tidying
[exim.git] / src / src / spool_in.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
80fea873 5/* Copyright (c) University of Cambridge 1995 - 2016 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
8/* Functions for reading spool files. When compiling for a utility (eximon),
9not all are needed, and some functionality can be cut out. */
10
11
12#include "exim.h"
13
14
15
16#ifndef COMPILE_UTILITY
17/*************************************************
18* Open and lock data file *
19*************************************************/
20
21/* The data file is the one that is used for locking, because the header file
22can get replaced during delivery because of header rewriting. The file has
23to opened with write access so that we can get an exclusive lock, but in
24fact it won't be written to. Just in case there's a major disaster (e.g.
25overwriting some other file descriptor with the value of this one), open it
26with append.
27
92b0827a
JH
28As called by deliver_message() (at least) we are operating as root.
29
059ec3d9 30Argument: the id of the message
789f8a4f 31Returns: fd if file successfully opened and locked, else -1
059ec3d9 32
789f8a4f 33Side effect: message_subdir is set for the (possibly split) spool directory
059ec3d9
PH
34*/
35
789f8a4f 36int
059ec3d9
PH
37spool_open_datafile(uschar *id)
38{
39int i;
40struct stat statbuf;
41flock_t lock_data;
789f8a4f 42int fd;
059ec3d9
PH
43
44/* If split_spool_directory is set, first look for the file in the appropriate
45sub-directory of the input directory. If it is not found there, try the input
46directory itself, to pick up leftovers from before the splitting. If split_
47spool_directory is not set, first look in the main input directory. If it is
48not found there, try the split sub-directory, in case it is left over from a
49splitting state. */
50
51for (i = 0; i < 2; i++)
52 {
41313d92 53 uschar * fname;
059ec3d9 54 int save_errno;
9befa1ca 55
4dc2379a 56 message_subdir[0] = split_spool_directory == i ? '\0' : id[5];
41313d92
JH
57 fname = spool_fname(US"input", message_subdir, id, US"-D");
58 DEBUG(D_deliver) debug_printf("Trying spool file %s\n", fname);
a2da3176 59
92b0827a
JH
60 if ((fd = Uopen(fname,
61#ifdef O_CLOEXEC
62 O_CLOEXEC |
63#endif
64 O_RDWR | O_APPEND, 0)) >= 0)
789f8a4f 65 break;
059ec3d9
PH
66 save_errno = errno;
67 if (errno == ENOENT)
68 {
69 if (i == 0) continue;
70 if (!queue_running)
9befa1ca 71 log_write(0, LOG_MAIN, "Spool%s%s file %s-D not found",
12cf7615
JH
72 *queue_name ? US" Q=" : US"",
73 *queue_name ? queue_name : US"",
9befa1ca 74 id);
059ec3d9 75 }
9befa1ca
JH
76 else
77 log_write(0, LOG_MAIN, "Spool error for %s: %s", fname, strerror(errno));
059ec3d9 78 errno = save_errno;
789f8a4f 79 return -1;
059ec3d9
PH
80 }
81
82/* File is open and message_subdir is set. Set the close-on-exec flag, and lock
83the file. We lock only the first line of the file (containing the message ID)
84because this apparently is needed for running Exim under Cygwin. If the entire
85file is locked in one process, a sub-process cannot access it, even when passed
86an open file descriptor (at least, I think that's the Cygwin story). On real
87Unix systems it doesn't make any difference as long as Exim is consistent in
88what it locks. */
89
92b0827a
JH
90#ifndef O_CLOEXEC
91(void)fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC);
92#endif
059ec3d9
PH
93
94lock_data.l_type = F_WRLCK;
95lock_data.l_whence = SEEK_SET;
96lock_data.l_start = 0;
97lock_data.l_len = SPOOL_DATA_START_OFFSET;
98
789f8a4f 99if (fcntl(fd, F_SETLK, &lock_data) < 0)
059ec3d9
PH
100 {
101 log_write(L_skip_delivery,
102 LOG_MAIN,
103 "Spool file is locked (another process is handling this message)");
789f8a4f 104 (void)close(fd);
059ec3d9 105 errno = 0;
789f8a4f 106 return -1;
059ec3d9
PH
107 }
108
109/* Get the size of the data; don't include the leading filename line
110in the count, but add one for the newline before the data. */
111
789f8a4f 112if (fstat(fd, &statbuf) == 0)
059ec3d9
PH
113 {
114 message_body_size = statbuf.st_size - SPOOL_DATA_START_OFFSET;
115 message_size = message_body_size + 1;
116 }
117
789f8a4f 118return fd;
059ec3d9
PH
119}
120#endif /* COMPILE_UTILITY */
121
122
123
124/*************************************************
125* Read non-recipients tree from spool file *
126*************************************************/
127
128/* The tree of non-recipients is written to the spool file in a form that
129makes it easy to read back into a tree. The format is as follows:
130
131 . Each node is preceded by two letter(Y/N) indicating whether it has left
132 or right children. There's one space after the two flags, before the name.
