Tidy and add \0 after string_append() for relative .includes
[exim.git] / src / src / spool_in.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
80fea873 5/* Copyright (c) University of Cambridge 1995 - 2016 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
8/* Functions for reading spool files. When compiling for a utility (eximon),
9not all are needed, and some functionality can be cut out. */
10
11
12#include "exim.h"
13
14
15
16#ifndef COMPILE_UTILITY
17/*************************************************
18* Open and lock data file *
19*************************************************/
20
21/* The data file is the one that is used for locking, because the header file
22can get replaced during delivery because of header rewriting. The file has
23to opened with write access so that we can get an exclusive lock, but in
24fact it won't be written to. Just in case there's a major disaster (e.g.
25overwriting some other file descriptor with the value of this one), open it
26with append.
27
92b0827a
JH
28As called by deliver_message() (at least) we are operating as root.
29
059ec3d9 30Argument: the id of the message
789f8a4f 31Returns: fd if file successfully opened and locked, else -1
059ec3d9 32
789f8a4f 33Side effect: message_subdir is set for the (possibly split) spool directory
059ec3d9
PH
34*/
35
789f8a4f 36int
059ec3d9
PH
37spool_open_datafile(uschar *id)
38{
39int i;
40struct stat statbuf;
41flock_t lock_data;
789f8a4f 42int fd;
059ec3d9
PH
43
44/* If split_spool_directory is set, first look for the file in the appropriate
45sub-directory of the input directory. If it is not found there, try the input
46directory itself, to pick up leftovers from before the splitting. If split_
47spool_directory is not set, first look in the main input directory. If it is
48not found there, try the split sub-directory, in case it is left over from a
49splitting state. */
50
51for (i = 0; i < 2; i++)
52 {
41313d92 53 uschar * fname;
059ec3d9 54 int save_errno;
9befa1ca 55
4dc2379a 56 message_subdir[0] = split_spool_directory == i ? '\0' : id[5];
41313d92
JH
57 fname = spool_fname(US"input", message_subdir, id, US"-D");
58 DEBUG(D_deliver) debug_printf("Trying spool file %s\n", fname);
a2da3176 59
92b0827a
JH
60 if ((fd = Uopen(fname,
61#ifdef O_CLOEXEC
62 O_CLOEXEC |
63#endif
64 O_RDWR | O_APPEND, 0)) >= 0)
789f8a4f 65 break;
059ec3d9
PH
66 save_errno = errno;
67 if (errno == ENOENT)
68 {
69 if (i == 0) continue;
70 if (!queue_running)
9befa1ca 71 log_write(0, LOG_MAIN, "Spool%s%s file %s-D not found",
12cf7615
JH
72 *queue_name ? US" Q=" : US"",
73 *queue_name ? queue_name : US"",
9befa1ca 74 id);
059ec3d9 75 }
9befa1ca
JH
76 else
77 log_write(0, LOG_MAIN, "Spool error for %s: %s", fname, strerror(errno));
059ec3d9 78 errno = save_errno;
789f8a4f 79 return -1;
059ec3d9
PH
80 }
81
82/* File is open and message_subdir is set. Set the close-on-exec flag, and lock
83the file. We lock only the first line of the file (containing the message ID)
84because this apparently is needed for running Exim under Cygwin. If the entire
85file is locked in one process, a sub-process cannot access it, even when passed
86an open file descriptor (at least, I think that's the Cygwin story). On real
87Unix systems it doesn't make any difference as long as Exim is consistent in
88what it locks. */
89
92b0827a
JH
90#ifndef O_CLOEXEC
91(void)fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC);
92#endif
059ec3d9
PH
93
94lock_data.l_type = F_WRLCK;
95lock_data.l_whence = SEEK_SET;
96lock_data.l_start = 0;
97lock_data.l_len = SPOOL_DATA_START_OFFSET;
98
789f8a4f 99if (fcntl(fd, F_SETLK, &lock_data) < 0)
059ec3d9
PH
100 {
101 log_write(L_skip_delivery,
102 LOG_MAIN,
103 "Spool file is locked (another process is handling this message)");
789f8a4f 104 (void)close(fd);
059ec3d9 105 errno = 0;
789f8a4f 106 return -1;
059ec3d9
PH
107 }
108
109/* Get the size of the data; don't include the leading filename line
110in the count, but add one for the newline before the data. */
111
789f8a4f 112if (fstat(fd, &statbuf) == 0)
059ec3d9
PH
113 {
114 message_body_size = statbuf.st_size - SPOOL_DATA_START_OFFSET;
115 message_size = message_body_size + 1;
116 }
117
789f8a4f 118return fd;
059ec3d9
PH
119}
120#endif /* COMPILE_UTILITY */
121
122
123
124/*************************************************
125* Read non-recipients tree from spool file *
126*************************************************/
127
128/* The tree of non-recipients is written to the spool file in a form that
129makes it easy to read back into a tree. The format is as follows:
130
131 . Each node is preceded by two letter(Y/N) indicating whether it has left
132 or right children. There's one space after the two flags, before the name.
