3 * rcfile_y.y -- Run control file parser for fetchmail
5 * For license terms, see the file COPYING in this directory.
10 #include <sys/types.h>
12 #if defined(HAVE_SYS_WAIT_H)
17 #if defined(STDC_HEADERS)
20 #if defined(HAVE_UNISTD_H)
26 #include <net/security.h>
27 #endif /* NET_SECURITY */
29 #include "fetchmail.h"
32 /* parser reads these */
33 char *rcfile; /* path name of rc file */
34 struct query cmd_opts; /* where to put command-line info */
36 /* parser sets these */
37 struct query *querylist; /* head of server list (globally visible) */
39 int yydebug; /* in case we didn't generate with -- debug */
41 static struct query current; /* current server record */
42 static int prc_errflag;
43 static struct hostdata *leadentry;
46 static void record_current(void);
47 static void user_reset(void);
48 static void reset_server(const char *name, int skip);
50 /* using Bison, this arranges that yydebug messages will show actual tokens */
52 #define YYPRINT(fp, type, val) fprintf(fp, " = \"%s\"", yytext)
61 %token DEFAULTS POLL SKIP VIA AKA LOCALDOMAINS PROTOCOL
62 %token PREAUTHENTICATE TIMEOUT KPOP SDPS KERBEROS4 KERBEROS5 KERBEROS SSH
63 %token ENVELOPE QVIRTUAL USERNAME PASSWORD FOLDER SMTPHOST MDA BSMTP LMTP
64 %token SMTPADDRESS SMTPNAME SPAMRESPONSE PRECONNECT POSTCONNECT LIMIT WARNINGS
65 %token NETSEC INTERFACE MONITOR PLUGIN PLUGOUT
66 %token IS HERE THERE TO MAP WILDCARD
67 %token BATCHLIMIT FETCHLIMIT EXPUNGE PROPERTIES
68 %token SET LOGFILE DAEMON SYSLOG IDFILE INVISIBLE POSTMASTER BOUNCEMAIL SHOWDOTS
71 %token <number> NUMBER
72 %token NO KEEP FLUSH FETCHALL REWRITE FORCECR STRIPCR PASS8BITS
73 %token DROPSTATUS DROPDELIVERED
74 %token DNS SERVICE PORT UIDL INTERVAL MIMEDECODE IDLE CHECKALIAS
75 %token SSL SSLKEY SSLCERT
84 statement_list : statement
85 | statement_list statement
88 optmap : MAP | /* EMPTY */;
90 /* future global options should also have the form SET <name> optmap <value> */
91 statement : SET LOGFILE optmap STRING {run.logfile = xstrdup($4);}
92 | SET IDFILE optmap STRING {run.idfile = xstrdup($4);}
93 | SET DAEMON optmap NUMBER {run.poll_interval = $4;}
94 | SET POSTMASTER optmap STRING {run.postmaster = xstrdup($4);}
95 | SET BOUNCEMAIL {run.bouncemail = TRUE;}
96 | SET NO BOUNCEMAIL {run.bouncemail = FALSE;}
97 | SET PROPERTIES optmap STRING {run.properties =xstrdup($4);}
98 | SET SYSLOG {run.use_syslog = TRUE;}
99 | SET INVISIBLE {run.invisible = TRUE;}
100 | SET SHOWDOTS {run.showdots = TRUE;}
103 * The way the next two productions are written depends on the fact that
104 * userspecs cannot be empty. It's a kluge to deal with files that set
105 * up a load of defaults and then have poll statements following with no
106 * user options at all.