133
134 . The left subtree (if any) then follows, then the right subtree (if any).
135
136This function is entered with the next input line in the buffer. Note we must
137save the right flag before recursing with the same buffer.
138
139Once the tree is read, we re-construct the balance fields by scanning the tree.
140I forgot to write them out originally, and the compatible fix is to do it this
141way. This initial local recursing function does the necessary.
142
143Arguments:
144 node tree node
145
146Returns: maximum depth below the node, including the node itself
147*/
148
149static int
150count_below(tree_node *node)
151{
152int nleft, nright;
153if (node == NULL) return 0;
154nleft = count_below(node->left);
155nright = count_below(node->right);
156node->balance = (nleft > nright)? 1 : ((nright > nleft)? 2 : 0);
157return 1 + ((nleft > nright)? nleft : nright);
158}
159
160/* This is the real function...
161
162Arguments:
163 connect pointer to the root of the tree
164 f FILE to read data from
165 buffer contains next input line; further lines read into it
166 buffer_size size of the buffer
167
168Returns: FALSE on format error
169*/
170
171static BOOL
172read_nonrecipients_tree(tree_node **connect, FILE *f, uschar *buffer,
173 int buffer_size)
174{
175tree_node *node;
176int n = Ustrlen(buffer);
177BOOL right = buffer[1] == 'Y';
178
179if (n < 5) return FALSE; /* malformed line */
180buffer[n-1] = 0; /* Remove \n */
181node = store_get(sizeof(tree_node) + n - 3);
182*connect = node;
183Ustrcpy(node->name, buffer + 3);
184node->data.ptr = NULL;
185
186if (buffer[0] == 'Y')
187 {
188 if (Ufgets(buffer, buffer_size, f) == NULL ||
189 !read_nonrecipients_tree(&node->left, f, buffer, buffer_size))
190 return FALSE;
191 }
192else node->left = NULL;
193
194if (right)
195 {
196 if (Ufgets(buffer, buffer_size, f) == NULL ||
197 !read_nonrecipients_tree(&node->right, f, buffer, buffer_size))
198 return FALSE;
199 }
200else node->right = NULL;
201
202(void) count_below(*connect);
203return TRUE;
204}
205
206
207
208
209/*************************************************
210* Read spool header file *
211*************************************************/
212
213/* This function reads a spool header file and places the data into the
214appropriate global variables. The header portion is always read, but header
215structures are built only if read_headers is set true. It isn't, for example,
216while generating -bp output.
217
218It may be possible for blocks of nulls (binary zeroes) to get written on the
219end of a file if there is a system crash during writing. It was observed on an
220earlier version of Exim that omitted to fsync() the files - this is thought to
221have been the cause of that incident, but in any case, this code must be robust
222against such an event, and if such a file is encountered, it must be treated as
223malformed.
224
92b0827a
JH
225As called from deliver_message() (at least) we are running as root.
226
059ec3d9
PH
227Arguments:
228 name name of the header file, including the -H
229 read_headers TRUE if in-store header structures are to be built
230 subdir_set TRUE is message_subdir is already set
231
232Returns: spool_read_OK success
233 spool_read_notopen open failed
234 spool_read_enverror error in the envelope portion
4c04137d 235 spool_read_hdrerror error in the header portion
059ec3d9
PH
236*/
237
238int
239spool_read_header(uschar *name, BOOL read_headers, BOOL subdir_set)
240{
241FILE *f = NULL;
242int n;
243int rcount = 0;
244long int uid, gid;
245BOOL inheader = FALSE;
1e70f85b 246uschar *p;
059ec3d9
PH
247
248/* Reset all the global variables to their default values. However, there is
249one exception. DO NOT change the default value of dont_deliver, because it may
250be forced by an external setting. */
251
38a0a95f 252acl_var_c = acl_var_m = NULL;
059ec3d9
PH
253authenticated_id = NULL;
254authenticated_sender = NULL;
255allow_unqualified_recipient = FALSE;
256allow_unqualified_sender = FALSE;
257body_linecount = 0;
258body_zerocount = 0;
259deliver_firsttime = FALSE;
260deliver_freeze = FALSE;
261deliver_frozen_at = 0;
262deliver_manual_thaw = FALSE;
263/* dont_deliver must NOT be reset */
264header_list = header_last = NULL;
b08b24c8 265host_lookup_deferred = FALSE;
059ec3d9
PH
266host_lookup_failed = FALSE;
267interface_address = NULL;
268interface_port = 0;
269local_error_message = FALSE;
270local_scan_data = NULL;
d677b2f2 271max_received_linelength = 0;
059ec3d9
PH
272message_linecount = 0;
273received_protocol = NULL;
274received_count = 0;
275recipients_list = NULL;
276sender_address = NULL;
277sender_fullhost = NULL;
278sender_helo_name = NULL;
279sender_host_address = NULL;
280sender_host_name = NULL;
281sender_host_port = 0;
282sender_host_authenticated = NULL;
283sender_ident = NULL;
284sender_local = FALSE;