133
134 . The left subtree (if any) then follows, then the right subtree (if any).
135
136This function is entered with the next input line in the buffer. Note we must
137save the right flag before recursing with the same buffer.
138
139Once the tree is read, we re-construct the balance fields by scanning the tree.
140I forgot to write them out originally, and the compatible fix is to do it this
141way. This initial local recursing function does the necessary.
142
143Arguments:
144 node tree node
145
146Returns: maximum depth below the node, including the node itself
147*/
148
149static int
150count_below(tree_node *node)
151{
152int nleft, nright;
153if (node == NULL) return 0;
154nleft = count_below(node->left);
155nright = count_below(node->right);
156node->balance = (nleft > nright)? 1 : ((nright > nleft)? 2 : 0);
157return 1 + ((nleft > nright)? nleft : nright);
158}
159
160/* This is the real function...
161
162Arguments:
163 connect pointer to the root of the tree
164 f FILE to read data from
165 buffer contains next input line; further lines read into it
166 buffer_size size of the buffer
167
168Returns: FALSE on format error
169*/
170
171static BOOL
172read_nonrecipients_tree(tree_node **connect, FILE *f, uschar *buffer,
173 int buffer_size)
174{
175tree_node *node;
176int n = Ustrlen(buffer);
177BOOL right = buffer[1] == 'Y';
178
179if (n < 5) return FALSE; /* malformed line */
180buffer[n-1] = 0; /* Remove \n */
181node = store_get(sizeof(tree_node) + n - 3);
182*connect = node;
183Ustrcpy(node->name, buffer + 3);
184node->data.ptr = NULL;
185
186if (buffer[0] == 'Y')
187 {
188 if (Ufgets(buffer, buffer_size, f) == NULL ||
189 !read_nonrecipients_tree(&node->left, f, buffer, buffer_size))
190 return FALSE;
191 }
192else node->left = NULL;
193
194if (right)
195 {
196 if (Ufgets(buffer, buffer_size, f) == NULL ||
197 !read_nonrecipients_tree(&node->right, f, buffer, buffer_size))
198 return FALSE;
199 }
200else node->right = NULL;
201
202(void) count_below(*connect);
203return TRUE;
204}
205
206
207
208
209/*************************************************
210* Read spool header file *
211*************************************************/
212
213/* This function reads a spool header file and places the data into the
214appropriate global variables. The header portion is always read, but header
215structures are built only if read_headers is set true. It isn't, for example,
216while generating -bp output.
217
218It may be possible for blocks of nulls (binary zeroes) to get written on the
219end of a file if there is a system crash during writing. It was observed on an
220earlier version of Exim that omitted to fsync() the files - this is thought to
221have been the cause of that incident, but in any case, this code must be robust
222against such an event, and if such a file is encountered, it must be treated as
223malformed.
224
92b0827a
JH
225As called from deliver_message() (at least) we are running as root.
226
059ec3d9
PH
227Arguments:
228 name name of the header file, including the -H
229 read_headers TRUE if in-store header structures are to be built
230 subdir_set TRUE is message_subdir is already set
231
232Returns: spool_read_OK success
233 spool_read_notopen open failed
234 spool_read_enverror error in the envelope portion
235 spool_read_hdrdrror error in the header portion
236*/
237
238int
239spool_read_header(uschar *name, BOOL read_headers, BOOL subdir_set)
240{
241FILE *f = NULL;
242int n;
243int rcount = 0;
244long int uid, gid;
245BOOL inheader = FALSE;
1e70f85b 246uschar *p;
059ec3d9
PH
247
248/* Reset all the global variables to their default values. However, there is
249one exception. DO NOT change the default value of dont_deliver, because it may
250be forced by an external setting. */
251
38a0a95f 252acl_var_c = acl_var_m = NULL;
059ec3d9
PH
253authenticated_id = NULL;
254authenticated_sender = NULL;
255allow_unqualified_recipient = FALSE;
256allow_unqualified_sender = FALSE;
257body_linecount = 0;
258body_zerocount = 0;
259deliver_firsttime = FALSE;
260deliver_freeze = FALSE;
261deliver_frozen_at = 0;
262deliver_manual_thaw = FALSE;
263/* dont_deliver must NOT be reset */
264header_list = header_last = NULL;
b08b24c8 265host_lookup_deferred = FALSE;
059ec3d9
PH
266host_lookup_failed = FALSE;
267interface_address = NULL;
268interface_port = 0;
269local_error_message = FALSE;
270local_scan_data = NULL;
d677b2f2 271max_received_linelength = 0;
059ec3d9
PH
272message_linecount = 0;
273received_protocol = NULL;
274received_count = 0;
275recipients_list = NULL;
276sender_address = NULL;
277sender_fullhost = NULL;
278sender_helo_name = NULL;
279sender_host_address = NULL;
280sender_host_name = NULL;
281sender_host_port = 0;
