */
445
446 else if (Ustrncmp(p, "cl ", 3) == 0)
447 {
448 int index, count;
8dce1a6f 449 uschar name[20]; /* Need plenty of space for %d format */
08955dd3
PH
450 tree_node *node;
451 if (sscanf(CS big_buffer + 5, "%d %d", &index, &count) != 2)
452 goto SPOOL_FORMAT_ERROR;
8dce1a6f
PH
453 if (index < 10)
454 (void) string_format(name, sizeof(name), "%c%d", 'c', index);
455 else if (index < 20) /* ignore out-of-range index */
456 (void) string_format(name, sizeof(name), "%c%d", 'm', index - 10);
08955dd3
PH
457 node = acl_var_create(name);
458 node->data.ptr = store_get(count + 1);
459 if (fread(node->data.ptr, 1, count+1, f) < count) goto SPOOL_READ_ERROR;
460 ((uschar*)node->data.ptr)[count] = 0;
461 }
462 break;
463
464 case 'b':
465 if (Ustrncmp(p, "ody_linecount", 13) == 0)
466 body_linecount = Uatoi(big_buffer + 15);
467 else if (Ustrncmp(p, "ody_zerocount", 13) == 0)
468 body_zerocount = Uatoi(big_buffer + 15);
469 #ifdef EXPERIMENTAL_BRIGHTMAIL
470 else if (Ustrncmp(p, "mi_verdicts ", 12) == 0)
471 bmi_verdicts = string_copy(big_buffer + 14);
472 #endif
473 break;
474
475 case 'd':
476 if (Ustrcmp(p, "eliver_firsttime") == 0)
477 deliver_firsttime = TRUE;
6c1c3d1d
WB
478 #ifdef EXPERIMENTAL_DSN
479 /* Check if the dsn flags have been set in the header file */
480 else if (Ustrncmp(p, "sn_ret", 6) == 0)
481 {
482 dsn_ret= atoi(big_buffer + 8);
483 }
484 else if (Ustrncmp(p, "sn_envid", 8) == 0)
485 {
486 dsn_envid = string_copy(big_buffer + 11);
487 }
488 #endif
08955dd3
PH
489 break;
490
491 case 'f':
492 if (Ustrncmp(p, "rozen", 5) == 0)
493 {
494 deliver_freeze = TRUE;
495 deliver_frozen_at = Uatoi(big_buffer + 7);
496 }
497 break;
498
499 case 'h':
500 if (Ustrcmp(p, "ost_lookup_deferred") == 0)
501 host_lookup_deferred = TRUE;
502 else if (Ustrcmp(p, "ost_lookup_failed") == 0)
503 host_lookup_failed = TRUE;
504 else if (Ustrncmp(p, "ost_auth", 8) == 0)
505 sender_host_authenticated = string_copy(big_buffer + 11);
506 else if (Ustrncmp(p, "ost_name", 8) == 0)
507 sender_host_name = string_copy(big_buffer + 11);
508 else if (Ustrncmp(p, "elo_name", 8) == 0)
509 sender_helo_name = string_copy(big_buffer + 11);
510
511 /* We now record the port number after the address, separated by a
512 dot. For compatibility during upgrading, do nothing if there
513 isn't a value (it gets left at zero). */
514
515 else if (Ustrncmp(p, "ost_address", 11) == 0)
516 {
517 sender_host_port = host_address_extract_port(big_buffer + 14);
518 sender_host_address = string_copy(big_buffer + 14);
519 }
520 break;
521
522 case 'i':
523 if (Ustrncmp(p, "nterface_address", 16) == 0)
524 {
525 interface_port = host_address_extract_port(big_buffer + 19);
526 interface_address = string_copy(big_buffer + 19);
527 }
528 else if (Ustrncmp(p, "dent", 4) == 0)
529 sender_ident = string_copy(big_buffer + 7);
530 break;
531
532 case 'l':
533 if (Ustrcmp(p, "ocal") == 0) sender_local = TRUE;
534 else if (Ustrcmp(big_buffer, "-localerror") == 0)
535 local_error_message = TRUE;
536 else if (Ustrncmp(p, "ocal_scan ", 10) == 0)
537 local_scan_data = string_copy(big_buffer + 12);
538 break;
539
540 case 'm':
541 if (Ustrcmp(p, "anual_thaw") == 0) deliver_manual_thaw = TRUE;
d677b2f2
PH
542 else if (Ustrncmp(p, "ax_received_linelength", 22) == 0)
543 max_received_linelength = Uatoi(big_buffer + 24);
08955dd3
PH
544 break;
545
546 case 'N':
547 if (*p == 0) dont_deliver = TRUE; /* -N */
548 break;
549
550 case 'r':