285sender_set_untrusted = FALSE;
1f5b4c3d 286smtp_active_hostname = primary_hostname;
328c5688
JH
287#ifndef COMPILE_UTILITY
288spool_file_wireformat = FALSE;
289#endif
059ec3d9
PH
290tree_nonrecipients = NULL;
291
8523533c
TK
292#ifdef EXPERIMENTAL_BRIGHTMAIL
293bmi_run = 0;
294bmi_verdicts = NULL;
295#endif
296
80a47a2c 297#ifndef DISABLE_DKIM
9e5d6b55 298dkim_signers = NULL;
80a47a2c
TK
299dkim_disable_verify = FALSE;
300dkim_collect_input = FALSE;
f7572e5a
TK
301#endif
302
059ec3d9 303#ifdef SUPPORT_TLS
817d9f57 304tls_in.certificate_verified = FALSE;
53a7196b
JH
305# ifdef EXPERIMENTAL_DANE
306tls_in.dane_verified = FALSE;
307# endif
817d9f57 308tls_in.cipher = NULL;
790fbb71
JH
309# ifndef COMPILE_UTILITY /* tls support fns not built in */
310tls_free_cert(&tls_in.ourcert);
311tls_free_cert(&tls_in.peercert);
312# endif
817d9f57
JH
313tls_in.peerdn = NULL;
314tls_in.sni = NULL;
44662487 315tls_in.ocsp = OCSP_NOT_REQ;
7be682ca 316#endif
059ec3d9 317
8523533c 318#ifdef WITH_CONTENT_SCAN
3481c572
JH
319spam_bar = NULL;
320spam_score = NULL;
8523533c
TK
321spam_score_int = NULL;
322#endif
323
8c5d388a 324#if defined(SUPPORT_I18N) && !defined(COMPILE_UTILITY)
7ade712c 325message_smtputf8 = FALSE;
3c8b3577 326message_utf8_downconvert = 0;
7ade712c
JH
327#endif
328
6c1c3d1d
WB
329dsn_ret = 0;
330dsn_envid = NULL;
6c1c3d1d 331
059ec3d9
PH
332/* Generate the full name and open the file. If message_subdir is already
333set, just look in the given directory. Otherwise, look in both the split
334and unsplit directories, as for the data file above. */
335
336for (n = 0; n < 2; n++)
337 {
338 if (!subdir_set)
a2da3176 339 message_subdir[0] = split_spool_directory == (n == 0) ? name[5] : 0;
41313d92
JH
340
341 if ((f = Ufopen(spool_fname(US"input", message_subdir, name, US""), "rb")))
342 break;
343 if (n != 0 || subdir_set || errno != ENOENT)
344 return spool_read_notopen;
059ec3d9
PH
345 }
346
347errno = 0;
348
349#ifndef COMPILE_UTILITY
350DEBUG(D_deliver) debug_printf("reading spool file %s\n", name);
351#endif /* COMPILE_UTILITY */
352
353/* The first line of a spool file contains the message id followed by -H (i.e.
354the file name), in order to make the file self-identifying. */
355
356if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
357if (Ustrlen(big_buffer) != MESSAGE_ID_LENGTH + 3 ||
358 Ustrncmp(big_buffer, name, MESSAGE_ID_LENGTH + 2) != 0)
359 goto SPOOL_FORMAT_ERROR;
360
361/* The next three lines in the header file are in a fixed format. The first
362contains the login, uid, and gid of the user who caused the file to be written.
ebb6e6d5
PH
363There are known cases where a negative gid is used, so we allow for both
364negative uids and gids. The second contains the mail address of the message's
365sender, enclosed in <>. The third contains the time the message was received,
366and the number of warning messages for delivery delays that have been sent. */
059ec3d9
PH
367
368if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
369
1e70f85b
PH
370p = big_buffer + Ustrlen(big_buffer);
371while (p > big_buffer && isspace(p[-1])) p--;
372*p = 0;
373if (!isdigit(p[-1])) goto SPOOL_FORMAT_ERROR;
ebb6e6d5 374while (p > big_buffer && (isdigit(p[-1]) || '-' == p[-1])) p--;
1e70f85b
PH
375gid = Uatoi(p);
376if (p <= big_buffer || *(--p) != ' ') goto SPOOL_FORMAT_ERROR;
377*p = 0;
378if (!isdigit(p[-1])) goto SPOOL_FORMAT_ERROR;
ebb6e6d5 379while (p > big_buffer && (isdigit(p[-1]) || '-' == p[-1])) p--;
1e70f85b
PH
380uid = Uatoi(p);
381if (p <= big_buffer || *(--p) != ' ') goto SPOOL_FORMAT_ERROR;
382*p = 0;
8e669ac1 383
1e70f85b 384originator_login = string_copy(big_buffer);
059ec3d9
PH
385originator_uid = (uid_t)uid;
386originator_gid = (gid_t)gid;
387
e91ad4a7 388/* envelope from */
059ec3d9
PH
389if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
390n = Ustrlen(big_buffer);
391if (n < 3 || big_buffer[0] != '<' || big_buffer[n-2] != '>')
392 goto SPOOL_FORMAT_ERROR;
393
394sender_address = store_get(n-2);
395Ustrncpy(sender_address, big_buffer+1, n-3);
396sender_address[n-3] = 0;
397
e91ad4a7 398/* time */
059ec3d9 399if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
32dfdf8b 400if (sscanf(CS big_buffer, TIME_T_FMT " %d", &received_time.tv_sec, &warning_count) != 2)
059ec3d9 401 goto SPOOL_FORMAT_ERROR;
32dfdf8b 402received_time.tv_usec = 0;
059ec3d9 403
32dfdf8b 404message_age = time(NULL) - received_time.tv_sec;
059ec3d9
PH
405
406#ifndef COMPILE_UTILITY
407DEBUG(D_deliver) debug_printf("user=%s uid=%ld gid=%ld sender=%s\n",
408 originator_login, (long int)originator_uid, (long int)originator_gid,
409 sender_address);
410#endif /* COMPILE_UTILITY */
411
08955dd3
PH
412/* Now there may be a number of optional lines, each starting with "-". If you
413add a new setting here, make sure you set the default above.