282sender_host_authenticated = NULL;
283sender_ident = NULL;
284sender_local = FALSE;
285sender_set_untrusted = FALSE;
1f5b4c3d 286smtp_active_hostname = primary_hostname;
059ec3d9
PH
287tree_nonrecipients = NULL;
288
8523533c
TK
289#ifdef EXPERIMENTAL_BRIGHTMAIL
290bmi_run = 0;
291bmi_verdicts = NULL;
292#endif
293
80a47a2c 294#ifndef DISABLE_DKIM
9e5d6b55 295dkim_signers = NULL;
80a47a2c
TK
296dkim_disable_verify = FALSE;
297dkim_collect_input = FALSE;
f7572e5a
TK
298#endif
299
059ec3d9 300#ifdef SUPPORT_TLS
817d9f57 301tls_in.certificate_verified = FALSE;
53a7196b
JH
302# ifdef EXPERIMENTAL_DANE
303tls_in.dane_verified = FALSE;
304# endif
817d9f57 305tls_in.cipher = NULL;
790fbb71
JH
306# ifndef COMPILE_UTILITY /* tls support fns not built in */
307tls_free_cert(&tls_in.ourcert);
308tls_free_cert(&tls_in.peercert);
309# endif
817d9f57
JH
310tls_in.peerdn = NULL;
311tls_in.sni = NULL;
44662487 312tls_in.ocsp = OCSP_NOT_REQ;
7be682ca 313#endif
059ec3d9 314
8523533c 315#ifdef WITH_CONTENT_SCAN
3481c572
JH
316spam_bar = NULL;
317spam_score = NULL;
8523533c
TK
318spam_score_int = NULL;
319#endif
320
8c5d388a 321#if defined(SUPPORT_I18N) && !defined(COMPILE_UTILITY)
7ade712c 322message_smtputf8 = FALSE;
3c8b3577 323message_utf8_downconvert = 0;
7ade712c
JH
324#endif
325
6c1c3d1d
WB
326dsn_ret = 0;
327dsn_envid = NULL;
6c1c3d1d 328
059ec3d9
PH
329/* Generate the full name and open the file. If message_subdir is already
330set, just look in the given directory. Otherwise, look in both the split
331and unsplit directories, as for the data file above. */
332
333for (n = 0; n < 2; n++)
334 {
335 if (!subdir_set)
a2da3176 336 message_subdir[0] = split_spool_directory == (n == 0) ? name[5] : 0;
41313d92
JH
337
338 if ((f = Ufopen(spool_fname(US"input", message_subdir, name, US""), "rb")))
339 break;
340 if (n != 0 || subdir_set || errno != ENOENT)
341 return spool_read_notopen;
059ec3d9
PH
342 }
343
344errno = 0;
345
346#ifndef COMPILE_UTILITY
347DEBUG(D_deliver) debug_printf("reading spool file %s\n", name);
348#endif /* COMPILE_UTILITY */
349
350/* The first line of a spool file contains the message id followed by -H (i.e.
351the file name), in order to make the file self-identifying. */
352
353if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
354if (Ustrlen(big_buffer) != MESSAGE_ID_LENGTH + 3 ||
355 Ustrncmp(big_buffer, name, MESSAGE_ID_LENGTH + 2) != 0)
356 goto SPOOL_FORMAT_ERROR;
357
358/* The next three lines in the header file are in a fixed format. The first
359contains the login, uid, and gid of the user who caused the file to be written.
ebb6e6d5
PH
360There are known cases where a negative gid is used, so we allow for both
361negative uids and gids. The second contains the mail address of the message's
362sender, enclosed in <>. The third contains the time the message was received,
363and the number of warning messages for delivery delays that have been sent. */
059ec3d9
PH
364
365if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
366
1e70f85b
PH
367p = big_buffer + Ustrlen(big_buffer);
368while (p > big_buffer && isspace(p[-1])) p--;
369*p = 0;
370if (!isdigit(p[-1])) goto SPOOL_FORMAT_ERROR;
ebb6e6d5 371while (p > big_buffer && (isdigit(p[-1]) || '-' == p[-1])) p--;
1e70f85b
PH
372gid = Uatoi(p);
373if (p <= big_buffer || *(--p) != ' ') goto SPOOL_FORMAT_ERROR;
374*p = 0;
375if (!isdigit(p[-1])) goto SPOOL_FORMAT_ERROR;
ebb6e6d5 376while (p > big_buffer && (isdigit(p[-1]) || '-' == p[-1])) p--;
1e70f85b
PH
377uid = Uatoi(p);
378if (p <= big_buffer || *(--p) != ' ') goto SPOOL_FORMAT_ERROR;
379*p = 0;
8e669ac1 380
1e70f85b 381originator_login = string_copy(big_buffer);
059ec3d9
PH
382originator_uid = (uid_t)uid;
383originator_gid = (gid_t)gid;
384
e91ad4a7 385/* envelope from */
059ec3d9
PH
386if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
387n = Ustrlen(big_buffer);
388if (n < 3 || big_buffer[0] != '<' || big_buffer[n-2] != '>')
389 goto SPOOL_FORMAT_ERROR;
390
391sender_address = store_get(n-2);
392Ustrncpy(sender_address, big_buffer+1, n-3);
393sender_address[n-3] = 0;
394
e91ad4a7 395/* time */
059ec3d9
PH
396if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
397if (sscanf(CS big_buffer, "%d %d", &received_time, &warning_count) != 2)
398 goto SPOOL_FORMAT_ERROR;
399
400message_age = time(NULL) - received_time;
401
402#ifndef COMPILE_UTILITY
403DEBUG(D_deliver) debug_printf("user=%s uid=%ld gid=%ld sender=%s\n",
404 originator_login, (long int)originator_uid, (long int)originator_gid,
405 sender_address);
406#endif /* COMPILE_UTILITY */
407
08955dd3
PH
408/* Now there may be a number of optional lines, each starting with "-". If you
409add a new setting here, make sure you set the default above.
