feature advertise
[exim.git] / src / src / globals.h
1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
4
5 /* Copyright (c) University of Cambridge 1995 - 2016 */
6 /* See the file NOTICE for conditions of use and distribution. */
7
8 /* Almost all the global variables are defined together in this one header, so
9 that they are easy to find. However, those that are visible during the
10 compilation of the local_scan() function are defined separately in the
11 local_scan.h header file. */
12
13 /* First put any specials that are required for some operating systems. */
14
15 #ifdef NEED_H_ERRNO
16 extern int h_errno;
17 #endif
18
19 /* We need to be careful about width of int and atomicity in signal handlers,
20 especially with the rise of 64-bit systems breaking older assumptions. But
21 sig_atomic_t comes from signal.h so can't go into mytypes.h without including
22 signal support in local_scan, which seems precipitous. */
23 typedef volatile sig_atomic_t SIGNAL_BOOL;
24
25 /* Now things that are present only when configured. */
26
27 #ifdef EXIM_PERL
28 extern uschar *opt_perl_startup; /* Startup code for Perl interpreter */
29 extern BOOL opt_perl_at_start; /* Start Perl interpreter at start */
30 extern BOOL opt_perl_started; /* Set once interpreter started */
31 extern BOOL opt_perl_taintmode; /* Enable taint mode in Perl */
32 #endif
33
34 #ifdef EXPAND_DLFUNC
35 extern tree_node *dlobj_anchor; /* Tree of dynamically-loaded objects */
36 #endif
37
38 #ifdef LOOKUP_IBASE
39 extern uschar *ibase_servers;
40 #endif
41
42 #ifdef LOOKUP_LDAP
43 extern uschar *eldap_ca_cert_dir; /* Directory with CA certificates */
44 extern uschar *eldap_ca_cert_file; /* CA certificate file */
45 extern uschar *eldap_cert_file; /* Certificate file */
46 extern uschar *eldap_cert_key; /* Certificate key file */
47 extern uschar *eldap_cipher_suite; /* Allowed cipher suite */
48 extern uschar *eldap_default_servers; /* List of default servers */
49 extern uschar *eldap_require_cert; /* Peer certificate checking strategy */
50 extern BOOL eldap_start_tls; /* Use STARTTLS */
51 extern int eldap_version; /* LDAP version */
52 #endif
53
54 #ifdef LOOKUP_MYSQL
55 extern uschar *mysql_servers; /* List of servers and connect info */
56 #endif
57
58 #ifdef LOOKUP_ORACLE
59 extern uschar *oracle_servers; /* List of servers and connect info */
60 #endif
61
62 #ifdef LOOKUP_PGSQL
63 extern uschar *pgsql_servers; /* List of servers and connect info */
64 #endif
65
66 #ifdef LOOKUP_REDIS
67 extern uschar *redis_servers; /* List of servers and connect info */
68 #endif
69
70 #ifdef LOOKUP_SQLITE
71 extern int sqlite_lock_timeout; /* Internal lock waiting timeout */
72 #endif
73
74 #ifdef SUPPORT_MOVE_FROZEN_MESSAGES
75 extern BOOL move_frozen_messages; /* Get them out of the normal directory */
76 #endif
77
78 /* These variables are outside the #ifdef because it keeps the code less
79 cluttered in several places (e.g. during logging) if we can always refer to
80 them. Also, the tls_ variables are now always visible. */
81
82 typedef struct {
83 int active; /* fd/socket when in a TLS session */
84 int bits; /* bits used in TLS session */
85 BOOL certificate_verified; /* Client certificate verified */
86 #ifdef EXPERIMENTAL_DANE
87 BOOL dane_verified; /* ... via DANE */
88 int tlsa_usage; /* TLSA record(s) usage */
89 #endif
90 uschar *cipher; /* Cipher used */
91 BOOL on_connect; /* For older MTAs that don't STARTTLS */
92 uschar *on_connect_ports; /* Ports always tls-on-connect */
93 void *ourcert; /* Certificate we presented, binary */
94 void *peercert; /* Certificate of peer, binary */
95 uschar *peerdn; /* DN from peer */
96 uschar *sni; /* Server Name Indication */
97 enum {
98 OCSP_NOT_REQ=0, /* not requested */
99 OCSP_NOT_RESP, /* no response to request */
100 OCSP_VFY_NOT_TRIED, /* response not verified */
101 OCSP_FAILED, /* verify failed */
102 OCSP_VFIED /* verified */
103 } ocsp; /* Stapled OCSP status */
104 } tls_support;
105 extern tls_support tls_in;
106 extern tls_support tls_out;
107
108 #ifdef SUPPORT_TLS
109 extern BOOL gnutls_compat_mode; /* Less security, more compatibility */
110 extern BOOL gnutls_allow_auto_pkcs11; /* Let GnuTLS autoload PKCS11 modules */
111 extern uschar *openssl_options; /* OpenSSL compatibility options */
112 extern const pcre *regex_STARTTLS; /* For recognizing STARTTLS settings */
113 extern uschar *tls_certificate; /* Certificate file */
114 extern uschar *tls_channelbinding_b64; /* string of base64 channel binding */
115 extern uschar *tls_crl; /* CRL File */
116 extern int tls_dh_max_bits; /* don't accept higher lib suggestions */
117 extern uschar *tls_dhparam; /* DH param file */
118 extern uschar *tls_eccurve; /* EC curve */
119 # ifndef DISABLE_OCSP
120 extern uschar *tls_ocsp_file; /* OCSP stapling proof file */
121 # endif
122 extern BOOL tls_offered; /* Server offered TLS */
123 extern uschar *tls_privatekey; /* Private key file */
124 extern BOOL tls_remember_esmtp; /* For YAEB */
125 extern uschar *tls_require_ciphers; /* So some can be avoided */
126 extern uschar *tls_try_verify_hosts; /* Optional client verification */
127 extern uschar *tls_verify_certificates;/* Path for certificates to check */
128 extern uschar *tls_verify_hosts; /* Mandatory client verification */
129 #endif
130 extern uschar *tls_advertise_hosts; /* host for which TLS is advertised */
131
132 extern uschar *dsn_envid; /* DSN envid string */
133 extern int dsn_ret; /* DSN ret type*/
134 extern const pcre *regex_DSN; /* For recognizing DSN settings */
135 extern BOOL smtp_use_dsn; /* Global for passed connections */
136 extern uschar *dsn_advertise_hosts; /* host for which TLS is advertised */
137
138 /* Input-reading functions for messages, so we can use special ones for
139 incoming TCP/IP. */
140
141 extern int (*receive_getc)(void);
142 extern int (*receive_ungetc)(int);
143 extern int (*receive_feof)(void);
144 extern int (*receive_ferror)(void);
145 extern BOOL (*receive_smtp_buffered)(void);
146
147
148 /* For clearing, saving, restoring address expansion variables. We have to have
149 the size of this vector set explicitly, because it is referenced from more than
150 one module. */
151
152 extern const uschar **address_expansions[ADDRESS_EXPANSIONS_COUNT];
153
154 /* General global variables */
155
156 extern BOOL accept_8bitmime; /* Allow *BITMIME incoming */
157 extern uschar *add_environment; /* List of environment variables to add */
158 extern header_line *acl_added_headers; /* Headers added by an ACL */
159 extern tree_node *acl_anchor; /* Tree of named ACLs */
160 extern uschar *acl_arg[9]; /* Argument to ACL call */
161 extern int acl_narg; /* Number of arguments to ACL call */
162 extern uschar *acl_not_smtp; /* ACL run for non-SMTP messages */
163 #ifdef WITH_CONTENT_SCAN
164 extern uschar *acl_not_smtp_mime; /* For MIME parts of ditto */
165 #endif
166 extern uschar *acl_not_smtp_start; /* ACL run at the beginning of a non-SMTP session */