059ec3d9 414
08955dd3
PH
415Because there are now quite a number of different possibilities, we use a
416switch on the first character to avoid too many failing tests. Thanks to Nico
417Erfurth for the patch that implemented this. I have made it even more efficient
418by not re-scanning the first two characters.
419
420To allow new versions of Exim that add additional flags to interwork with older
421versions that do not understand them, just ignore any lines starting with "-"
422that we don't recognize. Otherwise it wouldn't be possible to back off a new
423version that left new-style flags written on the spool. */
424
425p = big_buffer + 2;
059ec3d9
PH
426for (;;)
427 {
e91ad4a7 428 int len;
059ec3d9
PH
429 if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
430 if (big_buffer[0] != '-') break;
e91ad4a7
JH
431 while ( (len = Ustrlen(big_buffer)) == big_buffer_size-1
432 && big_buffer[len-1] != '\n'
433 )
434 { /* buffer not big enough for line; certs make this possible */
435 uschar * buf;
436 if (big_buffer_size >= BIG_BUFFER_SIZE*4) goto SPOOL_READ_ERROR;
437 buf = store_get_perm(big_buffer_size *= 2);
438 memcpy(buf, big_buffer, --len);
439 big_buffer = buf;
440 if (Ufgets(big_buffer+len, big_buffer_size-len, f) == NULL)
441 goto SPOOL_READ_ERROR;
442 }
443 big_buffer[len-1] = 0;
47ca6d6c 444
08955dd3 445 switch(big_buffer[1])
059ec3d9 446 {
08955dd3
PH
447 case 'a':
448
449 /* Nowadays we use "-aclc" and "-aclm" for the different types of ACL
450 variable, because Exim allows any number of them, with arbitrary names.
451 The line in the spool file is "-acl[cm] <name> <length>". The name excludes
452 the c or m. */
453
454 if (Ustrncmp(p, "clc ", 4) == 0 ||
455 Ustrncmp(p, "clm ", 4) == 0)
456 {
457 uschar *name, *endptr;
458 int count;
459 tree_node *node;
460 endptr = Ustrchr(big_buffer + 6, ' ');
461 if (endptr == NULL) goto SPOOL_FORMAT_ERROR;
462 name = string_sprintf("%c%.*s", big_buffer[4], endptr - big_buffer - 6,
463 big_buffer + 6);
464 if (sscanf(CS endptr, " %d", &count) != 1) goto SPOOL_FORMAT_ERROR;
465 node = acl_var_create(name);
466 node->data.ptr = store_get(count + 1);
467 if (fread(node->data.ptr, 1, count+1, f) < count) goto SPOOL_READ_ERROR;
468 ((uschar*)node->data.ptr)[count] = 0;
469 }
470
471 else if (Ustrcmp(p, "llow_unqualified_recipient") == 0)
472 allow_unqualified_recipient = TRUE;
473 else if (Ustrcmp(p, "llow_unqualified_sender") == 0)
474 allow_unqualified_sender = TRUE;
475
476 else if (Ustrncmp(p, "uth_id", 6) == 0)
477 authenticated_id = string_copy(big_buffer + 9);
478 else if (Ustrncmp(p, "uth_sender", 10) == 0)
479 authenticated_sender = string_copy(big_buffer + 13);
480 else if (Ustrncmp(p, "ctive_hostname", 14) == 0)
481 smtp_active_hostname = string_copy(big_buffer + 17);
482
483 /* For long-term backward compatibility, we recognize "-acl", which was
484 used before the number of ACL variables changed from 10 to 20. This was
485 before the subsequent change to an arbitrary number of named variables.
