/[imapfilter]/imapfilter/file.c
ViewVC logotype

Annotation of /imapfilter/file.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.39 - (hide annotations)
Sat Jul 13 21:19:52 2002 UTC (21 years, 8 months ago) by lefcha
Branch: MAIN
Changes since 1.38: +4 -2 lines
File MIME type: text/plain
Added action flag.

1 lefcha 1.1 #include <stdio.h>
2 lefcha 1.28 #include <unistd.h>
3 lefcha 1.1 #include <errno.h>
4 lefcha 1.5 #include <sys/types.h>
5 lefcha 1.1 #include <regex.h>
6     #include <string.h>
7     #include <stdlib.h>
8     #include <limits.h>
9 lefcha 1.10 #include <sys/stat.h>
10 lefcha 1.28 #include <fcntl.h>
11 lefcha 1.29 #include <time.h>
12 lefcha 1.1
13     #include "config.h"
14     #include "imapfilter.h"
15 lefcha 1.13 #include "data.h"
16 lefcha 1.1
17    
18 lefcha 1.6 extern char logfile[PATH_MAX];
19 lefcha 1.11 extern unsigned int options;
20 lefcha 1.34 extern unsigned int flags;
21     extern unsigned int interval;
22 lefcha 1.28 extern long timeout;
23 lefcha 1.29 extern char *home;
24    
25     #ifdef ENCRYPTED_PASSWORDS
26 lefcha 1.38 char *passphr; /* Master password to access the passwords
27     file. */
28 lefcha 1.28 #endif
29 lefcha 1.27
30 lefcha 1.1
31     /*
32 lefcha 1.13 * Find the path to configuration file, open it and call parse_config().
33 lefcha 1.1 */
34     int read_config(char *cfg)
35     {
36     int r;
37 lefcha 1.29 FILE *fd;
38 lefcha 1.23 char *c = NULL;
39 lefcha 1.24
40 lefcha 1.1 if (!cfg) {
41 lefcha 1.38 cfg = c = (char *)xmalloc(PATH_MAX * sizeof(char));
42 lefcha 1.1 snprintf(cfg, PATH_MAX, "%s/%s", home, ".imapfilterrc");
43     }
44     #ifdef DEBUG
45 lefcha 1.11 printf("debug: configuration file: '%s'\n", cfg);
46 lefcha 1.1 #endif
47 lefcha 1.13 #ifdef CHECK_PERMISSIONS
48 lefcha 1.28 check_file_perms(cfg, S_IRUSR | S_IWUSR);
49 lefcha 1.12 #endif
50 lefcha 1.29 fd = fopen(cfg, "r");
51 lefcha 1.1
52 lefcha 1.29 if (!fd)
53 lefcha 1.17 fatal(ERROR_FILE_OPEN, "imapfilter: opening config file %s; %s\n",
54 lefcha 1.11 cfg, strerror(errno));
55 lefcha 1.1
56 lefcha 1.23 if (c)
57 lefcha 1.29 xfree(c);
58 lefcha 1.23
59 lefcha 1.29 if ((r = parse_config(fd)))
60 lefcha 1.17 fatal(ERROR_CONFIG_PARSE,
61     "imapfilter: parse error in config file at row %d\n", r);
62 lefcha 1.1
63 lefcha 1.29 fclose(fd);
64 lefcha 1.1
65 lefcha 1.11 #ifdef DEBUG
66     printf("debug: options: %0#10x\n", options);
67     #endif
68    
69 lefcha 1.17 return 0;
70 lefcha 1.1 }
71    
72 lefcha 1.6
73 lefcha 1.10 /*
74 lefcha 1.13 * Parse configuration file.