059ec3d9 410
08955dd3
PH
411Because there are now quite a number of different possibilities, we use a
412switch on the first character to avoid too many failing tests. Thanks to Nico
413Erfurth for the patch that implemented this. I have made it even more efficient
414by not re-scanning the first two characters.
415
416To allow new versions of Exim that add additional flags to interwork with older
417versions that do not understand them, just ignore any lines starting with "-"
418that we don't recognize. Otherwise it wouldn't be possible to back off a new
419version that left new-style flags written on the spool. */
420
421p = big_buffer + 2;
059ec3d9
PH
422for (;;)
423 {
e91ad4a7 424 int len;
059ec3d9
PH
425 if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
426 if (big_buffer[0] != '-') break;
e91ad4a7
JH
427 while ( (len = Ustrlen(big_buffer)) == big_buffer_size-1
428 && big_buffer[len-1] != '\n'
429 )
430 { /* buffer not big enough for line; certs make this possible */
431 uschar * buf;
432 if (big_buffer_size >= BIG_BUFFER_SIZE*4) goto SPOOL_READ_ERROR;
433 buf = store_get_perm(big_buffer_size *= 2);
434 memcpy(buf, big_buffer, --len);
435 big_buffer = buf;
436 if (Ufgets(big_buffer+len, big_buffer_size-len, f) == NULL)
437 goto SPOOL_READ_ERROR;
438 }
439 big_buffer[len-1] = 0;
47ca6d6c 440
08955dd3 441 switch(big_buffer[1])
059ec3d9 442 {
08955dd3
PH
443 case 'a':
444
445 /* Nowadays we use "-aclc" and "-aclm" for the different types of ACL
446 variable, because Exim allows any number of them, with arbitrary names.
447 The line in the spool file is "-acl[cm] <name> <length>". The name excludes
448 the c or m. */
449
450 if (Ustrncmp(p, "clc ", 4) == 0 ||
451 Ustrncmp(p, "clm ", 4) == 0)
452 {
453 uschar *name, *endptr;
454 int count;
455 tree_node *node;
456 endptr = Ustrchr(big_buffer + 6, ' ');
457 if (endptr == NULL) goto SPOOL_FORMAT_ERROR;
458 name = string_sprintf("%c%.*s", big_buffer[4], endptr - big_buffer - 6,
459 big_buffer + 6);
460 if (sscanf(CS endptr, " %d", &count) != 1) goto SPOOL_FORMAT_ERROR;
461 node = acl_var_create(name);
462 node->data.ptr = store_get(count + 1);
463 if (fread(node->data.ptr, 1, count+1, f) < count) goto SPOOL_READ_ERROR;
464 ((uschar*)node->data.ptr)[count] = 0;
465 }
466
467 else if (Ustrcmp(p, "llow_unqualified_recipient") == 0)
468 allow_unqualified_recipient = TRUE;
469 else if (Ustrcmp(p, "llow_unqualified_sender") == 0)
470 allow_unqualified_sender = TRUE;
471
472 else if (Ustrncmp(p, "uth_id", 6) == 0)
473 authenticated_id = string_copy(big_buffer + 9);
474 else if (Ustrncmp(p, "uth_sender", 10) == 0)
475 authenticated_sender = string_copy(big_buffer + 13);
476 else if (Ustrncmp(p, "ctive_hostname", 14) == 0)
477 smtp_active_hostname = string_copy(big_buffer + 17);
478
479 /* For long-term backward compatibility, we recognize "-acl", which was
480 used before the number of ACL variables changed from 10 to 20. This was
481 before the subsequent change to an arbitrary number of named variables.