167 extern uschar *acl_removed_headers; /* Headers deleted by an ACL */
168 extern uschar *acl_smtp_auth; /* ACL run for AUTH */
169 extern uschar *acl_smtp_connect; /* ACL run on SMTP connection */
170 extern uschar *acl_smtp_data; /* ACL run after DATA received */
171 #ifndef DISABLE_PRDR
172 extern uschar *acl_smtp_data_prdr; /* ACL run after DATA received if in PRDR mode*/
173 const extern pcre *regex_PRDR; /* For recognizing PRDR settings */
174 #endif
175 #ifndef DISABLE_DKIM
176 extern uschar *acl_smtp_dkim; /* ACL run for DKIM signatures / domains */
177 #endif
178 extern uschar *acl_smtp_etrn; /* ACL run for ETRN */
179 extern uschar *acl_smtp_expn; /* ACL run for EXPN */
180 extern uschar *acl_smtp_helo; /* ACL run for HELO/EHLO */
181 extern uschar *acl_smtp_mail; /* ACL run for MAIL */
182 extern uschar *acl_smtp_mailauth; /* ACL run for MAIL AUTH */
183 #ifdef WITH_CONTENT_SCAN
184 extern uschar *acl_smtp_mime; /* ACL run after DATA, before acl_smtp_data, for each MIME part */
185 #endif
186 extern uschar *acl_smtp_notquit; /* ACL run for disconnects */
187 extern uschar *acl_smtp_predata; /* ACL run for DATA command */
188 extern uschar *acl_smtp_quit; /* ACL run for QUIT */
189 extern uschar *acl_smtp_rcpt; /* ACL run for RCPT */
190 extern uschar *acl_smtp_starttls; /* ACL run for STARTTLS */
191 extern uschar *acl_smtp_vrfy; /* ACL run for VRFY */
192 extern BOOL acl_temp_details; /* TRUE to give details for 4xx error */
193 extern tree_node *acl_var_c; /* ACL connection variables */
194 extern tree_node *acl_var_m; /* ACL message variables */
195 extern uschar *acl_verify_message; /* User message for verify failure */
196 extern string_item *acl_warn_logged; /* Logged lines */
197 extern uschar *acl_wherecodes[]; /* Response codes for ACL fails */
198 extern uschar *acl_wherenames[]; /* Names for messages */
199 extern BOOL active_local_from_check;/* For adding Sender: (switchable) */
200 extern BOOL active_local_sender_retain; /* For keeping Sender: (switchable) */
201 extern address_item *addr_duplicate; /* Duplicate address list */
202 extern address_item address_defaults; /* Default data for address item */
203 extern uschar *address_file; /* Name of file when delivering to one */
204 extern uschar *address_pipe; /* Pipe command when delivering to one */
205 extern BOOL address_test_mode; /* True for -bt */
206 extern tree_node *addresslist_anchor; /* Tree of defined address lists */
207 extern int addresslist_count; /* Number defined */
208 extern gid_t *admin_groups; /* List of admin groups */
209 extern BOOL admin_user; /* True if caller can do admin */
210 extern BOOL allow_auth_unadvertised;/* As it says */
211 extern BOOL allow_domain_literals; /* As it says */
212 extern BOOL allow_mx_to_ip; /* Allow MX records to -> ip address */
213 extern BOOL allow_unqualified_recipient; /* As it says */
214 extern BOOL allow_unqualified_sender; /* Ditto */
215 extern BOOL allow_utf8_domains; /* For experimenting */
216 extern uschar *authenticated_fail_id; /* ID that failed authentication */
217 extern uschar *authenticated_id; /* ID that was authenticated */
218 extern uschar *authenticated_sender; /* From AUTH on MAIL */
219 extern BOOL authentication_failed; /* TRUE if AUTH was tried and failed */
220 extern uschar *auth_advertise_hosts; /* Only advertise to these */
221 extern auth_info auths_available[]; /* Vector of available auth mechanisms */
222 extern auth_instance *auths; /* Chain of instantiated auths */
223 extern auth_instance auth_defaults; /* Default values */
224 extern uschar *auth_defer_msg; /* Error message for log */
225 extern uschar *auth_defer_user_msg; /* Error message for user */
226 extern uschar *auth_vars[]; /* $authn variables */
227 extern int auto_thaw; /* Auto-thaw interval */
228 #ifdef WITH_CONTENT_SCAN
229 extern BOOL av_failed; /* TRUE if the AV process failed */
230 extern uschar *av_scanner; /* AntiVirus scanner to use for the malware condition */
231 #endif
232
233 extern BOOL background_daemon; /* Set FALSE to keep in foreground */
234 extern uschar *base62_chars; /* Table of base-62 characters */
235 extern uschar *bi_command; /* Command for -bi option */
236 extern uschar *big_buffer; /* Used for various temp things */
237 extern int big_buffer_size; /* Current size (can expand) */
238 #ifdef EXPERIMENTAL_BRIGHTMAIL
239 extern uschar *bmi_alt_location; /* expansion variable that contains the alternate location for the rcpt (available during routing) */
240 extern uschar *bmi_base64_tracker_verdict; /* expansion variable with base-64 encoded OLD verdict string (available during routing) */
241 extern uschar *bmi_base64_verdict; /* expansion variable with base-64 encoded verdict string (available during routing) */
242 extern uschar *bmi_config_file; /* Brightmail config file */
243 extern int bmi_deliver; /* Flag that determines if the message should be delivered to the rcpt (available during routing) */
244 extern int bmi_run; /* Flag that determines if message should be run through Brightmail server */
245 extern uschar *bmi_verdicts; /* BASE64-encoded verdicts with recipient lists */
246 #endif
247 extern int body_8bitmime; /* sender declared BODY= ; 7=7BIT, 8=8BITMIME */
248 extern uschar *bounce_message_file; /* Template file */
249 extern uschar *bounce_message_text; /* One-liner */
250 extern uschar *bounce_recipient; /* When writing an errmsg */
251 extern BOOL bounce_return_body; /* Include body in returned message */
252 extern int bounce_return_linesize_limit; /* Max line length in return */
253 extern BOOL bounce_return_message; /* Include message in bounce */
254 extern int bounce_return_size_limit; /* Max amount to return */
255 extern uschar *bounce_sender_authentication; /* AUTH address for bounces */
256 extern int bsmtp_transaction_linecount; /* Start of last transaction */
257
258 extern uschar *callout_address; /* Address used for a malware/spamd/verify etc. callout */
259 extern int callout_cache_domain_positive_expire; /* Time for positive domain callout cache records to expire */
260 extern int callout_cache_domain_negative_expire; /* Time for negative domain callout cache records to expire */
261 extern int callout_cache_positive_expire; /* Time for positive callout cache records to expire */
262 extern int callout_cache_negative_expire; /* Time for negative callout cache records to expire */
263 extern uschar *callout_random_local_part; /* Local part to be used to check if server called will accept any local part */
264 extern uschar *check_dns_names_pattern;/* Regex for syntax check */
265 extern int check_log_inodes; /* Minimum for message acceptance */
266 extern int check_log_space; /* Minimum for message acceptance */
267 extern BOOL check_rfc2047_length; /* Check RFC 2047 encoded string length */
268 extern int check_spool_inodes; /* Minimum for message acceptance */
269 extern int check_spool_space; /* Minimum for message acceptance */