75 lefcha 1.1 */
76 lefcha 1.29 int parse_config(FILE * fd)
77 lefcha 1.1 {
78 lefcha 1.17 int i, r = 0;
79 lefcha 1.1 unsigned int row = 0;
80     char line[LINE_MAX];
81 lefcha 1.27 regex_t creg[13];
82 lefcha 1.39 regmatch_t match[11];
83 lefcha 1.27 const char *reg[13] = {
84 lefcha 1.15 "^([[:blank:]]*\n|#.*\n)$",
85 lefcha 1.36
86     "^[[:blank:]]*ACCOUNT[[:blank:]]+([[:alnum:]_-]+)[[:blank:]]+"
87     "(([[:graph:]]+):([[:graph:]]*)|([[:graph:]]+))@([[:alnum:].-]+)"
88     "(:[[:digit:]]+)?[[:blank:]]*([[:blank:]]SSL|[[:blank:]]SSL2|"
89     "[[:blank:]]SSL3|[[:blank:]]TLS1)?[[:blank:]]*\n$",
90    
91     "^[[:blank:]]*FOLDER[[:blank:]]+([[:alnum:]_-]+)[[:blank:]]+"
92     "([[:print:]]+)[[:blank:]]*\n$",
93    
94     "^[[:blank:]]*FILTER[[:blank:]]+([[:alnum:]_-]+)[[:blank:]]*"
95     "([[:blank:]]OR|[[:blank:]]AND)?[[:blank:]]*\n$",
96    
97     "^[[:blank:]]*ACTION[[:blank:]]+(DELETE|"
98     "COPY[[:blank:]]+(\"[[:print:]]*\"|[[:graph:]]+)|"
99     "MOVE[[:blank:]]+(\"[[:print:]]*\"|[[:graph:]]+)|"
100     "RCOPY[[:blank:]]+([[:alnum:]_-]+)[[:blank:]]+"
101     "(\"[[:print:]]*\"|[[:graph:]]+)|"
102     "RMOVE[[:blank:]]+([[:alnum:]_-]+)[[:blank:]]+"
103     "(\"[[:print:]]*\"|[[:graph:]]+)|"
104 lefcha 1.39 "FLAG[[:blank:]]+(REPLACE|ADD|REMOVE)[[:blank:]]+"
105     "([[:alpha:],]+)|"
106 lefcha 1.36 "LIST)[[:blank:]]*([[:graph:]]*)[[:blank:]]*\n$",
107    
108     "^[[:blank:]]*(MASK[[:blank:]])?[[:blank:]]*(OR[[:blank:]]|"
109     "AND[[:blank:]])?[[:blank:]]*(NOT[[:blank:]])?[[:blank:]]*"
110     "(ANSWERED|DELETED|DRAFT|FLAGGED|NEW|OLD|RECENT|SEEN|UNANSWERED|"
111     "UNDELETED|UNDRAFT|UNFLAGGED|UNSEEN)[[:blank:]]*\n$",
112    
113     "^[[:blank:]]*(MASK[[:blank:]])?[[:blank:]]*(OR[[:blank:]]|"
114     "AND[[:blank:]])?[[:blank:]]*(NOT[[:blank:]])?[[:blank:]]*"
115     "(BCC|BODY|CC|FROM|SUBJECT|TEXT|TO)[[:blank:]]+(\"[[:print:]]*\"|"
116     "[[:graph:]]+)[[:blank:]]*\n$",
117    
118     "^[[:blank:]]*(MASK[[:blank:]])?[[:blank:]]*(OR[[:blank:]]|"
119     "AND[[:blank:]])?[[:blank:]]*(NOT[[:blank:]])?[[:blank:]]*"
120     "(HEADER)[[:blank:]]+(\"[[:print:]]*\"|[[:graph:]]+)[[:blank:]]+"
121     "(\"[[:print:]]*\"|[[:graph:]]+)[[:blank:]]*\n$",
122    
123     "^[[:blank:]]*(MASK[[:blank:]])?[[:blank:]]*(OR[[:blank:]]|"
124     "AND[[:blank:]])?[[:blank:]]*(NOT[[:blank:]])?[[:blank:]]*"
125     "(LARGER|SMALLER|OLDER|NEWER)[[:blank:]]+([[:digit:]]+)"
126     "[[:blank:]]*\n$",
127    
128     "^[[:blank:]]*JOB[[:blank:]]+([[:alnum:],_-]+)[[:blank:]]+"
129     "([[:alnum:],_-]+)[[:blank:]]*\n$",
130    
131     "^[[:blank:]]*(SET[[:blank:]])?[[:blank:]]*(LOGFILE)"
132     "[[:blank:]]*=[[:blank:]]*([[:print:]]+)\n$",
133    
134 lefcha 1.38 "^[[:blank:]]*(SET[[:blank:]])?[[:blank:]]*(HEADERS|NAMESPACE|EXPUNGE)"
135 lefcha 1.36 "[[:blank:]]*=[[:blank:]]*(YES|NO)[[:blank:]]*\n$",
136    
137     "^[[:blank:]]*(SET[[:blank:]])?[[:blank:]]*(DAEMON|TIMEOUT)"
138     "[[:blank:]]*=[[:blank:]]*([[:digit:]]+)\n$"
139 lefcha 1.1 };
140    
141 lefcha 1.27 for (i = 0; i < 13; i++)
142 lefcha 1.14 regcomp(&creg[i], reg[i], REG_EXTENDED | REG_ICASE);
143 lefcha 1.1
144 lefcha 1.29 while (fgets(line, LINE_MAX - 1, fd)) {