482 This code is retained so that upgrades from very old versions can still
483 handle old-format spool files. The value given after "-acl" is a number
484 that is 0-9 for connection variables, and 10-19 for message variables. */
485
486 else if (Ustrncmp(p, "cl ", 3) == 0)
487 {
4dc2379a
JH
488 unsigned index, count;
489 uschar name[20]; /* Need plenty of space for %u format */
490 tree_node * node;
491 if ( sscanf(CS big_buffer + 5, "%u %u", &index, &count) != 2
806c3df9 492 || index >= 20
f267271d 493 || count > 16384 /* arbitrary limit on variable size */
806c3df9 494 )
08955dd3 495 goto SPOOL_FORMAT_ERROR;
8dce1a6f 496 if (index < 10)
4dc2379a 497 (void) string_format(name, sizeof(name), "%c%u", 'c', index);
806c3df9 498 else
4dc2379a 499 (void) string_format(name, sizeof(name), "%c%u", 'm', index - 10);
08955dd3
PH
500 node = acl_var_create(name);
501 node->data.ptr = store_get(count + 1);
f267271d
JH
502 /* We sanity-checked the count, so disable the Coverity error */
503 /* coverity[tainted_data] */
08955dd3 504 if (fread(node->data.ptr, 1, count+1, f) < count) goto SPOOL_READ_ERROR;
4dc2379a 505 (US node->data.ptr)[count] = '\0';
08955dd3
PH
506 }
507 break;
508
509 case 'b':
510 if (Ustrncmp(p, "ody_linecount", 13) == 0)
511 body_linecount = Uatoi(big_buffer + 15);
512 else if (Ustrncmp(p, "ody_zerocount", 13) == 0)
513 body_zerocount = Uatoi(big_buffer + 15);
e91ad4a7 514#ifdef EXPERIMENTAL_BRIGHTMAIL
08955dd3
PH
515 else if (Ustrncmp(p, "mi_verdicts ", 12) == 0)
516 bmi_verdicts = string_copy(big_buffer + 14);
e91ad4a7 517#endif
08955dd3
PH
518 break;
519
520 case 'd':
521 if (Ustrcmp(p, "eliver_firsttime") == 0)
522 deliver_firsttime = TRUE;
6c1c3d1d
WB
523 /* Check if the dsn flags have been set in the header file */
524 else if (Ustrncmp(p, "sn_ret", 6) == 0)
45500060 525 dsn_ret= atoi(CS big_buffer + 8);
6c1c3d1d 526 else if (Ustrncmp(p, "sn_envid", 8) == 0)
6c1c3d1d 527 dsn_envid = string_copy(big_buffer + 11);
08955dd3
PH
528 break;
529
530 case 'f':
531 if (Ustrncmp(p, "rozen", 5) == 0)
532 {
533 deliver_freeze = TRUE;
dc8091e7
JH
534 if (sscanf(CS big_buffer+7, TIME_T_FMT, &deliver_frozen_at) != 1)
535 goto SPOOL_READ_ERROR;
08955dd3
PH
536 }
537 break;
538
539 case 'h':
540 if (Ustrcmp(p, "ost_lookup_deferred") == 0)
541 host_lookup_deferred = TRUE;
542 else if (Ustrcmp(p, "ost_lookup_failed") == 0)
543 host_lookup_failed = TRUE;
544 else if (Ustrncmp(p, "ost_auth", 8) == 0)
545 sender_host_authenticated = string_copy(big_buffer + 11);
546 else if (Ustrncmp(p, "ost_name", 8) == 0)
547 sender_host_name = string_copy(big_buffer + 11);
548 else if (Ustrncmp(p, "elo_name", 8) == 0)
549 sender_helo_name = string_copy(big_buffer + 11);
550
551 /* We now record the port number after the address, separated by a
552 dot. For compatibility during upgrading, do nothing if there
553 isn't a value (it gets left at zero). */
554
555 else if (Ustrncmp(p, "ost_address", 11) == 0)
556 {
557 sender_host_port = host_address_extract_port(big_buffer + 14);
558 sender_host_address = string_copy(big_buffer + 14);
559 }
560 break;
561
562 case 'i':
563 if (Ustrncmp(p, "nterface_address", 16) == 0)
564 {
565 interface_port = host_address_extract_port(big_buffer + 19);
566 interface_address = string_copy(big_buffer + 19);
567 }
568 else if (Ustrncmp(p, "dent", 4) == 0)
569 sender_ident = string_copy(big_buffer + 7);
570 break;
571
572 case 'l':
573 if (Ustrcmp(p, "ocal") == 0) sender_local = TRUE;
574 else if (Ustrcmp(big_buffer, "-localerror") == 0)
575 local_error_message = TRUE;
576 else if (Ustrncmp(p, "ocal_scan ", 10) == 0)