270 extern uschar *chunking_advertise_hosts; /* RFC 3030 CHUNKING */
271 extern uschar *client_authenticator; /* Authenticator name used for smtp delivery */
272 extern uschar *client_authenticated_id; /* "login" name used for SMTP AUTH */
273 extern uschar *client_authenticated_sender; /* AUTH option to SMTP MAIL FROM (not yet used) */
274 extern int clmacro_count; /* Number of command line macros */
275 extern uschar *clmacros[]; /* Copy of them, for re-exec */
276 extern int connection_max_messages;/* Max down one SMTP connection */
277 extern BOOL config_changed; /* True if -C used */
278 extern FILE *config_file; /* Configuration file */
279 extern uschar *config_filename; /* Configuration file name */
280 #ifdef CONFIGURE_GROUP
281 extern gid_t config_gid; /* Additional group owner */
282 #endif
283 extern int config_lineno; /* Line number */
284 extern uschar *config_main_filelist; /* List of possible config files */
285 extern uschar *config_main_filename; /* File name actually used */
286 extern uschar *config_main_directory; /* Directory where the main config file was found */
287 #ifdef CONFIGURE_OWNER
288 extern uid_t config_uid; /* Additional owner */
289 #endif
290 extern uschar *continue_hostname; /* Host for continued delivery */
291 extern uschar *continue_host_address; /* IP address for ditto */
292 extern BOOL continue_more; /* Flag more addresses waiting */
293 extern int continue_sequence; /* Sequence num for continued delivery */
294 extern uschar *continue_transport; /* Transport for continued delivery */
295
296 extern uschar *csa_status; /* Client SMTP Authorization result */
297
298 typedef struct {
299 BOOL delivery; /* When to attempt */
300 int fd; /* Open connection */
301 int nrcpt; /* Count of addresses */
302 uschar * interface; /* (address of) */
303 host_item host; /* Host used */
304 address_item addr; /* (Chain of) addresses */
305 } cut_t;
306 extern cut_t cutthrough; /* Deliver-concurrently */
307
308 extern BOOL daemon_listen; /* True if listening required */
309 extern uschar *daemon_smtp_port; /* Can be a list of ports */
310 extern int daemon_startup_retries; /* Number of times to retry */
311 extern int daemon_startup_sleep; /* Sleep between retries */
312
313 #ifdef EXPERIMENTAL_DCC
314 extern BOOL dcc_direct_add_header; /* directly add header */
315 extern uschar *dcc_header; /* dcc header */
316 extern uschar *dcc_result; /* dcc result */
317 extern uschar *dccifd_address; /* address of the dccifd daemon */
318 extern uschar *dccifd_options; /* options for the dccifd daemon */
319 #endif
320
321 extern BOOL debug_daemon; /* Debug the daemon process only */
322 extern int debug_fd; /* The fd for debug_file */
323 extern FILE *debug_file; /* Where to write debugging info */
324 extern int debug_notall[]; /* Debug options excluded from +all */
325 extern bit_table debug_options[]; /* Table of debug options */
326 extern int debug_options_count; /* Size of table */
327 extern int delay_warning[]; /* Times between warnings */
328 extern uschar *delay_warning_condition; /* Condition string for warnings */
329 extern BOOL delivery_date_remove; /* Remove delivery-date headers */
330
331 extern uschar *deliver_address_data; /* Arbitrary data for an address */
332 extern int deliver_datafile; /* FD for data part of message */
333 extern const uschar *deliver_domain; /* The local domain for delivery */
334 extern uschar *deliver_domain_data; /* From domain lookup */
335 extern const uschar *deliver_domain_orig; /* The original local domain for delivery */
336 extern const uschar *deliver_domain_parent; /* The parent domain for delivery */
337 extern BOOL deliver_drop_privilege; /* TRUE for unprivileged delivery */
338 extern BOOL deliver_firsttime; /* True for first delivery attempt */
339 extern BOOL deliver_force; /* TRUE if delivery was forced */
340 extern BOOL deliver_freeze; /* TRUE if delivery is frozen */
341 extern time_t deliver_frozen_at; /* Time of freezing */
342 extern uschar *deliver_home; /* Home directory for pipes */
343 extern const uschar *deliver_host; /* (First) host for routed local deliveries */
344 /* Remote host for filter */
345 extern const uschar *deliver_host_address; /* Address for remote delivery filter */
346 extern int deliver_host_port; /* Address for remote delivery filter */
347 extern uschar *deliver_in_buffer; /* Buffer for copying file */
348 extern ino_t deliver_inode; /* Inode for appendfile */
349 extern uschar *deliver_localpart; /* The local part for delivery */
350 extern uschar *deliver_localpart_data; /* From local part lookup */
351 extern uschar *deliver_localpart_orig; /* The original local part for delivery */
352 extern uschar *deliver_localpart_parent; /* The parent local part for delivery */
353 extern uschar *deliver_localpart_prefix; /* The stripped prefix, if any */
354 extern uschar *deliver_localpart_suffix; /* The stripped suffix, if any */
355 extern BOOL deliver_force_thaw; /* TRUE to force thaw in queue run */
356 extern BOOL deliver_manual_thaw; /* TRUE if manually thawed */
357 extern uschar *deliver_out_buffer; /* Buffer for copying file */
358 extern int deliver_queue_load_max; /* Different value for queue running */
359 extern address_item *deliver_recipients; /* Current set of addresses */
360 extern uschar *deliver_selectstring; /* For selecting by recipient */
361 extern BOOL deliver_selectstring_regex; /* String is regex */
362 extern uschar *deliver_selectstring_sender; /* For selecting by sender */
363 extern BOOL deliver_selectstring_sender_regex; /* String is regex */
364 extern BOOL disable_callout_flush; /* Don't flush before callouts */
365 extern BOOL disable_delay_flush; /* Don't flush before "delay" in ACL */
366 #ifdef ENABLE_DISABLE_FSYNC
367 extern BOOL disable_fsync; /* Not for normal use */
368 #endif
369 extern BOOL disable_ipv6; /* Don't do any IPv6 things */
370 extern BOOL disable_logging; /* Disables log writing when TRUE */
371
372 #ifndef DISABLE_DKIM
373 extern BOOL dkim_collect_input; /* Runtime flag that tracks wether SMTP input is fed to DKIM validation */
374 extern uschar *dkim_cur_signer; /* Expansion variable, holds the current "signer" domain or identity during a acl_smtp_dkim run */
375 extern BOOL dkim_disable_verify; /* Set via ACL control statement. When set, DKIM verification is disabled for the current message */
376 extern int dkim_key_length; /* Expansion variable, length of signing key in bits */
377 extern uschar *dkim_signers; /* Expansion variable, holds colon-separated list of domains and identities that have signed a message */
378 extern uschar *dkim_signing_domain; /* Expansion variable, domain used for signing a message. */
379 extern uschar *dkim_signing_selector; /* Expansion variable, selector used for signing a message. */
380 extern uschar *dkim_verify_signers; /* Colon-separated list of domains for each of which we call the DKIM ACL */
381 #endif
382 #ifdef EXPERIMENTAL_DMARC