486 This code is retained so that upgrades from very old versions can still
487 handle old-format spool files. The value given after "-acl" is a number
488 that is 0-9 for connection variables, and 10-19 for message variables. */
489
490 else if (Ustrncmp(p, "cl ", 3) == 0)
491 {
4dc2379a
JH
492 unsigned index, count;
493 uschar name[20]; /* Need plenty of space for %u format */
494 tree_node * node;
495 if ( sscanf(CS big_buffer + 5, "%u %u", &index, &count) != 2
806c3df9 496 || index >= 20
f267271d 497 || count > 16384 /* arbitrary limit on variable size */
806c3df9 498 )
08955dd3 499 goto SPOOL_FORMAT_ERROR;
8dce1a6f 500 if (index < 10)
4dc2379a 501 (void) string_format(name, sizeof(name), "%c%u", 'c', index);
806c3df9 502 else
4dc2379a 503 (void) string_format(name, sizeof(name), "%c%u", 'm', index - 10);
08955dd3
PH
504 node = acl_var_create(name);
505 node->data.ptr = store_get(count + 1);
f267271d
JH
506 /* We sanity-checked the count, so disable the Coverity error */
507 /* coverity[tainted_data] */
08955dd3 508 if (fread(node->data.ptr, 1, count+1, f) < count) goto SPOOL_READ_ERROR;
4dc2379a 509 (US node->data.ptr)[count] = '\0';
08955dd3
PH
510 }
511 break;
512
513 case 'b':
514 if (Ustrncmp(p, "ody_linecount", 13) == 0)
515 body_linecount = Uatoi(big_buffer + 15);
516 else if (Ustrncmp(p, "ody_zerocount", 13) == 0)
517 body_zerocount = Uatoi(big_buffer + 15);
e91ad4a7 518#ifdef EXPERIMENTAL_BRIGHTMAIL
08955dd3
PH
519 else if (Ustrncmp(p, "mi_verdicts ", 12) == 0)
520 bmi_verdicts = string_copy(big_buffer + 14);
e91ad4a7 521#endif
08955dd3
PH
522 break;
523
524 case 'd':
525 if (Ustrcmp(p, "eliver_firsttime") == 0)
526 deliver_firsttime = TRUE;
6c1c3d1d
WB
527 /* Check if the dsn flags have been set in the header file */
528 else if (Ustrncmp(p, "sn_ret", 6) == 0)
45500060 529 dsn_ret= atoi(CS big_buffer + 8);
6c1c3d1d 530 else if (Ustrncmp(p, "sn_envid", 8) == 0)
6c1c3d1d 531 dsn_envid = string_copy(big_buffer + 11);
08955dd3
PH
532 break;
533
534 case 'f':
535 if (Ustrncmp(p, "rozen", 5) == 0)
536 {
537 deliver_freeze = TRUE;
dc8091e7
JH
538 if (sscanf(CS big_buffer+7, TIME_T_FMT, &deliver_frozen_at) != 1)
539 goto SPOOL_READ_ERROR;
08955dd3
PH
540 }
541 break;
542
543 case 'h':
544 if (Ustrcmp(p, "ost_lookup_deferred") == 0)
545 host_lookup_deferred = TRUE;
546 else if (Ustrcmp(p, "ost_lookup_failed") == 0)
547 host_lookup_failed = TRUE;
548 else if (Ustrncmp(p, "ost_auth", 8) == 0)
549 sender_host_authenticated = string_copy(big_buffer + 11);
550 else if (Ustrncmp(p, "ost_name", 8) == 0)
551 sender_host_name = string_copy(big_buffer + 11);
552 else if (Ustrncmp(p, "elo_name", 8) == 0)
553 sender_helo_name = string_copy(big_buffer + 11);
554
555 /* We now record the port number after the address, separated by a
556 dot. For compatibility during upgrading, do nothing if there
557 isn't a value (it gets left at zero). */
558
559 else if (Ustrncmp(p, "ost_address", 11) == 0)
560 {
561 sender_host_port = host_address_extract_port(big_buffer + 14);
562 sender_host_address = string_copy(big_buffer + 14);
563 }
564 break;
565
566 case 'i':
567 if (Ustrncmp(p, "nterface_address", 16) == 0)
568 {
569 interface_port = host_address_extract_port(big_buffer + 19);
570 interface_address = string_copy(big_buffer + 19);
571 }
572 else if (Ustrncmp(p, "dent", 4) == 0)
573 sender_ident = string_copy(big_buffer + 7);
574 break;
575
576 case 'l':
32dfdf8b
JH
577 if (Ustrcmp(p, "ocal") == 0)
578 sender_local = TRUE;
08955dd3
PH
579 else if (Ustrcmp(big_buffer, "-localerror") == 0)
580 local_error_message = TRUE;
581 else if (Ustrncmp(p, "ocal_scan ", 10) == 0)
582 local_scan_data = string_copy(big_buffer + 12);
583 break;
584
585 case 'm':
586 if (Ustrcmp(p, "anual_thaw") == 0) deliver_manual_thaw = TRUE;
d677b2f2
PH