145 lefcha 1.1 row++;
146 lefcha 1.15 if (!regexec(&creg[0], line, 0, match, 0))
147     continue;
148 lefcha 1.36 else if (!regexec(&creg[1], line, 9, match, 0))
149 lefcha 1.13 set_account(line, match);
150 lefcha 1.15 else if (!regexec(&creg[2], line, 3, match, 0))
151 lefcha 1.17 r = set_mboxgrp(line, match);
152 lefcha 1.15 else if (!regexec(&creg[3], line, 3, match, 0))
153 lefcha 1.17 r = set_filter(line, match);
154 lefcha 1.39 else if (!regexec(&creg[4], line, 11, match, 0))
155 lefcha 1.17 r = set_action(line, match);
156 lefcha 1.15 else if (!regexec(&creg[5], line, 7, match, 0) ||
157 lefcha 1.18 !regexec(&creg[6], line, 7, match, 0) ||
158     !regexec(&creg[7], line, 7, match, 0) ||
159     !regexec(&creg[8], line, 7, match, 0))
160 lefcha 1.17 r = set_mask(line, match);
161 lefcha 1.15 else if (!regexec(&creg[9], line, 3, match, 0))
162 lefcha 1.17 r = set_job(line, match);
163 lefcha 1.26 else if (!regexec(&creg[10], line, 4, match, 0) ||
164 lefcha 1.27 !regexec(&creg[11], line, 4, match, 0) ||
165     !regexec(&creg[12], line, 4, match, 0))
166 lefcha 1.15 set_options(line, match);
167 lefcha 1.17 else
168 lefcha 1.18 return row;
169    
170 lefcha 1.17 if (r == ERROR_CONFIG_PARSE)
171     return row;
172 lefcha 1.1 }
173 lefcha 1.3
174 lefcha 1.27 for (i = 0; i < 13; i++)
175 lefcha 1.12 regfree(&creg[i]);
176 lefcha 1.18
177 lefcha 1.15 destroy_data();
178 lefcha 1.6
179 lefcha 1.8 return 0;
180 lefcha 1.1 }
181    
182    
183     /*
184 lefcha 1.13 * Set other options found in config file.
185 lefcha 1.11 */
186     void set_options(char *line, regmatch_t * match)
187     {
188 lefcha 1.26 if (!strncasecmp(line + match[2].rm_so, "logfile", 7)) {
189 lefcha 1.19 if (!*logfile)
190 lefcha 1.26 strncat(logfile, line + match[3].rm_so,
191     min((match[3].rm_eo - match[3].rm_so), PATH_MAX - 1));
192 lefcha 1.27 } else if (!strncasecmp(line + match[2].rm_so, "header", 6)) {
193 lefcha 1.26 if (!strncasecmp(line + match[3].rm_so, "yes", 3))
194 lefcha 1.19 options |= OPTION_HEADERS;
195 lefcha 1.25 else
196     options &= ~(OPTION_HEADERS);
197 lefcha 1.28 } else if (!strncasecmp(line + match[2].rm_so, "namespace", 9)) {
198     if (!strncasecmp(line + match[3].rm_so, "yes", 3))
199     options |= OPTION_NAMESPACE;
200     else
201     options &= ~(OPTION_NAMESPACE);
202 lefcha 1.38 } else if (!strncasecmp(line + match[2].rm_so, "expunge", 7)) {
203     if (!strncasecmp(line + match[3].rm_so, "yes", 3))
204     options |= OPTION_EXPUNGE;
205     else
206     options &= ~(OPTION_EXPUNGE);
207 lefcha 1.27 } else if (!strncasecmp(line + match[2].rm_so, "timeout", 7)) {
208     errno = 0;
209     timeout = strtol(line + match[3].rm_so, NULL, 10);
210     if (errno)
211     timeout = 0;
212 lefcha 1.38 } else if (!strncasecmp(line + match[2].rm_so, "daemon", 6) &&
213 lefcha 1.34 !(options & OPTION_DAEMON_MODE)) {
214     options |= OPTION_DAEMON_MODE;
215     errno = 0;
216     interval = strtoul(line + match[3].rm_so, NULL, 10);
217     if (errno)
218     interval = 0;
219 lefcha 1.19 }
220 lefcha 1.1 }
221 lefcha 1.29
222    
223     #ifdef ENCRYPTED_PASSWORDS
224     /*
225     * Open password file and call parse_passwords().