577 local_scan_data = string_copy(big_buffer + 12);
578 break;
579
580 case 'm':
581 if (Ustrcmp(p, "anual_thaw") == 0) deliver_manual_thaw = TRUE;
d677b2f2
PH
582 else if (Ustrncmp(p, "ax_received_linelength", 22) == 0)
583 max_received_linelength = Uatoi(big_buffer + 24);
08955dd3
PH
584 break;
585
586 case 'N':
587 if (*p == 0) dont_deliver = TRUE; /* -N */
588 break;
589
590 case 'r':
591 if (Ustrncmp(p, "eceived_protocol", 16) == 0)
592 received_protocol = string_copy(big_buffer + 19);
593 break;
594
595 case 's':
596 if (Ustrncmp(p, "ender_set_untrusted", 19) == 0)
597 sender_set_untrusted = TRUE;
e91ad4a7 598#ifdef WITH_CONTENT_SCAN
3481c572
JH
599 else if (Ustrncmp(p, "pam_bar ", 8) == 0)
600 spam_bar = string_copy(big_buffer + 10);
601 else if (Ustrncmp(p, "pam_score ", 10) == 0)
602 spam_score = string_copy(big_buffer + 12);
08955dd3
PH
603 else if (Ustrncmp(p, "pam_score_int ", 14) == 0)
604 spam_score_int = string_copy(big_buffer + 16);
e91ad4a7 605#endif
8c5d388a 606#if defined(SUPPORT_I18N) && !defined(COMPILE_UTILITY)
7ade712c
JH
607 else if (Ustrncmp(p, "mtputf8", 7) == 0)
608 message_smtputf8 = TRUE;
609#endif
08955dd3
PH
610 break;
611
e91ad4a7 612#ifdef SUPPORT_TLS
08955dd3
PH
613 case 't':
614 if (Ustrncmp(p, "ls_certificate_verified", 23) == 0)
817d9f57 615 tls_in.certificate_verified = TRUE;
08955dd3 616 else if (Ustrncmp(p, "ls_cipher", 9) == 0)
817d9f57 617 tls_in.cipher = string_copy(big_buffer + 12);
e91ad4a7 618# ifndef COMPILE_UTILITY /* tls support fns not built in */
9d1c15ef
JH
619 else if (Ustrncmp(p, "ls_ourcert", 10) == 0)
620 (void) tls_import_cert(big_buffer + 13, &tls_in.ourcert);
621 else if (Ustrncmp(p, "ls_peercert", 11) == 0)
622 (void) tls_import_cert(big_buffer + 14, &tls_in.peercert);
e91ad4a7 623# endif
08955dd3 624 else if (Ustrncmp(p, "ls_peerdn", 9) == 0)
817d9f57 625 tls_in.peerdn = string_unprinting(string_copy(big_buffer + 12));
7be682ca 626 else if (Ustrncmp(p, "ls_sni", 6) == 0)
817d9f57 627 tls_in.sni = string_unprinting(string_copy(big_buffer + 9));
44662487
JH
628 else if (Ustrncmp(p, "ls_ocsp", 7) == 0)
629 tls_in.ocsp = big_buffer[10] - '0';
08955dd3 630 break;
e91ad4a7 631#endif
08955dd3 632
8c5d388a 633#if defined(SUPPORT_I18N) && !defined(COMPILE_UTILITY)
3c8b3577
JH
634 case 'u':
635 if (Ustrncmp(p, "tf8_downcvt", 11) == 0)
636 message_utf8_downconvert = 1;
0ec7e948 637 else if (Ustrncmp(p, "tf8_optdowncvt", 15) == 0)
3c8b3577
JH
638 message_utf8_downconvert = -1;
639 break;
640#endif
641
08955dd3
PH
642 default: /* Present because some compilers complain if all */
643 break; /* possibilities are not covered. */
059ec3d9 644 }
059ec3d9
PH
645 }
646
647/* Build sender_fullhost if required */
648
649#ifndef COMPILE_UTILITY
650host_build_sender_fullhost();
651#endif /* COMPILE_UTILITY */
652
653#ifndef COMPILE_UTILITY
654DEBUG(D_deliver)
655 debug_printf("sender_local=%d ident=%s\n", sender_local,
656 (sender_ident == NULL)? US"unset" : sender_ident);
657#endif /* COMPILE_UTILITY */
658
659/* We now have the tree of addresses NOT to deliver to, or a line
660containing "XX", indicating no tree. */
661
662if (Ustrncmp(big_buffer, "XX\n", 3) != 0 &&
663 !read_nonrecipients_tree(&tree_nonrecipients, f, big_buffer, big_buffer_size))
664 goto SPOOL_FORMAT_ERROR;
665
666#ifndef COMPILE_UTILITY
667DEBUG(D_deliver)
668 {
669 debug_printf("Non-recipients:\n");
670 debug_print_tree(tree_nonrecipients);
671 }
672#endif /* COMPILE_UTILITY */
673
674/* After reading the tree, the next line has not yet been read into the
d88f0784
JH
675buffer. It contains the count of recipients which follow on separate lines.