551 if (Ustrncmp(p, "eceived_protocol", 16) == 0)
552 received_protocol = string_copy(big_buffer + 19);
553 break;
554
555 case 's':
556 if (Ustrncmp(p, "ender_set_untrusted", 19) == 0)
557 sender_set_untrusted = TRUE;
558 #ifdef WITH_CONTENT_SCAN
559 else if (Ustrncmp(p, "pam_score_int ", 14) == 0)
560 spam_score_int = string_copy(big_buffer + 16);
561 #endif
562 break;
563
564 #ifdef SUPPORT_TLS
565 case 't':
566 if (Ustrncmp(p, "ls_certificate_verified", 23) == 0)
817d9f57 567 tls_in.certificate_verified = TRUE;
08955dd3 568 else if (Ustrncmp(p, "ls_cipher", 9) == 0)
817d9f57 569 tls_in.cipher = string_copy(big_buffer + 12);
9d1c15ef
JH
570#ifndef COMPILE_UTILITY
571 else if (Ustrncmp(p, "ls_ourcert", 10) == 0)
572 (void) tls_import_cert(big_buffer + 13, &tls_in.ourcert);
573 else if (Ustrncmp(p, "ls_peercert", 11) == 0)
574 (void) tls_import_cert(big_buffer + 14, &tls_in.peercert);
575#endif
08955dd3 576 else if (Ustrncmp(p, "ls_peerdn", 9) == 0)
817d9f57 577 tls_in.peerdn = string_unprinting(string_copy(big_buffer + 12));
7be682ca 578 else if (Ustrncmp(p, "ls_sni", 6) == 0)
817d9f57 579 tls_in.sni = string_unprinting(string_copy(big_buffer + 9));
44662487
JH
580 else if (Ustrncmp(p, "ls_ocsp", 7) == 0)
581 tls_in.ocsp = big_buffer[10] - '0';
08955dd3
PH
582 break;
583 #endif
584
585 default: /* Present because some compilers complain if all */
586 break; /* possibilities are not covered. */
059ec3d9 587 }
059ec3d9
PH
588 }
589
590/* Build sender_fullhost if required */
591
592#ifndef COMPILE_UTILITY
593host_build_sender_fullhost();
594#endif /* COMPILE_UTILITY */
595
596#ifndef COMPILE_UTILITY
597DEBUG(D_deliver)
598 debug_printf("sender_local=%d ident=%s\n", sender_local,
599 (sender_ident == NULL)? US"unset" : sender_ident);
600#endif /* COMPILE_UTILITY */
601
602/* We now have the tree of addresses NOT to deliver to, or a line
603containing "XX", indicating no tree. */
604
605if (Ustrncmp(big_buffer, "XX\n", 3) != 0 &&
606 !read_nonrecipients_tree(&tree_nonrecipients, f, big_buffer, big_buffer_size))
607 goto SPOOL_FORMAT_ERROR;
608
609#ifndef COMPILE_UTILITY
610DEBUG(D_deliver)
611 {
612 debug_printf("Non-recipients:\n");
613 debug_print_tree(tree_nonrecipients);
614 }
615#endif /* COMPILE_UTILITY */
616
617/* After reading the tree, the next line has not yet been read into the
618buffer. It contains the count of recipients which follow on separate lines. */
619
620if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
621if (sscanf(CS big_buffer, "%d", &rcount) != 1) goto SPOOL_FORMAT_ERROR;
622
623#ifndef COMPILE_UTILITY
624DEBUG(D_deliver) debug_printf("recipients_count=%d\n", rcount);
625#endif /* COMPILE_UTILITY */
626
627recipients_list_max = rcount;
628recipients_list = store_get(rcount * sizeof(recipient_item));
629
630for (recipients_count = 0; recipients_count < rcount; recipients_count++)
631 {
632 int nn;
633 int pno = -1;
6c1c3d1d
WB
634 #ifdef EXPERIMENTAL_DSN
635 int dsn_flags = 0;
636 uschar *orcpt = NULL;
637 #endif
059ec3d9
PH
638 uschar *errors_to = NULL;
639 uschar *p;
640
641 if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
642 nn = Ustrlen(big_buffer);
643 if (nn < 2) goto SPOOL_FORMAT_ERROR;
644
645 /* Remove the newline; this terminates the address if there is no additional
646 data on the line. */
647
648 p = big_buffer + nn - 1;
649 *p-- = 0;
650
651 /* Look back from the end of the line for digits and special terminators.