383 extern BOOL dmarc_has_been_checked; /* Global variable to check if test has been called yet */
384 extern uschar *dmarc_ar_header; /* Expansion variable, suggested header for dmarc auth results */
385 extern uschar *dmarc_domain_policy; /* Expansion for declared policy of used domain */
386 extern uschar *dmarc_forensic_sender; /* Set sender address for forensic reports */
387 extern uschar *dmarc_history_file; /* Expansion variable, file to store dmarc results */
388 extern uschar *dmarc_status; /* Expansion variable, one word value */
389 extern uschar *dmarc_status_text; /* Expansion variable, human readable value */
390 extern uschar *dmarc_tld_file; /* Mozilla TLDs text file */
391 extern uschar *dmarc_used_domain; /* Expansion variable, domain libopendmarc chose for DMARC policy lookup */
392 extern BOOL dmarc_disable_verify; /* Set via ACL control statement. When set, DMARC verification is disabled for the current message */
393 extern BOOL dmarc_enable_forensic; /* Set via ACL control statement. When set, DMARC forensic reports are enabled for the current message */
394 #endif
395
396 extern uschar *dns_again_means_nonexist; /* Domains that are badly set up */
397 extern int dns_csa_search_limit; /* How deep to search for CSA SRV records */
398 extern BOOL dns_csa_use_reverse; /* Check CSA in reverse DNS? (non-standard) */
399 extern uschar *dns_ipv4_lookup; /* For these domains, don't look for AAAA (or A6) */
400 #ifdef EXPERIMENTAL_DANE
401 extern int dns_dane_ok; /* Ok to use DANE when checking TLS authenticity */
402 #endif
403 extern int dns_retrans; /* Retransmission time setting */
404 extern int dns_retry; /* Number of retries */
405 extern int dns_dnssec_ok; /* When constructing DNS query, set DO flag */
406 extern uschar *dns_trust_aa; /* DNSSEC trust AA as AD */
407 extern int dns_use_edns0; /* Coerce EDNS0 support on/off in resolver. */
408 extern uschar *dnslist_domain; /* DNS (black) list domain */
409 extern uschar *dnslist_matched; /* DNS (black) list matched key */
410 extern uschar *dnslist_text; /* DNS (black) list text message */
411 extern uschar *dnslist_value; /* DNS (black) list IP address */
412 extern tree_node *domainlist_anchor; /* Tree of defined domain lists */
413 extern int domainlist_count; /* Number defined */
414 extern BOOL dont_deliver; /* TRUE for -N option */
415 extern BOOL dot_ends; /* TRUE if "." ends non-SMTP input */
416
417 /* This option is now a no-opt, retained for compatibility */
418 extern BOOL drop_cr; /* For broken local MUAs */
419
420 extern uschar *dsn_from; /* From: string for DSNs */
421
422 extern BOOL enable_dollar_recipients; /* Make $recipients available */
423 extern int envelope_to_remove; /* Remove envelope_to_headers */
424 extern int errno_quota; /* Quota errno in this OS */
425 extern int error_handling; /* Error handling style */
426 extern uschar *errors_copy; /* For taking copies of errors */
427 extern uschar *errors_reply_to; /* Reply-to for error messages */
428 extern int errors_sender_rc; /* Return after message to sender*/
429
430 #ifndef DISABLE_EVENT
431 extern uschar *event_action; /* expansion for delivery events */
432 extern uschar *event_data; /* event data */
433 extern int event_defer_errno; /* error number set when a remote delivery is deferred with a host error */
434 extern const uschar *event_name; /* event classification */
435 #endif
436
437 extern gid_t exim_gid; /* To be used with exim_uid */
438 extern BOOL exim_gid_set; /* TRUE if exim_gid set */
439 extern uschar *exim_path; /* Path to exec exim */
440 extern const uschar *exim_sieve_extension_list[]; /* list of sieve extensions */
441 extern uid_t exim_uid; /* Non-root uid for exim */
442 extern BOOL exim_uid_set; /* TRUE if exim_uid set */
443 extern int expand_forbid; /* RDO flags for forbidding things */
444 extern int expand_nlength[]; /* Lengths of numbered strings */
445 extern int expand_nmax; /* Max numerical value */
446 extern uschar *expand_nstring[]; /* Numbered strings */
447 extern BOOL expand_string_forcedfail; /* TRUE if failure was "expected" */
448 extern BOOL extract_addresses_remove_arguments; /* Controls -t behaviour */
449 extern uschar *extra_local_interfaces; /* Local, non-listen interfaces */
450
451 extern int fake_response; /* Fake FAIL or DEFER response to data */
452 extern uschar *fake_response_text; /* User defined message for the above. Default is in globals.c. */
453 extern int filter_n[FILTER_VARIABLE_COUNT]; /* filter variables */
454 extern BOOL filter_running; /* TRUE while running a filter */
455 extern int filter_sn[FILTER_VARIABLE_COUNT]; /* variables set by system filter */
456 extern int filter_test; /* Filter test type */
457 extern uschar *filter_test_sfile; /* System filter test file */
458 extern uschar *filter_test_ufile; /* User filter test file */
459 extern uschar *filter_thisaddress; /* For address looping */
460 extern int finduser_retries; /* Retry count for getpwnam() */
461 extern uid_t fixed_never_users[]; /* Can't be overridden */
462 extern uschar *freeze_tell; /* Message on (some) freezings */
463 extern uschar *freeze_tell_config; /* The configured setting */
464 extern uschar *fudged_queue_times; /* For use in test harness */
465
466 extern uschar *gecos_name; /* To be expanded when pattern matches */
467 extern uschar *gecos_pattern; /* Pattern to match */
468 extern rewrite_rule *global_rewrite_rules; /* Chain of rewriting rules */
469
470 extern int header_insert_maxlen; /* Max for inserting headers */
471 extern int header_maxsize; /* Max total length for header */
472 extern int header_line_maxsize; /* Max for an individual line */
473 extern header_name header_names[]; /* Table of header names */
474 extern int header_names_size; /* Number of entries */
475 extern BOOL header_rewritten; /* TRUE if header changed by router */
476 extern uschar *helo_accept_junk_hosts; /* Allowed to use junk arg */
477 extern uschar *helo_allow_chars; /* Rogue chars to allow in HELO/EHLO */
478 extern uschar *helo_lookup_domains; /* If these given, lookup host name */
479 extern uschar *helo_try_verify_hosts; /* Soft check HELO argument for these */
480 extern BOOL helo_verified; /* True if HELO verified */
481 extern BOOL helo_verify_failed; /* True if attempt failed */
482 extern uschar *helo_verify_hosts; /* Hard check HELO argument for these */
483 extern const uschar *hex_digits; /* Used in several places */
484 extern uschar *hold_domains; /* Hold up deliveries to these */
485 extern BOOL host_find_failed_syntax;/* DNS syntax check failure */
486 extern BOOL host_checking_callout; /* TRUE if real callout wanted */
487 extern uschar *host_data; /* Obtained from lookup in ACL */
488 extern uschar *host_lookup; /* For which IP addresses are always looked up */
489 extern BOOL host_lookup_deferred; /* TRUE if lookup deferred */
490 extern BOOL host_lookup_failed; /* TRUE if lookup failed */
