1 /******************************************************************************/
2 /* pfixtools: a collection of postfix related tools */
4 /* ________________________________________________________________________ */
6 /* Redistribution and use in source and binary forms, with or without */
7 /* modification, are permitted provided that the following conditions */
10 /* 1. Redistributions of source code must retain the above copyright */
11 /* notice, this list of conditions and the following disclaimer. */
12 /* 2. Redistributions in binary form must reproduce the above copyright */
13 /* notice, this list of conditions and the following disclaimer in the */
14 /* documentation and/or other materials provided with the distribution. */
15 /* 3. The names of its contributors may not be used to endorse or promote */
16 /* products derived from this software without specific prior written */
19 /* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND */
20 /* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE */
21 /* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR */
22 /* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS */
23 /* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR */
24 /* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF */
25 /* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS */
26 /* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN */
27 /* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) */
28 /* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF */
29 /* THE POSSIBILITY OF SUCH DAMAGE. */
30 /******************************************************************************/
33 * Copyright © 2007 Pierre Habouzit
34 * Copyright © 2008 Florent Bruneau
38 #include "policy_tokens.h"
41 const static_str_t smtp_state_names[SMTP_count] = {
47 { "END-OF-MESSAGE", 14 },
52 static const static_str_t static_ESMTP = { "ESMTP", 5 };
53 static const static_str_t static_SMTP = { "SMTP", 4 };
55 bool query_parse(query_t *query, char *p)
57 #define PARSE_CHECK(expr, error, ...) \
60 err(error, ##__VA_ARGS__); \
66 query->state = SMTP_UNKNOWN;
73 p = strchr(k = p, '=');
74 PARSE_CHECK(p, "could not find '=' in line");
75 for (klen = p - k; klen && isblank(k[klen]); klen--);
80 p = strchr(v = p, '\n');
81 PARSE_CHECK(p, "could not find final \\n in line");
82 for (vlen = p - v; vlen && isblank(v[vlen]); vlen--);
85 vtk = policy_tokenize(v, vlen);
86 switch (policy_tokenize(k, klen)) {
87 #define CASE(up, low) case PTK_##up: query->low.str = v; query->low.len = vlen; v[vlen] = '\0'; break;
88 CASE(HELO_NAME, helo_name);
89 CASE(QUEUE_ID, queue_id);
90 CASE(RECIPIENT_COUNT, recipient_count);
91 CASE(CLIENT_ADDRESS, client_address);
92 CASE(CLIENT_NAME, client_name);
93 CASE(REVERSE_CLIENT_NAME, reverse_client_name);
94 CASE(INSTANCE, instance);
95 CASE(SASL_METHOD, sasl_method);
96 CASE(SASL_USERNAME, sasl_username);
97 CASE(SASL_SENDER, sasl_sender);
99 CASE(CCERT_SUBJECT, ccert_subject);
100 CASE(CCERT_ISSUER, ccert_issuer);
101 CASE(CCERT_FINGERPRINT, ccert_fingerprint);
102 CASE(ENCRYPTION_PROTOCOL, encryption_protocol);
103 CASE(ENCRYPTION_CIPHER, encryption_cipher);
104 CASE(ENCRYPTION_KEYSIZE, encryption_keysize);
105 CASE(ETRN_DOMAIN, etrn_domain);
106 CASE(STRESS, stress);
110 query->sender.str = v;
111 query->sender.len = vlen;
113 query->sender_domain.str = memchr(query->sender.str, '@', vlen);
114 if (query->sender_domain.str != NULL) {
115 ++query->sender_domain.str;
116 query->sender_domain.len = query->sender.len
117 - (query->sender_domain.str - query->sender.str);
122 query->recipient.str = v;
123 query->recipient.len = vlen;
125 query->recipient_domain.str = memchr(query->recipient.str, '@', vlen);