108 | define_server serverspecs {record_current();}
109 | define_server serverspecs userspecs
111 /* detect and complain about the most common user error */
112 | define_server serverspecs userspecs serv_option
113 {yyerror(_("server option after user options"));}
116 define_server : POLL STRING {reset_server($2, FALSE);}
117 | SKIP STRING {reset_server($2, TRUE);}
118 | DEFAULTS {reset_server("defaults", FALSE);}
121 serverspecs : /* EMPTY */
122 | serverspecs serv_option
125 alias_list : STRING {save_str(¤t.server.akalist,$1,0);}
126 | alias_list STRING {save_str(¤t.server.akalist,$2,0);}
129 domain_list : STRING {save_str(¤t.server.localdomains,$1,0);}
130 | domain_list STRING {save_str(¤t.server.localdomains,$2,0);}
133 serv_option : AKA alias_list
134 | VIA STRING {current.server.via = xstrdup($2);}
135 | LOCALDOMAINS domain_list
136 | PROTOCOL PROTO {current.server.protocol = $2;}
138 current.server.protocol = P_POP3;
140 if (current.server.preauthenticate == A_PASSWORD)
142 current.server.preauthenticate = A_KERBEROS_V5;
144 current.server.preauthenticate = A_KERBEROS_V4;
145 #endif /* KERBEROS_V5 */
147 current.server.service = KPOP_PORT;
148 #else /* INET6_ENABLE */
149 current.server.port = KPOP_PORT;
150 #endif /* INET6_ENABLE */
152 | PRINCIPAL STRING {current.server.principal = xstrdup($2);}
155 current.server.protocol = P_POP3;
156 current.server.sdps = TRUE;
158 yyerror(_("SDPS not enabled."));
159 #endif /* SDPS_ENABLE */
161 | UIDL {current.server.uidl = FLAG_TRUE;}
162 | NO UIDL {current.server.uidl = FLAG_FALSE;}
163 | CHECKALIAS {current.server.checkalias = FLAG_TRUE;}
164 | NO CHECKALIAS {current.server.checkalias = FLAG_FALSE;}
167 current.server.service = $2;
168 #endif /* INET6_ENABLE */
174 sprintf(buf, "%d", port);
175 current.server.service = xstrdup(buf);
177 current.server.port = $2;
178 #endif /* INET6_ENABLE */
180 | INTERVAL NUMBER {current.server.interval = $2;}
181 | PREAUTHENTICATE PASSWORD {current.server.preauthenticate = A_PASSWORD;}
182 | PREAUTHENTICATE KERBEROS4 {current.server.preauthenticate = A_KERBEROS_V4;}
183 | PREAUTHENTICATE KERBEROS5 {current.server.preauthenticate = A_KERBEROS_V5;}
184 | PREAUTHENTICATE KERBEROS {
186 current.server.preauthenticate = A_KERBEROS_V5;
188 current.server.preauthenticate = A_KERBEROS_V4;
189 #endif /* KERBEROS_V5 */
191 | PREAUTHENTICATE SSH {current.server.preauthenticate = A_SSH;}
192 | TIMEOUT NUMBER {current.server.timeout = $2;}
194 | ENVELOPE NUMBER STRING
196 current.server.envelope =
198 current.server.envskip = $2;
202 current.server.envelope =
204 current.server.envskip = 0;
207 | QVIRTUAL STRING {current.server.qvirtual=xstrdup($2);}
213 if (net_security_strtorequest($2, &request, &requestlen))
214 yyerror(_("invalid security request"));
216 current.server.netsec = xstrdup($2);
220 yyerror(_("network-security support disabled"));
221 #endif /* NET_SECURITY */
224 #if (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__)
225 interface_parse($2, ¤t.server);
226 #else /* (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__) */
227 fprintf(stderr, _("fetchmail: interface option is only supported under Linux and FreeBSD\n"));
228 #endif /* (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__) */
231 #if (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__)
232 current.server.monitor = xstrdup($2);
233 #else /* (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__) */
234 fprintf(stderr, _("fetchmail: monitor option is only supported under Linux\n"));
235 #endif /* (defined(linux) && !defined(INET6_ENABLE) || defined(__FreeBSD__)) */
237 | PLUGIN STRING { current.server.plugin = xstrdup($2); }
238 | PLUGOUT STRING { current.server.plugout = xstrdup($2); }
239 | DNS {current.server.dns = FLAG_TRUE;}
240 | NO DNS {current.server.dns = FLAG_FALSE;}