491 extern uschar *host_lookup_order; /* Order of host lookup types */
492 extern uschar *host_lookup_msg; /* Text for why it failed */
493 extern int host_number; /* For sharing spools */
494 extern uschar *host_number_string; /* For expanding */
495 extern uschar *host_reject_connection; /* Reject these hosts */
496 extern tree_node *hostlist_anchor; /* Tree of defined host lists */
497 extern int hostlist_count; /* Number defined */
498 extern uschar *hosts_connection_nolog; /* Limits the logging option */
499 extern uschar *hosts_treat_as_local; /* For routing */
500
501 extern int ignore_bounce_errors_after; /* Keep them for this time. */
502 extern BOOL ignore_fromline_local; /* Local SMTP ignore fromline */
503 extern uschar *ignore_fromline_hosts; /* Hosts permitted to send "From " */
504 extern BOOL inetd_wait_mode; /* Whether running in inetd wait mode */
505 extern int inetd_wait_timeout; /* Timeout for inetd wait mode */
506 extern uschar *initial_cwd; /* The directory we where in at startup */
507 extern BOOL is_inetd; /* True for inetd calls */
508 extern uschar *iterate_item; /* Item from iterate list */
509
510 extern int journal_fd; /* Fd for journal file */
511
512 extern uschar *keep_environment; /* Whitelist for environment variables */
513 extern int keep_malformed; /* Time to keep malformed messages */
514
515 extern uschar *eldap_dn; /* Where LDAP DNs are left */
516 extern int load_average; /* Most recently read load average */
517 extern BOOL local_error_message; /* True if handling one of these */
518 extern BOOL local_from_check; /* For adding Sender: (global value) */
519 extern uschar *local_from_prefix; /* Permitted prefixes */
520 extern uschar *local_from_suffix; /* Permitted suffixes */
521 extern uschar *local_interfaces; /* For forcing specific interfaces */
522 extern uschar *local_scan_data; /* Text returned by local_scan() */
523 extern optionlist local_scan_options[];/* Option list for local_scan() */
524 extern int local_scan_options_count; /* Size of the list */
525 extern int local_scan_timeout; /* Timeout for local_scan() */
526 extern BOOL local_sender_retain; /* Retain Sender: (with no From: check) */
527 extern gid_t local_user_gid; /* As it says; may be set in routers */
528 extern uid_t local_user_uid; /* As it says; may be set in routers */
529 extern tree_node *localpartlist_anchor;/* Tree of defined localpart lists */
530 extern int localpartlist_count; /* Number defined */
531 extern uschar *log_buffer; /* For constructing log entries */
532 extern int log_default[]; /* Initialization list for log_selector */
533 extern uschar *log_file_path; /* If unset, use default */
534 extern int log_notall[]; /* Log options excluded from +all */
535 extern bit_table log_options[]; /* Table of options */
536 extern int log_options_count; /* Size of table */
537 extern int log_reject_target; /* Target log for ACL rejections */
538 extern unsigned int log_selector[]; /* Bit map of logging options */
539 extern uschar *log_selector_string; /* As supplied in the config */
540 extern FILE *log_stderr; /* Copy of stderr for log use, or NULL */
541 extern BOOL log_testing_mode; /* TRUE in various testing modes */
542 extern BOOL log_timezone; /* TRUE to include the timezone in log lines */
543 extern uschar *login_sender_address; /* The actual sender address */
544 extern lookup_info **lookup_list; /* Array of pointers to available lookups */
545 extern int lookup_list_count; /* Number of entries in the list */
546 extern uschar *lookup_dnssec_authenticated; /* AD status of dns lookup */
547 extern int lookup_open_max; /* Max lookup files to cache */
548 extern uschar *lookup_value; /* Value looked up from file */
549
550 extern macro_item *macros; /* Configuration macros */
551 extern uschar *mailstore_basename; /* For mailstore deliveries */
552 #ifdef WITH_CONTENT_SCAN
553 extern uschar *malware_name; /* Name of virus or malware ("W32/Klez-H") */
554 #endif
555 extern int max_received_linelength;/* What it says */
556 extern int max_username_length; /* For systems with broken getpwnam() */
557 extern int message_age; /* In seconds */
558 extern uschar *message_body; /* Start of message body for filter */
559 extern uschar *message_body_end; /* End of message body for filter */
560 extern BOOL message_body_newlines; /* FALSE => remove newlines */
561 extern int message_body_size; /* Sic */
562 extern int message_body_visible; /* Amount visible in message_body */
563 extern int message_ended; /* State of message reading and how ended */
564 extern uschar *message_headers; /* When built */
565 extern uschar message_id_option[]; /* -E<message-id> for use as option */
566 extern uschar *message_id_external; /* External form of following */
567 extern uschar *message_id_domain; /* Expanded to form domain-part of message_id */
568 extern uschar *message_id_text; /* Expanded to form message_id */
569 extern struct timeval message_id_tv; /* Time used to create last message_id */
570 extern int message_linecount; /* As it says */
571 extern BOOL message_logs; /* TRUE to write message logs */
572 extern int message_size; /* Size of message */
573 extern uschar *message_size_limit; /* As it says */
574 #ifdef SUPPORT_I18N
575 extern BOOL message_smtputf8; /* Internationalized mail handling */
576 extern int message_utf8_downconvert; /* convert from utf8 */
577 const extern pcre *regex_UTF8; /* For recognizing SMTPUTF8 settings */
578 #endif
579 extern uschar message_subdir[]; /* Subdirectory for messages */
580 extern uschar *message_reference; /* Reference for error messages */
581
582 /* MIME ACL expandables */
583 #ifdef WITH_CONTENT_SCAN
584 extern int mime_anomaly_level;
585 extern const uschar *mime_anomaly_text;
586 extern uschar *mime_boundary;
587 extern uschar *mime_charset;
588 extern uschar *mime_content_description;
589 extern uschar *mime_content_disposition;
590 extern uschar *mime_content_id;
591 extern unsigned int mime_content_size;
592 extern uschar *mime_content_transfer_encoding;
593 extern uschar *mime_content_type;
594 extern uschar *mime_decoded_filename;
595 extern uschar *mime_filename;
596 extern int mime_is_multipart;
597 extern int mime_is_coverletter;
598 extern int mime_is_rfc822;
599 extern int mime_part_count;
600 #endif
601
602 extern BOOL mua_wrapper; /* TRUE when Exim is wrapping an MUA */
603
604 extern uid_t *never_users; /* List of uids never to be used */
605 #ifdef WITH_CONTENT_SCAN
606 extern BOOL no_mbox_unspool; /* don't unlink files in /scan directory */
607 #endif
608 extern BOOL no_multiline_responses; /* For broken clients */
609
610 extern optionlist optionlist_auths[]; /* These option lists are made */
611 extern int optionlist_auths_size; /* global so that readconf can */
612 extern optionlist optionlist_routers[]; /* see them for printing out */
613 extern int optionlist_routers_size; /* the options. */
614 extern optionlist optionlist_transports[];
615 extern int optionlist_transports_size;