226     */
227     int read_passwords(void)
228     {
229     FILE *fd;
230     char pwfile[PATH_MAX];
231 lefcha 1.38
232 lefcha 1.34 if (!(flags & FLAG_BLANK_PASSWORD))
233 lefcha 1.36 return ERROR_CONFIG_PARSE;
234 lefcha 1.38
235     passphr = (char *)smalloc(PASSPHRASE_LEN);
236 lefcha 1.37 *passphr = 0;
237 lefcha 1.29
238     snprintf(pwfile, PATH_MAX, "%s/%s", home, ".imapfilter/passwords");
239     #ifdef DEBUG
240     printf("debug: passwords file: '%s'\n", pwfile);
241     #endif
242 lefcha 1.38
243 lefcha 1.29 if (!exists_file(pwfile))
244 lefcha 1.36 return ERROR_FILE_OPEN;
245 lefcha 1.38
246 lefcha 1.29 #ifdef CHECK_PERMISSIONS
247     check_file_perms(pwfile, S_IRUSR | S_IWUSR);
248     #endif
249    
250     fd = fopen(pwfile, "r");
251    
252     if (!fd)
253     fatal(ERROR_FILE_OPEN, "imapfilter: opening passwords file %s; %s\n",
254     pwfile, strerror(errno));
255    
256     parse_passwords(fd);
257    
258     fclose(fd);
259    
260     return 0;
261     }
262    
263    
264     /*
265     * Parse unencrypted password file.
266     */
267     int parse_passwords(FILE * fd)
268     {
269     int t = 3;
270     char *pe = NULL;
271     char user[USERNAME_LEN], serv[SERVER_LEN];
272     unsigned char *buf;
273     char *c, *cp, *line;
274     regex_t creg;
275     regmatch_t match[4];
276     const char *reg = "([[:alnum:].-]+) ([[:graph:]]+) ([[:graph:]]+)";
277 lefcha 1.36 int r;
278 lefcha 1.29
279     do {
280 lefcha 1.36 fseek(fd, 0L, SEEK_SET);
281 lefcha 1.29 printf("Enter master passphrase: ");
282     get_password(passphr, PASSPHRASE_LEN);
283 lefcha 1.36 } while ((r = decrypt_passwords(&buf, fd)) && --t);
284 lefcha 1.38
285 lefcha 1.29 if (!t)
286     return ERROR_PASSPHRASE;
287    
288 lefcha 1.31 c = cp = sstrdup(buf);
289 lefcha 1.38
290 lefcha 1.29 regcomp(&creg, reg, REG_EXTENDED | REG_ICASE);
291    
292     while ((line = strsep(&c, "\n")) &&
293     !regexec(&creg, line, 4, match, 0)) {
294     user[0] = serv[0] = 0;
295 lefcha 1.38
296 lefcha 1.29 strncat(serv, line + match[1].rm_so,
297     min(match[1].rm_eo - match[1].rm_so, SERVER_LEN - 1));
298     strncat(user, line + match[2].rm_so,
299     min(match[2].rm_eo - match[2].rm_so, USERNAME_LEN - 1));
300 lefcha 1.38
301     if ((pe = (char *)find_password(user, serv)))
302 lefcha 1.29 strncat(pe, line + match[3].rm_so,
303     min(match[3].rm_eo - match[3].rm_so, PASSWORD_LEN - 1));
304     }
305 lefcha 1.38
306 lefcha 1.29 regfree(&creg);
307 lefcha 1.38 sfree(cp);
308 lefcha 1.31 sfree(buf);
309 lefcha 1.29
310     return 0;
311     }
312    
313    
314     /*
315     * Store encrypted passwords to file.
316     */
317     int store_passwords(account_t * accts[])
318     {
319     char pwfile[PATH_MAX];
320     FILE *fd;
321    
322     snprintf(pwfile, PATH_MAX, "%s/%s", home, ".imapfilter/passwords");
323 lefcha 1.38
324 lefcha 1.32 create_file(pwfile, S_IRUSR | S_IWUSR);
325 lefcha 1.29
326     fd = fopen(pwfile, "w");
327    
328     if (!fd)
329     fatal(ERROR_FILE_OPEN, "imapfilter: opening passwords file %s; %s\n",
330     pwfile, strerror(errno));
331 lefcha 1.38
332 lefcha 1.29 encrypt_passwords(fd, accts);
333 lefcha 1.38
334 lefcha 1.29 fclose(fd);
335    
336     return 0;
337     }
338 lefcha 1.38
339 lefcha 1.29 #endif
340 lefcha 1.31
341    
342     /*
343     * Create $HOME/.imapfilter directory.