652 Since an address must end with a domain, we can tell that extra data is
653 present by the presence of the terminator, which is always some character
654 that cannot exist in a domain. (If I'd thought of the need for additional
655 data early on, I'd have put it at the start, with the address at the end. As
656 it is, we have to operate backwards. Addresses are permitted to contain
657 spaces, you see.)
658
659 This code has to cope with various versions of this data that have evolved
660 over time. In all cases, the line might just contain an address, with no
661 additional data. Otherwise, the possibilities are as follows:
662
663 Exim 3 type: <address><space><digits>,<digits>,<digits>
664
665 The second set of digits is the parent number for one_time addresses. The
666 other values were remnants of earlier experiments that were abandoned.
667
668 Exim 4 first type: <address><space><digits>
669
670 The digits are the parent number for one_time addresses.
671
672 Exim 4 new type: <address><space><data>#<type bits>
673
674 The type bits indicate what the contents of the data are.
675
676 Bit 01 indicates that, reading from right to left, the data
677 ends with <errors_to address><space><len>,<pno> where pno is
678 the parent number for one_time addresses, and len is the length
679 of the errors_to address (zero meaning none).
6c1c3d1d
WB
680
681 Bit 02 indicates that, again reading from right to left, the data continues
682 with orcpt len(orcpt),dsn_flags
059ec3d9
PH
683 */
684
685 while (isdigit(*p)) p--;
686
687 /* Handle Exim 3 spool files */
688
689 if (*p == ',')
690 {
691 int dummy;
692 while (isdigit(*(--p)) || *p == ',');
693 if (*p == ' ')
694 {
695 *p++ = 0;
ff790e47 696 (void)sscanf(CS p, "%d,%d", &dummy, &pno);
059ec3d9
PH
697 }
698 }
699
700 /* Handle early Exim 4 spool files */
701
702 else if (*p == ' ')
703 {
704 *p++ = 0;
ff790e47 705 (void)sscanf(CS p, "%d", &pno);
059ec3d9
PH
706 }
707
708 /* Handle current format Exim 4 spool files */
709
710 else if (*p == '#')
711 {
712 int flags;
6c1c3d1d
WB
713
714 #ifdef EXPERIMENTAL_DSN
715 #ifndef COMPILE_UTILITY
716 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - Exim 4 standard format spoolfile\n");
717 #endif /* COMPILE_UTILITY */
718 #endif
719
ff790e47 720 (void)sscanf(CS p+1, "%d", &flags);
059ec3d9
PH
721
722 if ((flags & 0x01) != 0) /* one_time data exists */
723 {
724 int len;
725 while (isdigit(*(--p)) || *p == ',' || *p == '-');
ff790e47 726 (void)sscanf(CS p+1, "%d,%d", &len, &pno);
059ec3d9
PH
727 *p = 0;
728 if (len > 0)
729 {
730 p -= len;
731 errors_to = string_copy(p);
6c1c3d1d
WB
732 }
733 }
734
735 *(--p) = 0; /* Terminate address */
736#ifdef EXPERIMENTAL_DSN
737 if ((flags & 0x02) != 0) /* one_time data exists */
738 {
739 int len;
740 while (isdigit(*(--p)) || *p == ',' || *p == '-');
741 (void)sscanf(CS p+1, "%d,%d", &len, &dsn_flags);
742 *p = 0;
743 if (len > 0)
744 {
745 p -= len;
746 orcpt = string_copy(p);
747 }
059ec3d9
PH
748 }
749
750 *(--p) = 0; /* Terminate address */
6c1c3d1d
WB
751#endif /* EXPERIMENTAL_DSN */
752 }
753#ifdef EXPERIMENTAL_DSN
754 #ifndef COMPILE_UTILITY
755 else
756 {
757 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - No additional fields\n");
758 }
759
760 if ((orcpt != NULL) || (dsn_flags != 0))
761 {
762 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - address: |%s| orcpt: |%s| dsn_flags: %d\n",
763 big_buffer, orcpt, dsn_flags);
764 }
765 if (errors_to != NULL)
766 {
767 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - address: |%s| errorsto: |%s|\n",
768 big_buffer, errors_to);