616
617 extern uid_t original_euid; /* Original effective uid */
618 extern gid_t originator_gid; /* Gid of whoever wrote spool file */
619 extern uschar *originator_login; /* Login of same */
620 extern uschar *originator_name; /* Full name of same */
621 extern uid_t originator_uid; /* Uid of ditto */
622 extern uschar *override_local_interfaces; /* Value of -oX argument */
623 extern uschar *override_pid_file_path; /* Value of -oP argument */
624
625 extern BOOL parse_allow_group; /* Allow group syntax */
626 extern BOOL parse_found_group; /* In the middle of a group */
627 extern uschar *percent_hack_domains; /* Local domains for which '% operates */
628 extern uschar *pid_file_path; /* For writing daemon pids */
629 extern uschar *pipelining_advertise_hosts; /* As it says */
630 extern BOOL pipelining_enable; /* As it says */
631 #ifndef DISABLE_PRDR
632 extern BOOL prdr_enable; /* As it says */
633 extern BOOL prdr_requested; /* Connecting mail server wants PRDR */
634 #endif
635 extern BOOL preserve_message_logs; /* Save msglog files */
636 extern uschar *primary_hostname; /* Primary name of this computer */
637 extern BOOL print_topbitchars; /* Topbit chars are printing chars */
638 extern uschar process_info[]; /* For SIGUSR1 output */
639 extern int process_info_len;
640 extern uschar *process_log_path; /* Alternate path */
641 extern BOOL prod_requires_admin; /* TRUE if prodding requires admin */
642
643 #if defined(SUPPORT_PROXY) || defined(SUPPORT_SOCKS)
644 extern uschar *hosts_proxy; /* Hostlist which (require) use proxy protocol */
645 extern uschar *proxy_external_address; /* IP of remote interface of proxy */
646 extern int proxy_external_port; /* Port on remote interface of proxy */
647 extern uschar *proxy_local_address; /* IP of local interface of proxy */
648 extern int proxy_local_port; /* Port on local interface of proxy */
649 extern BOOL proxy_session; /* TRUE if receiving mail from valid proxy */
650 extern BOOL proxy_session_failed; /* TRUE if required proxy negotiation failed */
651 #endif
652
653 extern uschar *prvscheck_address; /* Set during prvscheck expansion item */
654 extern uschar *prvscheck_keynum; /* Set during prvscheck expansion item */
655 extern uschar *prvscheck_result; /* Set during prvscheck expansion item */
656
657 extern const uschar *qualify_domain_recipient; /* Domain to qualify recipients with */
658 extern uschar *qualify_domain_sender; /* Domain to qualify senders with */
659 extern BOOL queue_2stage; /* Run queue in 2-stage manner */
660 extern uschar *queue_domains; /* Queue these domains */
661 extern BOOL queue_list_requires_admin; /* TRUE if -bp requires admin */
662 extern BOOL queue_run_first_delivery; /* If TRUE, first deliveries only */
663 extern BOOL queue_run_force; /* TRUE to force during queue run */
664 extern BOOL queue_run_local; /* Local deliveries only in queue run */
665 extern BOOL queue_running; /* TRUE for queue running process and */
666 /* immediate children */
667 extern pid_t queue_run_pid; /* PID of the queue running process or 0 */
668 extern int queue_run_pipe; /* Pipe for synchronizing */
669 extern int queue_interval; /* Queue running interval */
670 extern uschar *queue_name; /* Name of queue, if nondefault spooling */
671 extern BOOL queue_only; /* TRUE to disable immediate delivery */
672 extern int queue_only_load; /* Max load before auto-queue */
673 extern BOOL queue_only_load_latch; /* Latch queue_only_load TRUE */
674 extern uschar *queue_only_file; /* Queue if file exists/not-exists */
675 extern BOOL queue_only_override; /* Allow override from command line */
676 extern BOOL queue_only_policy; /* ACL or local_scan wants queue_only */
677 extern BOOL queue_run_in_order; /* As opposed to random */
678 extern uschar *queue_run_max; /* Max queue runners */
679 extern BOOL queue_smtp; /* Disable all immediate STMP (-odqs)*/
680 extern uschar *queue_smtp_domains; /* Ditto, for these domains */
681
682 extern unsigned int random_seed; /* Seed for random numbers */
683 extern tree_node *ratelimiters_cmd; /* Results of command ratelimit checks */
684 extern tree_node *ratelimiters_conn; /* Results of connection ratelimit checks */
685 extern tree_node *ratelimiters_mail; /* Results of per-mail ratelimit checks */
686 extern uschar *raw_active_hostname; /* Pre-expansion */
687 extern uschar *raw_sender; /* Before rewriting */
688 extern uschar **raw_recipients; /* Before rewriting */
689 extern int raw_recipients_count;
690 extern int rcpt_count; /* Count of RCPT commands in a message */
691 extern int rcpt_fail_count; /* Those that got 5xx */
692 extern int rcpt_defer_count; /* Those that got 4xx */
693 extern gid_t real_gid; /* Real gid */
694 extern uid_t real_uid; /* Real user running program */
695 extern BOOL really_exim; /* FALSE in utilities */
696 extern BOOL receive_call_bombout; /* Flag for crashing log */
697 extern int receive_linecount; /* Mainly for BSMTP errors */
698 extern int receive_messagecount; /* Mainly for BSMTP errors */
699 extern int receive_timeout; /* For non-SMTP acceptance */
700 extern int received_count; /* Count of Received: headers */
701 extern uschar *received_for; /* For "for" field */
702 extern uschar *received_header_text; /* Definition of Received: header */
703 extern int received_headers_max; /* Max count of Received: headers */
704 extern int received_time; /* Time the message was received */
705 extern uschar *recipient_data; /* lookup data for recipients */
706 extern uschar *recipient_unqualified_hosts; /* Permitted unqualified recipients */
707 extern uschar *recipient_verify_failure; /* What went wrong */
708 extern BOOL recipients_discarded; /* By an ACL */
709 extern int recipients_list_max; /* Maximum number fitting in list */
710 extern int recipients_max; /* Max permitted */
711 extern int recipients_max_reject; /* If TRUE, reject whole message */
712 extern const pcre *regex_AUTH; /* For recognizing AUTH settings */
713 extern const pcre *regex_check_dns_names; /* For DNS name checking */
714 extern const pcre *regex_From; /* For recognizing "From_" lines */
715 extern const pcre *regex_IGNOREQUOTA; /* For recognizing IGNOREQUOTA (LMTP) */
716 extern const pcre *regex_PIPELINING; /* For recognizing PIPELINING */
717 extern const pcre *regex_SIZE; /* For recognizing SIZE settings */
718 extern const pcre *regex_ismsgid; /* Compiled r.e. for message it */
719 extern const pcre *regex_smtp_code; /* For recognizing SMTP codes */
720 extern uschar *regex_vars[]; /* $regexN variables */
721 #ifdef WHITELIST_D_MACROS
722 extern const pcre *regex_whitelisted_macro; /* For -D macro values */
723 #endif
724 #ifdef WITH_CONTENT_SCAN
725 extern uschar *regex_match_string; /* regex that matched a line (regex ACL condition) */
726 #endif
727 extern int remote_delivery_count; /* Number of remote addresses */
728 extern int remote_max_parallel; /* Maximum parallel delivery */