126 if (query->recipient_domain.str != NULL) {
127 ++query->recipient_domain.str;
128 query->recipient_domain.len = query->recipient.len
129 - (query->recipient_domain.str - query->recipient.str);
135 PARSE_CHECK(vtk == PTK_SMTPD_ACCESS_POLICY,
136 "unexpected `request' value: %.*s", vlen, v);
139 case PTK_PROTOCOL_NAME:
140 PARSE_CHECK(vtk == PTK_SMTP || vtk == PTK_ESMTP,
141 "unexpected `protocol_name' value: %.*s", vlen, v);
142 query->esmtp = vtk == PTK_ESMTP;
145 case PTK_PROTOCOL_STATE:
147 #define CASE(name) case PTK_##name: query->state = SMTP_##name; break;
154 CASE(END_OF_MESSAGE);
158 PARSE_CHECK(false, "unexpected `protocol_state` value: %.*s",
165 warn("unexpected key, skipped: %.*s", klen, k);
170 return query->state != SMTP_UNKNOWN;
174 const static_str_t *query_field_for_id(const query_t *query, postlicyd_token id)
177 #define CASE(Up, Low) \
178 case PTK_ ## Up: return &query->Low;
179 CASE(HELO_NAME, helo_name)
180 CASE(QUEUE_ID, queue_id)
182 CASE(SENDER_DOMAIN, sender_domain)
183 CASE(RECIPIENT, recipient)
184 CASE(RECIPIENT_DOMAIN, recipient_domain)
185 CASE(RECIPIENT_COUNT, recipient_count)
186 CASE(CLIENT_ADDRESS, client_address)
187 CASE(CLIENT_NAME, client_name)
188 CASE(REVERSE_CLIENT_NAME, reverse_client_name)
189 CASE(INSTANCE, instance)
190 CASE(SASL_METHOD, sasl_method)
191 CASE(SASL_USERNAME, sasl_username)
192 CASE(SASL_SENDER, sasl_sender)
194 CASE(CCERT_SUBJECT, ccert_subject)
195 CASE(CCERT_ISSUER, ccert_issuer)
196 CASE(CCERT_FINGERPRINT, ccert_fingerprint)
197 CASE(ENCRYPTION_PROTOCOL, encryption_protocol)
198 CASE(ENCRYPTION_CIPHER, encryption_cipher)
199 CASE(ENCRYPTION_KEYSIZE, encryption_keysize)
200 CASE(ETRN_DOMAIN, etrn_domain)
203 case PTK_PROTOCOL_NAME:
204 return query->esmtp ? &static_ESMTP : &static_SMTP;
206 case PTK_PROTOCOL_STATE:
207 return &smtp_state_names[query->state];
209 default: return NULL;
213 const static_str_t *query_field_for_name(const query_t *query, const char *name)
215 postlicyd_token id = policy_tokenize(name, strlen(name));
216 if (id == PTK_UNKNOWN) {
217 warn("unknown query field %s", name);
220 return query_field_for_id(query, id);
223 ssize_t query_format(char *dest, size_t len, const char *fmt, const query_t *query)
228 #define WRITE(Src, Len) \
230 size_t __len = (Len); \
231 if (written < len) { \
232 size_t __to_write = MIN(len - written - 1, __len); \
233 memcpy(dest + written, (Src), __to_write); \
234 written += __to_write; \
238 while (*fmt != '\0') {
239 const char *next_format = strchr(fmt, '$');
240 while (next_format != NULL && next_format[1] != '{') {
241 next_format = strchr(next_format + 1, '$');
243 if (next_format == NULL) {
244 next_format = fmt + m_strlen(fmt);
246 WRITE(fmt, next_format - fmt);
250 next_format = strchr(fmt, '}');
251 if (next_format == NULL) {
255 postlicyd_token tok = policy_tokenize(fmt, next_format - fmt);
256 if (tok == PTK_UNKNOWN) {
257 warn("unknown field name \"%.*s\"", (int)(next_format - fmt), fmt);
259 const static_str_t *field = query == NULL ? NULL
260 : query_field_for_id(query, tok);
264 WRITE(field->str, field->len);
266 fmt = next_format + 1;
270 if (written > 0 && len > 0) {
271 dest[written] = '\0';
276 bool query_format_buffer(buffer_t *buf, const char *fmt, const query_t *query)
278 buffer_ensure(buf, m_strlen(fmt) + 64);
280 ssize_t size = array_free_space(*buf);
281 ssize_t format_size = query_format(array_end(*buf),
283 if (format_size == -1) {
285 } else if (format_size > size) {
286 buffer_ensure(buf, format_size + 1);
287 query_format(array_end(*buf),
288 array_free_space(*buf),
290 array_len(*buf) += format_size;
292 array_len(*buf) += format_size;