676Apply an arbitrary sanity check.*/
059ec3d9
PH
677
678if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
d88f0784
JH
679if (sscanf(CS big_buffer, "%d", &rcount) != 1 || rcount > 16384)
680 goto SPOOL_FORMAT_ERROR;
059ec3d9
PH
681
682#ifndef COMPILE_UTILITY
683DEBUG(D_deliver) debug_printf("recipients_count=%d\n", rcount);
684#endif /* COMPILE_UTILITY */
685
686recipients_list_max = rcount;
687recipients_list = store_get(rcount * sizeof(recipient_item));
688
d88f0784
JH
689/* We sanitised the count and know we have enough memory, so disable
690the Coverity error on recipients_count */
691/* coverity[tainted_data] */
692
059ec3d9
PH
693for (recipients_count = 0; recipients_count < rcount; recipients_count++)
694 {
695 int nn;
696 int pno = -1;
6c1c3d1d
WB
697 int dsn_flags = 0;
698 uschar *orcpt = NULL;
059ec3d9
PH
699 uschar *errors_to = NULL;
700 uschar *p;
701
702 if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
703 nn = Ustrlen(big_buffer);
704 if (nn < 2) goto SPOOL_FORMAT_ERROR;
705
706 /* Remove the newline; this terminates the address if there is no additional
707 data on the line. */
708
709 p = big_buffer + nn - 1;
710 *p-- = 0;
711
712 /* Look back from the end of the line for digits and special terminators.
713 Since an address must end with a domain, we can tell that extra data is
714 present by the presence of the terminator, which is always some character
715 that cannot exist in a domain. (If I'd thought of the need for additional
716 data early on, I'd have put it at the start, with the address at the end. As
717 it is, we have to operate backwards. Addresses are permitted to contain
718 spaces, you see.)
719
720 This code has to cope with various versions of this data that have evolved
721 over time. In all cases, the line might just contain an address, with no
722 additional data. Otherwise, the possibilities are as follows:
723
724 Exim 3 type: <address><space><digits>,<digits>,<digits>
725
726 The second set of digits is the parent number for one_time addresses. The
727 other values were remnants of earlier experiments that were abandoned.
728
729 Exim 4 first type: <address><space><digits>
730
731 The digits are the parent number for one_time addresses.
732
733 Exim 4 new type: <address><space><data>#<type bits>
734
735 The type bits indicate what the contents of the data are.
736
737 Bit 01 indicates that, reading from right to left, the data
738 ends with <errors_to address><space><len>,<pno> where pno is
739 the parent number for one_time addresses, and len is the length
740 of the errors_to address (zero meaning none).
6c1c3d1d
WB
741
742 Bit 02 indicates that, again reading from right to left, the data continues
743 with orcpt len(orcpt),dsn_flags
059ec3d9
PH
744 */
745
746 while (isdigit(*p)) p--;
747
748 /* Handle Exim 3 spool files */
749
750 if (*p == ',')
751 {
752 int dummy;
753 while (isdigit(*(--p)) || *p == ',');
754 if (*p == ' ')
755 {
756 *p++ = 0;
ff790e47 757 (void)sscanf(CS p, "%d,%d", &dummy, &pno);
059ec3d9
PH
758 }
759 }
760
761 /* Handle early Exim 4 spool files */
762
763 else if (*p == ' ')
764 {
765 *p++ = 0;
ff790e47 766 (void)sscanf(CS p, "%d", &pno);
059ec3d9
PH
767 }
768
769 /* Handle current format Exim 4 spool files */
770
771 else if (*p == '#')
772 {
773 int flags;
6c1c3d1d 774
50dc7409 775#if !defined (COMPILE_UTILITY)
e91ad4a7
JH
776 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - Exim 4 standard format spoolfile\n");
777#endif
6c1c3d1d 778
ff790e47 779 (void)sscanf(CS p+1, "%d", &flags);
059ec3d9
PH
780
781 if ((flags & 0x01) != 0) /* one_time data exists */
782 {
783 int len;
784 while (isdigit(*(--p)) || *p == ',' || *p == '-');
ff790e47 785 (void)sscanf(CS p+1, "%d,%d", &len, &pno);
059ec3d9
PH
786 *p = 0;
787 if (len > 0)
788 {
789 p -= len;
790 errors_to = string_copy(p);
94431adb 791 }
6c1c3d1d
WB
792 }
793
794 *(--p) = 0; /* Terminate address */
6c1c3d1d
WB
795 if ((flags & 0x02) != 0) /* one_time data exists */
796 {
797 int len;
798 while (isdigit(*(--p)) || *p == ',' || *p == '-');
799 (void)sscanf(CS p+1, "%d,%d", &len, &dsn_flags);
800 *p = 0;
801 if (len > 0)
802 {
803 p -= len;