241 | NO ENVELOPE {current.server.envelope = STRING_DISABLED;}
244 userspecs : user1opts {record_current(); user_reset();}
248 explicits : explicitdef {record_current(); user_reset();}
249 | explicits explicitdef {record_current(); user_reset();}
252 explicitdef : userdef user0opts
255 userdef : USERNAME STRING {current.remotename = xstrdup($2);}
256 | USERNAME mapping_list HERE
257 | USERNAME STRING THERE {current.remotename = xstrdup($2);}
260 user0opts : /* EMPTY */
261 | user0opts user_option
264 user1opts : user_option
265 | user1opts user_option
268 localnames : WILDCARD {current.wildcard = TRUE;}
269 | mapping_list {current.wildcard = FALSE;}
270 | mapping_list WILDCARD {current.wildcard = TRUE;}
273 mapping_list : mapping
274 | mapping_list mapping
278 {save_str_pair(¤t.localnames, $1, NULL);}
280 {save_str_pair(¤t.localnames, $1, $3);}
283 folder_list : STRING {save_str(¤t.mailboxes,$1,0);}
284 | folder_list STRING {save_str(¤t.mailboxes,$2,0);}
287 smtp_list : STRING {save_str(¤t.smtphunt, $1,TRUE);}
288 | smtp_list STRING {save_str(¤t.smtphunt, $2,TRUE);}
294 id=save_str(¤t.antispam,STRING_DUMMY,0);
295 id->val.status.num = $1;
300 id=save_str(¤t.antispam,STRING_DUMMY,0);
301 id->val.status.num = $2;
305 user_option : TO localnames HERE
310 | IS STRING THERE {current.remotename = xstrdup($2);}
311 | PASSWORD STRING {current.password = xstrdup($2);}
314 | SMTPADDRESS STRING {current.smtpaddress = xstrdup($2);}
315 | SMTPNAME STRING {current.smtpname = xstrdup($2);}
316 | SPAMRESPONSE num_list
317 | MDA STRING {current.mda = xstrdup($2);}
318 | BSMTP STRING {current.bsmtp = xstrdup($2);}
319 | LMTP {current.listener = LMTP_MODE;}
320 | PRECONNECT STRING {current.preconnect = xstrdup($2);}
321 | POSTCONNECT STRING {current.postconnect = xstrdup($2);}
323 | KEEP {current.keep = FLAG_TRUE;}
324 | FLUSH {current.flush = FLAG_TRUE;}
325 | FETCHALL {current.fetchall = FLAG_TRUE;}
326 | REWRITE {current.rewrite = FLAG_TRUE;}
327 | FORCECR {current.forcecr = FLAG_TRUE;}
328 | STRIPCR {current.stripcr = FLAG_TRUE;}
329 | PASS8BITS {current.pass8bits = FLAG_TRUE;}
330 | DROPSTATUS {current.dropstatus = FLAG_TRUE;}
331 | DROPDELIVERED {current.dropdelivered = FLAG_TRUE;}
332 | MIMEDECODE {current.mimedecode = FLAG_TRUE;}
333 | IDLE {current.idle = FLAG_TRUE;}
335 | SSL {current.use_ssl = FLAG_TRUE;}
336 | SSLKEY STRING {current.sslkey = xstrdup($2);}
337 | SSLCERT STRING {current.sslcert = xstrdup($2);}
339 | NO KEEP {current.keep = FLAG_FALSE;}
340 | NO FLUSH {current.flush = FLAG_FALSE;}
341 | NO FETCHALL {current.fetchall = FLAG_FALSE;}
342 | NO REWRITE {current.rewrite = FLAG_FALSE;}
343 | NO FORCECR {current.forcecr = FLAG_FALSE;}
344 | NO STRIPCR {current.stripcr = FLAG_FALSE;}
345 | NO PASS8BITS {current.pass8bits = FLAG_FALSE;}
346 | NO DROPSTATUS {current.dropstatus = FLAG_FALSE;}
347 | NO DROPDELIVERED {current.dropdelivered = FLAG_FALSE;}
348 | NO MIMEDECODE {current.mimedecode = FLAG_FALSE;}
349 | NO IDLE {current.idle = FLAG_FALSE;}
351 | NO SSL {current.use_ssl = FLAG_FALSE;}
353 | LIMIT NUMBER {current.limit = NUM_VALUE_IN($2);}
354 | WARNINGS NUMBER {current.warnings = NUM_VALUE_IN($2);}
355 | FETCHLIMIT NUMBER {current.fetchlimit = NUM_VALUE_IN($2);}
356 | BATCHLIMIT NUMBER {current.batchlimit = NUM_VALUE_IN($2);}
357 | EXPUNGE NUMBER {current.expunge = NUM_VALUE_IN($2);}
359 | PROPERTIES STRING {current.properties = xstrdup($2);}
363 /* lexer interface */
365 extern int prc_lineno;
369 static struct query *hosttail; /* where to add new elements */
371 void yyerror (const char *s)
372 /* report a syntax error */
374 report_at_line(stderr, 0, rcfile, prc_lineno, _("%s at %s"), s,
375 (yytext && yytext[0]) ? yytext : _("end of input"));
379 int prc_filecheck(const char *pathname, const flag securecheck)