729 extern uschar *remote_sort_domains; /* Remote domain sorting order */
730 extern retry_config *retries; /* Chain of retry config information */
731 extern int retry_data_expire; /* When to expire retry data */
732 extern int retry_interval_max; /* Absolute maximum */
733 extern int retry_maximum_timeout; /* The maximum timeout */
734 extern uschar *return_path; /* Return path for a message */
735 extern BOOL return_path_remove; /* Remove return-path headers */
736 extern int rewrite_existflags; /* Indicate which headers have rewrites */
737 extern uschar *rfc1413_hosts; /* RFC hosts */
738 extern int rfc1413_query_timeout; /* Timeout on RFC 1413 calls */
739 /* extern BOOL rfc821_domains; */ /* If set, syntax is 821, not 822 => being abolished */
740 extern uid_t root_gid; /* The gid for root */
741 extern uid_t root_uid; /* The uid for root */
742 extern router_info routers_available[];/* Vector of available routers */
743 extern router_instance *routers; /* Chain of instantiated routers */
744 extern router_instance router_defaults;/* Default values */
745 extern uschar *router_name; /* Name of router last started */
746 extern BOOL running_in_test_harness; /*TRUE when running_status is patched */
747 extern ip_address_item *running_interfaces; /* Host's running interfaces */
748 extern uschar *running_status; /* Flag string for testing */
749 extern int runrc; /* rc from ${run} */
750
751 extern uschar *search_error_message; /* Details of lookup problem */
752 extern BOOL search_find_defer; /* Set TRUE if lookup deferred */
753 extern uschar *self_hostname; /* Self host after routing->directors */
754 extern unsigned int sender_address_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender */
755 extern uschar *sender_address_data; /* address_data from sender verify */
756 extern BOOL sender_address_forced; /* Set by -f */
757 extern uschar *sender_address_unrewritten; /* Set if rewritten by verify */
758 extern uschar *sender_data; /* lookup result for senders */
759 extern unsigned int sender_domain_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender domain */
760 extern uschar *sender_fullhost; /* Sender host name + address */
761 extern BOOL sender_helo_dnssec; /* True if HELO verify used DNS and was DNSSEC */
762 extern uschar *sender_helo_name; /* Host name from HELO/EHLO */
763 extern uschar **sender_host_aliases; /* Points to list of alias names */
764 extern unsigned int sender_host_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for incoming host */
765 extern BOOL sender_host_dnssec; /* true if sender_host_name verified in DNSSEC */
766 extern BOOL sender_host_notsocket; /* Set for -bs and -bS */
767 extern BOOL sender_host_unknown; /* TRUE for -bs and -bS except inetd */
768 extern uschar *sender_ident; /* Sender identity via RFC 1413 */
769 extern BOOL sender_local; /* TRUE for local senders */
770 extern BOOL sender_name_forced; /* Set by -F */
771 extern uschar *sender_rate; /* Sender rate computed by ACL */
772 extern uschar *sender_rate_limit; /* Configured rate limit */
773 extern uschar *sender_rate_period; /* Configured smoothing period */
774 extern uschar *sender_rcvhost; /* Host data for Received: */
775 extern BOOL sender_set_untrusted; /* Sender set by untrusted caller */
776 extern uschar *sender_unqualified_hosts; /* Permitted unqualified senders */
777 extern uschar *sender_verify_failure; /* What went wrong */
778 extern address_item *sender_verified_list; /* Saved chain of sender verifies */
779 extern address_item *sender_verified_failed; /* The one that caused denial */
780 extern uschar *sending_ip_address; /* Address of outgoing (SMTP) interface */
781 extern int sending_port; /* Port of outgoing interface */
782 extern SIGNAL_BOOL sigalrm_seen; /* Flag for sigalrm_handler */
783 extern uschar **sighup_argv; /* Args for re-execing after SIGHUP */
784 extern int slow_lookup_log; /* Log DNS lookups taking loger than N millisecs */
785 extern int smtp_accept_count; /* Count of connections */
786 extern BOOL smtp_accept_keepalive; /* Set keepalive on incoming */
787 extern int smtp_accept_max; /* Max SMTP connections */
788 extern int smtp_accept_max_nonmail;/* Max non-mail commands in one con */
789 extern uschar *smtp_accept_max_nonmail_hosts; /* Limit non-mail cmds from these hosts */
790 extern int smtp_accept_max_per_connection; /* Max msgs per connection */
791 extern uschar *smtp_accept_max_per_host; /* Max SMTP cons from one IP addr */
792 extern int smtp_accept_queue; /* Queue after so many connections */
793 extern int smtp_accept_queue_per_connection; /* Queue after so many msgs */
794 extern int smtp_accept_reserve; /* Reserve these SMTP connections */
795 extern uschar *smtp_active_hostname; /* Hostname for this message */
796 extern BOOL smtp_authenticated; /* Sending client has authenticated */
797 extern uschar *smtp_banner; /* Banner string (to be expanded) */
798 extern BOOL smtp_check_spool_space; /* TRUE to check SMTP SIZE value */
799 extern int smtp_ch_index; /* Index in smtp_connection_had */
800 extern uschar *smtp_cmd_argument; /* For all SMTP commands */
801 extern uschar *smtp_cmd_buffer; /* SMTP command buffer */
802 extern time_t smtp_connection_start; /* Start time of SMTP connection */
803 extern uschar smtp_connection_had[]; /* Recent SMTP commands */
804 extern int smtp_connect_backlog; /* Max backlog permitted */
805 extern double smtp_delay_mail; /* Current MAIL delay */
806 extern double smtp_delay_rcpt; /* Current RCPT delay */
807 extern BOOL smtp_enforce_sync; /* Enforce sync rules */
808 extern uschar *smtp_etrn_command; /* Command to run */
809 extern BOOL smtp_etrn_serialize; /* Only one at once */
810 extern FILE *smtp_in; /* Incoming SMTP input file */
811 extern int smtp_load_reserve; /* Only from reserved if load > this */
812 extern int smtp_mailcmd_count; /* Count of MAIL commands */
813 extern int smtp_max_synprot_errors;/* Max syntax/protocol errors */
814 extern int smtp_max_unknown_commands; /* As it says */
815 extern uschar *smtp_notquit_reason; /* Global for disconnect reason */
816 extern FILE *smtp_out; /* Incoming SMTP output file */
817 extern uschar *smtp_ratelimit_hosts; /* Rate limit these hosts */
818 extern uschar *smtp_ratelimit_mail; /* Parameters for MAIL limiting */
819 extern uschar *smtp_ratelimit_rcpt; /* Parameters for RCPT limiting */
820 extern uschar *smtp_read_error; /* Message for SMTP input error */
821 extern int smtp_receive_timeout; /* Applies to each received line */
822 extern uschar *smtp_receive_timeout_s; /* ... expandable version */
823 extern uschar *smtp_reserve_hosts; /* Hosts for reserved slots */
824 extern BOOL smtp_return_error_details; /* TRUE to return full info */
825 extern int smtp_rlm_base; /* Base interval for MAIL rate limit */
826 extern double smtp_rlm_factor; /* Factor for MAIL rate limit */
827 extern int smtp_rlm_limit; /* Max delay */
828 extern int smtp_rlm_threshold; /* Threshold for RCPT rate limit */