804 orcpt = string_copy(p);
94431adb 805 }
059ec3d9
PH
806 }
807
808 *(--p) = 0; /* Terminate address */
6c1c3d1d 809 }
50dc7409 810#if !defined(COMPILE_UTILITY)
6c1c3d1d 811 else
e91ad4a7 812 { DEBUG(D_deliver) debug_printf("**** SPOOL_IN - No additional fields\n"); }
6c1c3d1d
WB
813
814 if ((orcpt != NULL) || (dsn_flags != 0))
815 {
816 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - address: |%s| orcpt: |%s| dsn_flags: %d\n",
817 big_buffer, orcpt, dsn_flags);
818 }
819 if (errors_to != NULL)
820 {
821 DEBUG(D_deliver) debug_printf("**** SPOOL_IN - address: |%s| errorsto: |%s|\n",
822 big_buffer, errors_to);
059ec3d9 823 }
50dc7409 824#endif
059ec3d9
PH
825
826 recipients_list[recipients_count].address = string_copy(big_buffer);
827 recipients_list[recipients_count].pno = pno;
828 recipients_list[recipients_count].errors_to = errors_to;
6c1c3d1d
WB
829 recipients_list[recipients_count].orcpt = orcpt;
830 recipients_list[recipients_count].dsn_flags = dsn_flags;
059ec3d9
PH
831 }
832
833/* The remainder of the spool header file contains the headers for the message,
834separated off from the previous data by a blank line. Each header is preceded
835by a count of its length and either a certain letter (for various identified
836headers), space (for a miscellaneous live header) or an asterisk (for a header
837that has been rewritten). Count the Received: headers. We read the headers
838always, in order to check on the format of the file, but only create a header
839list if requested to do so. */
840
841inheader = TRUE;
842if (Ufgets(big_buffer, big_buffer_size, f) == NULL) goto SPOOL_READ_ERROR;
843if (big_buffer[0] != '\n') goto SPOOL_FORMAT_ERROR;
844
845while ((n = fgetc(f)) != EOF)
846 {
847 header_line *h;
848 uschar flag[4];
849 int i;
850
851 if (!isdigit(n)) goto SPOOL_FORMAT_ERROR;
1ac6b2e7
JH
852 if(ungetc(n, f) == EOF || fscanf(f, "%d%c ", &n, flag) == EOF)
853 goto SPOOL_READ_ERROR;
059ec3d9
PH
854 if (flag[0] != '*') message_size += n; /* Omit non-transmitted headers */
855
856 if (read_headers)
857 {
858 h = store_get(sizeof(header_line));
859 h->next = NULL;
860 h->type = flag[0];
861 h->slen = n;
862 h->text = store_get(n+1);
863
864 if (h->type == htype_received) received_count++;
865
866 if (header_list == NULL) header_list = h;
867 else header_last->next = h;
868 header_last = h;
869
870 for (i = 0; i < n; i++)
871 {
872 int c = fgetc(f);
873 if (c == 0 || c == EOF) goto SPOOL_FORMAT_ERROR;
874 if (c == '\n' && h->type != htype_old) message_linecount++;
875 h->text[i] = c;
876 }
877 h->text[i] = 0;
878 }
879
880 /* Not requiring header data, just skip through the bytes */
881
882 else for (i = 0; i < n; i++)
883 {
884 int c = fgetc(f);
885 if (c == 0 || c == EOF) goto SPOOL_FORMAT_ERROR;
886 }
887 }
888
889/* We have successfully read the data in the header file. Update the message
890line count by adding the body linecount to the header linecount. Close the file
891and give a positive response. */
892
893#ifndef COMPILE_UTILITY
894DEBUG(D_deliver) debug_printf("body_linecount=%d message_linecount=%d\n",
895 body_linecount, message_linecount);
896#endif /* COMPILE_UTILITY */
897
898message_linecount += body_linecount;
899
900fclose(f);
901return spool_read_OK;
902
903
904/* There was an error reading the spool or there was missing data,
905or there was a format error. A "read error" with no errno means an
906unexpected EOF, which we treat as a format error. */
907
908SPOOL_READ_ERROR:
909if (errno != 0)
910 {
911 n = errno;
912
e91ad4a7 913#ifndef COMPILE_UTILITY
059ec3d9 914 DEBUG(D_any) debug_printf("Error while reading spool file %s\n", name);
e91ad4a7 915#endif /* COMPILE_UTILITY */
059ec3d9
PH
916
917 fclose(f);
918 errno = n;
919 return inheader? spool_read_hdrerror : spool_read_enverror;
920 }
921
922SPOOL_FORMAT_ERROR:
923
924#ifndef COMPILE_UTILITY
925DEBUG(D_any) debug_printf("Format error in spool file %s\n", name);
926#endif /* COMPILE_UTILITY */
927
928fclose(f);
929errno = ERRNO_SPOOLFORMAT;
930return inheader? spool_read_hdrerror : spool_read_enverror;
931}
932
9d1c15ef
JH
933/* vi: aw ai sw=2
934*/
059ec3d9 935/* End of spool_in.c */