380 /* check that a configuration file is secure */
387 /* special case useful for debugging purposes */
388 if (strcmp("/dev/null", pathname) == 0)
391 /* pass through the special name for stdin */
392 if (strcmp("-", pathname) == 0)
395 /* the run control file must have the same uid as the REAL uid of this
396 process, it must have permissions no greater than 600, and it must not
397 be a symbolic link. We check these conditions here. */
399 if (lstat(pathname, &statbuf) < 0) {
403 report(stderr, "lstat: %s: %s\n", pathname, strerror(errno));
408 if (!securecheck) return PS_SUCCESS;
410 if ((statbuf.st_mode & S_IFLNK) == S_IFLNK)
412 fprintf(stderr, _("File %s must not be a symbolic link.\n"), pathname);
417 if (statbuf.st_mode & ~(S_IFREG | S_IREAD | S_IWRITE | S_IEXEC | S_IXGRP))
419 fprintf(stderr, _("File %s must have no more than -rwx--x--- (0710) permissions.\n"),
423 #endif /* __BEOS__ */
426 if (statbuf.st_uid != geteuid())
428 if (statbuf.st_uid != getuid())
429 #endif /* HAVE_GETEUID */
431 fprintf(stderr, _("File %s must be owned by you.\n"), pathname);
438 int prc_parse_file (const char *pathname, const flag securecheck)
439 /* digest the configuration into a linked list of host records */
442 querylist = hosttail = (struct query *)NULL;
446 /* Check that the file is secure */
447 if ( (prc_errflag = prc_filecheck(pathname, securecheck)) != 0 )
451 * Croak if the configuration directory does not exist.
452 * This probably means an NFS mount failed and we can't
453 * see a configuration file that ought to be there.
454 * Question: is this a portable check? It's not clear
455 * that all implementations of lstat() will return ENOTDIR
456 * rather than plain ENOENT in this case...
458 if (errno == ENOTDIR)
460 else if (errno == ENOENT)
463 /* Open the configuration file and feed it to the lexer. */
464 if (strcmp(pathname, "-") == 0)
466 else if ((yyin = fopen(pathname,"r")) == (FILE *)NULL) {
467 report(stderr, "open: %s: %s\n", pathname, strerror(errno));
471 yyparse(); /* parse entire file */
473 fclose(yyin); /* not checking this should be safe, file mode was r */
481 static void reset_server(const char *name, int skip)
482 /* clear the entire global record and initialize it with a new name */
485 memset(¤t,'\0',sizeof(current));
486 current.smtp_socket = -1;
487 current.server.pollname = xstrdup(name);
488 current.server.skip = skip;
489 current.server.principal = (char *)NULL;
493 static void user_reset(void)
494 /* clear the global current record (user parameters) used by the parser */
496 struct hostdata save;
499 * Purpose of this code is to initialize the new server block, but
500 * preserve whatever server name was previously set. Also
501 * preserve server options unless the command-line explicitly
504 save = current.server;
506 memset(¤t, '\0', sizeof(current));
507 current.smtp_socket = -1;
509 current.server = save;
512 struct query *hostalloc(init)
513 /* append a host record to the host list */
514 struct query *init; /* pointer to block containing initial values */
518 /* allocate new node */
519 node = (struct query *) xmalloc(sizeof(struct query));
523 memcpy(node, init, sizeof(struct query));
526 memset(node, '\0', sizeof(struct query));
527 node->smtp_socket = -1;
530 /* append to end of list */
531 if (hosttail != (struct query *) 0)
532 hosttail->next = node; /* list contains at least one element */
534 querylist = node; /* list is empty */
538 node->server.lead_server = leadentry;
541 node->server.lead_server = NULL;
542 leadentry = &node->server;
548 static void record_current(void)
549 /* register current parameters and append to the host list */
551 (void) hostalloc(¤t);
555 /* easier to do this than cope with variations in where the library lives */
556 int yywrap(void) {return 1;}
558 /* rcfile_y.y ends here */