829 extern int smtp_rlr_base; /* Base interval for RCPT rate limit */
830 extern double smtp_rlr_factor; /* Factor for RCPT rate limit */
831 extern int smtp_rlr_limit; /* Max delay */
832 extern int smtp_rlr_threshold; /* Threshold for RCPT rate limit */
833 extern BOOL smtp_use_pipelining; /* Global for passed connections */
834 extern BOOL smtp_use_size; /* Global for passed connections */
835 #ifdef SUPPORT_I18N
836 extern uschar *smtputf8_advertise_hosts; /* ingress control */
837 #endif
838
839 #ifdef WITH_CONTENT_SCAN
840 extern uschar *spamd_address; /* address for the spamassassin daemon */
841 extern uschar *spam_bar; /* the spam "bar" (textual representation of spam_score) */
842 extern uschar *spam_report; /* the spamd report (multiline) */
843 extern uschar *spam_action; /* the spamd recommended-action */
844 extern uschar *spam_score; /* the spam score (float) */
845 extern uschar *spam_score_int; /* spam_score * 10 (int) */
846 #endif
847 #ifdef EXPERIMENTAL_SPF
848 extern uschar *spf_guess; /* spf best-guess record */
849 extern uschar *spf_header_comment; /* spf header comment */
850 extern uschar *spf_received; /* Received-SPF: header */
851 extern uschar *spf_result; /* spf result in string form */
852 extern uschar *spf_smtp_comment; /* spf comment to include in SMTP reply */
853 #endif
854 extern BOOL split_spool_directory; /* TRUE to use multiple subdirs */
855 extern uschar *spool_directory; /* Name of spool directory */
856 #ifdef EXPERIMENTAL_SRS
857 extern uschar *srs_config; /* SRS config secret:max age:hash length:use timestamp:use hash */
858 extern uschar *srs_db_address; /* SRS db address */
859 extern uschar *srs_db_key; /* SRS db key */
860 extern int srs_hashlength; /* SRS hash length */
861 extern int srs_hashmin; /* SRS minimum hash length */
862 extern int srs_maxage; /* SRS max age */
863 extern uschar *srs_orig_sender; /* SRS original sender */
864 extern uschar *srs_orig_recipient; /* SRS original recipient */
865 extern uschar *srs_recipient; /* SRS recipient */
866 extern uschar *srs_secrets; /* SRS secrets list */
867 extern uschar *srs_status; /* SRS staus */
868 extern BOOL srs_usehash; /* SRS use hash flag */
869 extern BOOL srs_usetimestamp; /* SRS use timestamp flag */
870 #endif
871 extern BOOL strict_acl_vars; /* ACL variables have to be set before being used */
872 extern int string_datestamp_offset;/* After insertion by string_format */
873 extern int string_datestamp_length;/* After insertion by string_format */
874 extern int string_datestamp_type; /* After insertion by string_format */
875 extern BOOL strip_excess_angle_brackets; /* Surrounding route-addrs */
876 extern BOOL strip_trailing_dot; /* Remove dots at ends of domains */
877 extern uschar *submission_domain; /* Domain for submission mode */
878 extern BOOL submission_mode; /* Can be forced from ACL */
879 extern uschar *submission_name; /* User name set from ACL */
880 extern BOOL suppress_local_fixups; /* Can be forced from ACL */
881 extern BOOL suppress_local_fixups_default; /* former is reset to this; override with -G */
882 extern BOOL synchronous_delivery; /* TRUE if -odi is set */
883 extern BOOL syslog_duplication; /* FALSE => no duplicate logging */
884 extern int syslog_facility; /* As defined by Syslog.h */
885 extern uschar *syslog_processname; /* 'ident' param to openlog() */
886 extern BOOL syslog_timestamp; /* TRUE if time on syslogs */
887 extern uschar *system_filter; /* Name of system filter file */
888
889 extern uschar *system_filter_directory_transport; /* Transports for the */
890 extern uschar *system_filter_file_transport; /* system filter */
891 extern uschar *system_filter_pipe_transport;
892 extern uschar *system_filter_reply_transport;
893
894 extern gid_t system_filter_gid; /* Gid for running system filter */
895 extern BOOL system_filter_gid_set; /* TRUE if gid set */
896 extern uid_t system_filter_uid; /* Uid for running system filter */
897 extern BOOL system_filter_uid_set; /* TRUE if uid set */
898 extern BOOL system_filtering; /* TRUE when running system filter */
899
900 extern BOOL tcp_nodelay; /* Controls TCP_NODELAY on daemon */
901 #ifdef USE_TCP_WRAPPERS
902 extern uschar *tcp_wrappers_daemon_name; /* tcpwrappers daemon lookup name */
903 #endif
904 extern int test_harness_load_avg; /* For use when testing */
905 extern int thismessage_size_limit; /* Limit for this message */
906 extern int timeout_frozen_after; /* Max time to keep frozen messages */
907 extern BOOL timestamps_utc; /* Use UTC for all times */
908
909 extern uschar *transport_name; /* Name of transport last started */
910 extern int transport_count; /* Count of bytes transported */
911 extern int transport_newlines; /* Accurate count of number of newline chars transported */
912 extern const uschar **transport_filter_argv; /* For on-the-fly filtering */
913 extern int transport_filter_timeout; /* Timeout for same */
914 extern BOOL transport_filter_timed_out; /* True if it did */
915
916 extern transport_info transports_available[]; /* Vector of available transports */
917 extern transport_instance *transports; /* Chain of instantiated transports */
918 extern transport_instance transport_defaults; /* Default values */
919
920 extern int transport_write_timeout;/* Set to time out individual writes */
921
922 extern tree_node *tree_dns_fails; /* Tree of DNS lookup failures */
923 extern tree_node *tree_duplicates; /* Tree of duplicate addresses */
924 extern tree_node *tree_nonrecipients; /* Tree of nonrecipient addresses */
925 extern tree_node *tree_unusable; /* Tree of unusable addresses */
926
927 extern BOOL trusted_caller; /* Caller is trusted */
928 extern BOOL trusted_config; /* Configuration file is trusted */
929 extern gid_t *trusted_groups; /* List of trusted groups */
930 extern uid_t *trusted_users; /* List of trusted users */
931 extern uschar *timezone_string; /* Required timezone setting */
932
933 extern uschar *unknown_login; /* To use when login id unknown */
934 extern uschar *unknown_username; /* Ditto */
935 extern uschar *untrusted_set_sender; /* Let untrusted users set these senders */
936 extern uschar *uucp_from_pattern; /* For recognizing "From " lines */
937 extern uschar *uucp_from_sender; /* For building the sender */
938
939 extern uschar *warn_message_file; /* Template for warning messages */
940 extern uschar *warnmsg_delay; /* String form of delay time */
941 extern uschar *warnmsg_recipients; /* Recipients of warning message */
942 extern BOOL write_rejectlog; /* Control of reject logging */
943
944 extern uschar *verify_mode; /* Running a router in verify mode */
945 extern uschar *version_copyright; /* Copyright notice */
946 extern uschar *version_date; /* Date of compilation */
947 extern uschar *version_cnumber; /* Compile number */
948 extern uschar *version_string; /* Version string */
949
950 extern int warning_count; /* Delay warnings sent for this msg */
951
952 /* End of globals.h */