587 else if (Ustrncmp(p, "ax_received_linelength", 22) == 0)
588 max_received_linelength = Uatoi(big_buffer + 24);
08955dd3
PH
589 break;
590
591 case 'N':
592 if (*p == 0) dont_deliver = TRUE; /* -N */
593 break;
594
595 case 'r':
596 if (Ustrncmp(p, "eceived_protocol", 16) == 0)
597 received_protocol = string_copy(big_buffer + 19);
32dfdf8b
JH
598 else if (Ustrncmp(p, "eceived_time_usec", 17) == 0)
599 {
600 unsigned usec;
601 if (sscanf(CS big_buffer + 21, "%u", &usec) == 1)
602 received_time.tv_usec = usec;
603 }
08955dd3
PH
604 break;
605
606 case 's':
607 if (Ustrncmp(p, "ender_set_untrusted", 19) == 0)
608 sender_set_untrusted = TRUE;
e91ad4a7 609#ifdef WITH_CONTENT_SCAN
3481c572
JH
610 else if (Ustrncmp(p, "pam_bar ", 8) == 0)
611 spam_bar = string_copy(big_buffer + 10);
612 else if (Ustrncmp(p, "pam_score ", 10) == 0)
613 spam_score = string_copy(big_buffer + 12);
08955dd3
PH
614 else if (Ustrncmp(p, "pam_score_int ", 14) == 0)
615 spam_score_int = string_copy(big_buffer + 16);
e91ad4a7 616#endif
328c5688
JH
617#ifndef COMPILE_UTILITY
618 else if (Ustrncmp(p, "pool_file_wireformat", 20) == 0)
619 spool_file_wireformat = TRUE;
620#endif
8c5d388a 621#if defined(SUPPORT_I18N) && !defined(COMPILE_UTILITY)
7ade712c
JH
622 else if (Ustrncmp(p, "mtputf8", 7) == 0)
623 message_smtputf8 = TRUE;
624#endif
08955dd3
PH
625 break;
626
e91ad4a7 627#ifdef SUPPORT_TLS
08955dd3
PH
628 case 't':
629 if (Ustrncmp(p, "ls_certificate_verified", 23) == 0)
817d9f57 630 tls_in.certificate_verified = TRUE;
08955dd3 631 else if (Ustrncmp(p, "ls_cipher", 9) == 0)
817d9f57 632 tls_in.cipher = string_copy(big_buffer + 12);
e91ad4a7 633# ifndef COMPILE_UTILITY /* tls support fns not built in */
9d1c15ef
JH
634 else if (Ustrncmp(p, "ls_ourcert", 10) == 0)
635 (void) tls_import_cert(big_buffer + 13, &tls_in.ourcert);
636 else if (Ustrncmp(p, "ls_peercert", 11) == 0)
637 (void) tls_import_cert(big_buffer + 14, &tls_in.peercert);
e91ad4a7 638# endif
08955dd3 639 else if (Ustrncmp(p, "ls_peerdn", 9) == 0)
817d9f57 640 tls_in.peerdn = string_unprinting(string_copy(big_buffer + 12));
7be682ca 641 else if (Ustrncmp(p, "ls_sni", 6) == 0)
817d9f57 642 tls_in.sni = string_unprinting(string_copy(big_buffer + 9));
44662487
JH
643 else if (Ustrncmp(p, "ls_ocsp", 7) == 0)
644 tls_in.ocsp = big_buffer[10] - '0';
08955dd3 645 break;
e91ad4a7 646#endif
08955dd3 647
8c5d388a 648#if defined(SUPPORT_I18N) && !defined(COMPILE_UTILITY)
3c8b3577
JH
649 case 'u':
650 if (Ustrncmp(p, "tf8_downcvt", 11) == 0)
651 message_utf8_downconvert = 1;
0ec7e948 652 else if (Ustrncmp(p, "tf8_optdowncvt", 15) == 0)
3c8b3577
JH
653 message_utf8_downconvert = -1;
654 break;
655#endif
656
08955dd3
PH
657 default: /* Present because some compilers complain if all */
658 break; /* possibilities are not covered. */
059ec3d9 659 }
059ec3d9
PH
660 }
661
662/* Build sender_fullhost if required */
663
664#ifndef COMPILE_UTILITY
665host_build_sender_fullhost();
666#endif /* COMPILE_UTILITY */
667
668#ifndef COMPILE_UTILITY
669DEBUG(D_deliver)
670 debug_printf("sender_local=%d ident=%s\n", sender_local,
671 (sender_ident == NULL)? US"unset" : sender_ident);
672#endif /* COMPILE_UTILITY */
673
674/* We now have the tree of addresses NOT to deliver to, or a line
675containing "XX", indicating no tree. */
676
677if (Ustrncmp(big_buffer, "XX\n", 3) != 0 &&
678 !read_nonrecipients_tree(&tree_nonrecipients, f, big_buffer, big_buffer_size))
679 goto SPOOL_FORMAT_ERROR;
680
681#ifndef COMPILE_UTILITY
682DEBUG(D_deliver)
683 {
684 debug_printf("Non-recipients:\n");
685 debug_print_tree(tree_nonrecipients);
686 }
687#endif /* COMPILE_UTILITY */
688
689/* After reading the tree, the next line has not yet been read into the
d88f0784
JH
690buffer. It contains the count of recipients which follow on separate lines.