344     */
345     int create_homedir(void)
346     {
347 lefcha 1.33 char *hdn = ".imapfilter";
348 lefcha 1.38
349 lefcha 1.31 if (home)
350     if (chdir(home))
351     error("imapfilter: could not change directory; %s\n",
352     strerror(errno));
353    
354 lefcha 1.36 if (!exists_dir(hdn))
355     if (mkdir(hdn, S_IRUSR | S_IWUSR | S_IXUSR))
356     error("imapfilter: could not create directory %s; %s\n", hdn,
357     strerror(errno));
358    
359 lefcha 1.31 return 0;
360     }
361    
362    
363     /*
364     * Check if a file exists.
365     */
366     int exists_file(char *fname)
367     {
368     struct stat fs;
369 lefcha 1.38
370 lefcha 1.31 if (access(fname, F_OK))
371     return 0;
372 lefcha 1.38
373 lefcha 1.31 stat(fname, &fs);
374     if (!S_ISREG(fs.st_mode)) {
375     error("imapfilter: file %s not a regular file\n", fname);
376     return ERROR_FILE_OPEN;
377     }
378     return 1;
379     }
380    
381    
382 lefcha 1.38 /*
383 lefcha 1.31 * Check if a directory exists.
384     */
385     int exists_dir(char *dname)
386     {
387     struct stat ds;
388 lefcha 1.38
389 lefcha 1.31 if (access(dname, F_OK))
390     return 0;
391 lefcha 1.38
392 lefcha 1.31 stat(dname, &ds);
393     if (!S_ISDIR(ds.st_mode)) {
394     error("imapfilter: file %s not a directory\n", dname);
395     return ERROR_FILE_OPEN;
396     }
397     return 1;
398     }
399    
400    
401     /*
402 lefcha 1.36 * Create a file with the specified permissions.
403 lefcha 1.31 */
404     int create_file(char *fname, mode_t mode)
405     {
406     int fd = 0;
407 lefcha 1.38
408 lefcha 1.33 if (!exists_file(fname)) {
409     fd = open(fname, O_CREAT | O_WRONLY | O_TRUNC, mode);
410 lefcha 1.31 if (fd == -1) {
411     error("imapfilter: could not create file %s; %s\n", fname,
412     strerror(errno));
413     return ERROR_FILE_OPEN;
414     }
415     close(fd);
416 lefcha 1.33 }
417 lefcha 1.31 return 0;
418     }
419    
420    
421     #ifdef CHECK_PERMISSIONS
422     /*
423     * Check the permissions of a file.
424     */
425     int check_file_perms(char *fname, mode_t mode)
426     {
427     struct stat fs;
428 lefcha 1.38
429 lefcha 1.31 if (stat(fname, &fs)) {
430     error("imapfilter: getting file %s status; %s\n", fname,
431     strerror(errno));
432     return ERROR_TRIVIAL;
433     }
434     if (!S_ISREG(fs.st_mode)) {
435     error("imapfilter: file %s not a regular file\n", fname);
436     return ERROR_TRIVIAL;
437     }
438     if ((fs.st_mode & 00777) != mode) {
439     error("imapfilter: warning: improper file %s permissions\n"
440     "imapfilter: warning: file's mode should be %o not %o\n",
441     fname, mode, fs.st_mode & 00777);
442     return ERROR_TRIVIAL;
443     }
444     return 0;
445     }
446    
447    
448     /*
449     * Check the permissions of a directory.
450     */
451     int check_dir_perms(char *dname, mode_t mode)
452     {
453     struct stat ds;
454    
455     if (stat(dname, &ds)) {
456     error("imapfilter: getting file %s status; %s\n", dname,
457     strerror(errno));
458     return ERROR_TRIVIAL;
459     }
460     if (!S_ISDIR(ds.st_mode)) {
461     error("imapfilter: file %s not a directory\n", dname);
462     return ERROR_TRIVIAL;
463     }
464     if ((ds.st_mode & 00777) != mode) {
465     error("imapfilter: warning: improper dir %s permissions\n"
466     "imapfilter: warning: file's mode should be %o not %o\n",
467     dname, mode, ds.st_mode & 00777);
468     return ERROR_TRIVIAL;
469     }
470     return 0;
471     }
472 lefcha 1.38
473 lefcha 1.31 #endif

webmaster@linux.gr
ViewVC Help
Powered by ViewVC 1.1.26