059ec3d9 769 }
6c1c3d1d
WB
770 #endif /* COMPILE_UTILITY */
771#endif /* EXPERIMENTAL_DSN */
059ec3d9
PH
772
773 recipients_list[recipients_count].address = string_copy(big_buffer);
774 recipients_list[recipients_count].pno = pno;
775 recipients_list[recipients_count].errors_to = errors_to;
6c1c3d1d
WB
776 #ifdef EXPERIMENTAL_DSN
777 recipients_list[recipients_count].orcpt = orcpt;
778 recipients_list[recipients_count].dsn_flags = dsn_flags;
779 #endif
059ec3d9
PH
780 }
781
782/* The remainder of the spool header file contains the headers for the message,
783separated off from the previous data by a blank line. Each header is preceded
784by a count of its length and either a certain letter (for various identified
785headers), space (for a miscellaneous live header) or an asterisk (for a header
786that has been rewritten). Count the Received: headers. We read the headers
787always, in order to check on the format of the file, but only create a header
788list if requested to do so. */
789
790inheader = TRUE;
791if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
792if (big_buffer[0] != '\n') goto SPOOL_FORMAT_ERROR;
793
794while ((n = fgetc(f)) != EOF)
795 {
796 header_line *h;
797 uschar flag[4];
798 int i;
799
800 if (!isdigit(n)) goto SPOOL_FORMAT_ERROR;
1ac6b2e7
JH
801 if(ungetc(n, f) == EOF || fscanf(f, "%d%c ", &n, flag) == EOF)
802 goto SPOOL_READ_ERROR;
059ec3d9
PH
803 if (flag[0] != '*') message_size += n; /* Omit non-transmitted headers */
804
805 if (read_headers)
806 {
807 h = store_get(sizeof(header_line));
808 h->next = NULL;
809 h->type = flag[0];
810 h->slen = n;
811 h->text = store_get(n+1);
812
813 if (h->type == htype_received) received_count++;
814
815 if (header_list == NULL) header_list = h;
816 else header_last->next = h;
817 header_last = h;
818
819 for (i = 0; i < n; i++)
820 {
821 int c = fgetc(f);
822 if (c == 0 || c == EOF) goto SPOOL_FORMAT_ERROR;
823 if (c == '\n' && h->type != htype_old) message_linecount++;
824 h->text[i] = c;
825 }
826 h->text[i] = 0;
827 }
828
829 /* Not requiring header data, just skip through the bytes */
830
831 else for (i = 0; i < n; i++)
832 {
833 int c = fgetc(f);
834 if (c == 0 || c == EOF) goto SPOOL_FORMAT_ERROR;
835 }
836 }
837
838/* We have successfully read the data in the header file. Update the message
839line count by adding the body linecount to the header linecount. Close the file
840and give a positive response. */
841
842#ifndef COMPILE_UTILITY
843DEBUG(D_deliver) debug_printf("body_linecount=%d message_linecount=%d\n",
844 body_linecount, message_linecount);
845#endif /* COMPILE_UTILITY */
846
847message_linecount += body_linecount;
848
849fclose(f);
850return spool_read_OK;
851
852
853/* There was an error reading the spool or there was missing data,
854or there was a format error. A "read error" with no errno means an
855unexpected EOF, which we treat as a format error. */
856
857SPOOL_READ_ERROR:
858if (errno != 0)
859 {
860 n = errno;
861
862 #ifndef COMPILE_UTILITY
863 DEBUG(D_any) debug_printf("Error while reading spool file %s\n", name);
864 #endif /* COMPILE_UTILITY */
865
866 fclose(f);
867 errno = n;
868 return inheader? spool_read_hdrerror : spool_read_enverror;
869 }
870
871SPOOL_FORMAT_ERROR:
872
873#ifndef COMPILE_UTILITY
874DEBUG(D_any) debug_printf("Format error in spool file %s\n", name);
875#endif /* COMPILE_UTILITY */
876
877fclose(f);
878errno = ERRNO_SPOOLFORMAT;
879return inheader? spool_read_hdrerror : spool_read_enverror;
880}
881
9d1c15ef
JH
882/* vi: aw ai sw=2
883*/
059ec3d9 884/* End of spool_in.c */