691Apply an arbitrary sanity check.*/
059ec3d9
PH
692
693if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
d88f0784
JH
694if (sscanf(CS big_buffer, "%d", &rcount) != 1 || rcount > 16384)
695 goto SPOOL_FORMAT_ERROR;
059ec3d9
PH
696
697#ifndef COMPILE_UTILITY
698DEBUG(D_deliver) debug_printf("recipients_count=%d\n", rcount);
699#endif /* COMPILE_UTILITY */
700
701recipients_list_max = rcount;
702recipients_list = store_get(rcount * sizeof(recipient_item));
703
d88f0784
JH
704/* We sanitised the count and know we have enough memory, so disable
705the Coverity error on recipients_count */
706/* coverity[tainted_data] */
707
059ec3d9
PH
708for (recipients_count = 0; recipients_count < rcount; recipients_count++)
709 {
710 int nn;
711 int pno = -1;
6c1c3d1d
WB
712 int dsn_flags = 0;
713 uschar *orcpt = NULL;
059ec3d9
PH
714 uschar *errors_to = NULL;
715 uschar *p;
716
717 if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
718 nn = Ustrlen(big_buffer);
719 if (nn < 2) goto SPOOL_FORMAT_ERROR;
720
721 /* Remove the newline; this terminates the address if there is no additional
722 data on the line. */
723
724 p = big_buffer + nn - 1;
725 *p-- = 0;
726
727 /* Look back from the end of the line for digits and special terminators.
728 Since an address must end with a domain, we can tell that extra data is
729 present by the presence of the terminator, which is always some character
730 that cannot exist in a domain. (If I'd thought of the need for additional
731 data early on, I'd have put it at the start, with the address at the end. As
732 it is, we have to operate backwards. Addresses are permitted to contain
733 spaces, you see.)
734
735 This code has to cope with various versions of this data that have evolved
736 over time. In all cases, the line might just contain an address, with no
737 additional data. Otherwise, the possibilities are as follows:
738
739 Exim 3 type: <address><space><digits>,<digits>,<digits>
740
741 The second set of digits is the parent number for one_time addresses. The
742 other values were remnants of earlier experiments that were abandoned.
743
744 Exim 4 first type: <address><space><digits>
745
746 The digits are the parent number for one_time addresses.
747
748 Exim 4 new type: <address><space><data>#<type bits>
749
750 The type bits indicate what the contents of the data are.
751
752 Bit 01 indicates that, reading from right to left, the data
753 ends with <errors_to address><space><len>,<pno> where pno is
754 the parent number for one_time addresses, and len is the length
755 of the errors_to address (zero meaning none).
6c1c3d1d
WB
756
757 Bit 02 indicates that, again reading from right to left, the data continues
758 with orcpt len(orcpt),dsn_flags
059ec3d9
PH
759 */
760
761 while (isdigit(*p)) p--;
762
763 /* Handle Exim 3 spool files */
764
765 if (*p == ',')
766 {
767 int dummy;
768 while (isdigit(*(--p)) || *p == ',');
769 if (*p == ' ')
770 {
771 *p++ = 0;
ff790e47 772 (void)sscanf(CS p, "%d,%d", &dummy, &pno);
059ec3d9
PH
773 }
774 }
775
776 /* Handle early Exim 4 spool files */
777
778 else if (*p == ' ')
779 {
780 *p++ = 0;
ff790e47 781 (void)sscanf(CS p, "%d", &pno);
059ec3d9
PH
782 }
783
784 /* Handle current format Exim 4 spool files */
785
786 else if (*p == '#')
787 {
788 int flags;
6c1c3d1d 789
50dc7409 790#if !defined (COMPILE_UTILITY)
e91ad4a7
JH
791 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - Exim 4 standard format spoolfile\n");
792#endif
6c1c3d1d 793
ff790e47 794 (void)sscanf(CS p+1, "%d", &flags);
059ec3d9
PH
795
796 if ((flags & 0x01) != 0) /* one_time data exists */
797 {
798 int len;
799 while (isdigit(*(--p)) || *p == ',' || *p == '-');
ff790e47 800 (void)sscanf(CS p+1, "%d,%d", &len, &pno);
059ec3d9
PH
801 *p = 0;
802 if (len > 0)
803 {
804 p -= len;
805 errors_to = string_copy(p);
94431adb 806 }
6c1c3d1d
WB
807 }
808
809 *(--p) = 0; /* Terminate address */
6c1c3d1d
WB
810 if ((flags & 0x02) != 0) /* one_time data exists */
811 {
812 int len;
813 while (isdigit(*(--p)) || *p == ',' || *p == '-');
814 (void)sscanf(CS p+1, "%d,%d", &len, &dsn_flags);
815 *p = 0;
816 if (len > 0)
817 {
818 p -= len;
819 orcpt = string_copy(p);
94431adb 820 }
059ec3d9
PH
821 }
822
823 *(--p) = 0; /* Terminate address */
6c1c3d1d 824 }
50dc7409 825#if !defined(COMPILE_UTILITY)
6c1c3d1d 826 else
e91ad4a7 827 { DEBUG(D_deliver) debug_printf("**** SPOOL_IN - No additional fields\n"); }
6c1c3d1d
WB
828
829 if ((orcpt != NULL) || (dsn_flags != 0))
830 {
831 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - address: |%s| orcpt: |%s| dsn_flags: %d\n",
832 big_buffer, orcpt, dsn_flags);
833 }
834 if (errors_to != NULL)
835 {
836 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - address: |%s| errorsto: |%s|\n",
837 big_buffer, errors_to);
059ec3d9 838 }
50dc7409 839#endif
059ec3d9
PH
840
841 recipients_list[recipients_count].address = string_copy(big_buffer);
842 recipients_list[recipients_count].pno = pno;
843 recipients_list[recipients_count].errors_to = errors_to;
6c1c3d1d
WB
844 recipients_list[recipients_count].orcpt = orcpt;
845 recipients_list[recipients_count].dsn_flags = dsn_flags;
059ec3d9
PH
846 }
847
848/* The remainder of the spool header file contains the headers for the message,
849separated off from the previous data by a blank line. Each header is preceded
850by a count of its length and either a certain letter (for various identified
851headers), space (for a miscellaneous live header) or an asterisk (for a header
852that has been rewritten). Count the Received: headers. We read the headers
853always, in order to check on the format of the file, but only create a header
854list if requested to do so. */
855
856inheader = TRUE;
857if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
858if (big_buffer[0] != '\n') goto SPOOL_FORMAT_ERROR;
859
860while ((n = fgetc(f)) != EOF)
861 {
862 header_line *h;
863 uschar flag[4];
864 int i;
865
866 if (!isdigit(n)) goto SPOOL_FORMAT_ERROR;
1ac6b2e7
JH
867 if(ungetc(n, f) == EOF || fscanf(f, "%d%c ", &n, flag) == EOF)
868 goto SPOOL_READ_ERROR;
059ec3d9
PH
869 if (flag[0] != '*') message_size += n; /* Omit non-transmitted headers */
870
871 if (read_headers)
872 {
873 h = store_get(sizeof(header_line));
874 h->next = NULL;
875 h->type = flag[0];
876 h->slen = n;
877 h->text = store_get(n+1);
878
879 if (h->type == htype_received) received_count++;
880
881 if (header_list == NULL) header_list = h;
882 else header_last->next = h;
883 header_last = h;
884
885 for (i = 0; i < n; i++)
886 {
887 int c = fgetc(f);
888 if (c == 0 || c == EOF) goto SPOOL_FORMAT_ERROR;
889 if (c == '\n' && h->type != htype_old) message_linecount++;
890 h->text[i] = c;
891 }
892 h->text[i] = 0;
893 }
894
895 /* Not requiring header data, just skip through the bytes */
896
897 else for (i = 0; i < n; i++)
898 {
899 int c = fgetc(f);
900 if (c == 0 || c == EOF) goto SPOOL_FORMAT_ERROR;
901 }
902 }
903
904/* We have successfully read the data in the header file. Update the message
905line count by adding the body linecount to the header linecount. Close the file
906and give a positive response. */
907
908#ifndef COMPILE_UTILITY
909DEBUG(D_deliver) debug_printf("body_linecount=%d message_linecount=%d\n",
910 body_linecount, message_linecount);
911#endif /* COMPILE_UTILITY */
912
913message_linecount += body_linecount;
914
915fclose(f);
916return spool_read_OK;
917
918
919/* There was an error reading the spool or there was missing data,
920or there was a format error. A "read error" with no errno means an
921unexpected EOF, which we treat as a format error. */
922
923SPOOL_READ_ERROR:
924if (errno != 0)
925 {
926 n = errno;
927
e91ad4a7 928#ifndef COMPILE_UTILITY
059ec3d9 929 DEBUG(D_any) debug_printf("Error while reading spool file %s\n", name);
e91ad4a7 930#endif /* COMPILE_UTILITY */
059ec3d9
PH
931
932 fclose(f);
933 errno = n;
934 return inheader? spool_read_hdrerror : spool_read_enverror;
935 }
936
937SPOOL_FORMAT_ERROR:
938
939#ifndef COMPILE_UTILITY
940DEBUG(D_any) debug_printf("Format error in spool file %s\n", name);
941#endif /* COMPILE_UTILITY */
942
943fclose(f);
944errno = ERRNO_SPOOLFORMAT;
945return inheader? spool_read_hdrerror : spool_read_enverror;
946}
947
9d1c15ef
JH
948/* vi: aw ai sw=2
949*/
059ec3d9 950/* End of spool_in.c */