4 * Copyright (c) 1987-2020 by the citadel.org team
6 * This program is open source software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 3.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
23 #include <sys/types.h>
25 #if TIME_WITH_SYS_TIME
26 # include <sys/time.h>
30 # include <sys/time.h>
39 #include <libcitadel.h>
42 #include "citserver.h"
47 #include "internet_addressing.h"
48 #include "ctdl_module.h"
54 * Callback function to redirect a message to a different folder
56 int ctdl_redirect(void)
58 struct ctdl_sieve *cs = (struct ctdl_sieve *)my;
59 struct CtdlMessage *msg = NULL;
60 recptypes *valid = NULL;
63 safestrncpy(recp, sieve2_getvalue_string(s, "address"), sizeof recp);
65 syslog(LOG_DEBUG, "Action is REDIRECT, recipient <%s>", recp);
67 valid = validate_recipients(recp, NULL, 0);
69 syslog(LOG_WARNING, "REDIRECT failed: bad recipient <%s>", recp);
70 return SIEVE2_ERROR_BADARGS;
72 if (valid->num_error > 0) {
73 syslog(LOG_WARNING, "REDIRECT failed: bad recipient <%s>", recp);
74 free_recipients(valid);
75 return SIEVE2_ERROR_BADARGS;
78 msg = CtdlFetchMessage(cs->msgnum, 1);
80 syslog(LOG_WARNING, "REDIRECT failed: unable to fetch msg %ld", cs->msgnum);
81 free_recipients(valid);
82 return SIEVE2_ERROR_BADARGS;
85 CtdlSubmitMsg(msg, valid, NULL, 0);
86 cs->cancel_implicit_keep = 1;
87 free_recipients(valid);
96 * Callback function to file a message into a different mailbox
98 int ctdl_fileinto(sieve2_context_t *s, void *my)
100 struct ctdl_sieve *cs = (struct ctdl_sieve *)my;
101 const char *dest_folder = sieve2_getvalue_string(s, "mailbox");
103 char foldername[256];
104 char original_room_name[ROOMNAMELEN];
106 syslog(LOG_DEBUG, "Action is FILEINTO, destination is <%s>", dest_folder);
108 /* FILEINTO 'INBOX' is the same thing as KEEP */
109 if ( (!strcasecmp(dest_folder, "INBOX")) || (!strcasecmp(dest_folder, MAILROOM)) ) {
111 cs->cancel_implicit_keep = 1;
115 /* Remember what room we came from */
116 safestrncpy(original_room_name, CC->room.QRname, sizeof original_room_name);
118 /* First try a mailbox name match (check personal mail folders first) */
119 snprintf(foldername, sizeof foldername, "%010ld.%s", cs->usernum, dest_folder);
120 c = CtdlGetRoom(&CC->room, foldername);
122 /* Then a regular room name match (public and private rooms) */
124 safestrncpy(foldername, dest_folder, sizeof foldername);
125 c = CtdlGetRoom(&CC->room, foldername);
129 syslog(LOG_WARNING, "FILEINTO failed: target <%s> does not exist", dest_folder);
130 return SIEVE2_ERROR_BADARGS;
133 /* Yes, we actually have to go there */
134 CtdlUserGoto(NULL, 0, 0, NULL, NULL, NULL, NULL);
136 c = CtdlSaveMsgPointersInRoom(NULL, &cs->msgnum, 1, 0, NULL, 0);
138 /* Go back to the room we came from */
139 if (strcasecmp(original_room_name, CC->room.QRname)) {
140 CtdlUserGoto(original_room_name, 0, 0, NULL, NULL, NULL, NULL);
144 cs->cancel_implicit_keep = 1;
148 return SIEVE2_ERROR_BADARGS;
154 * Callback function to indicate that a message should be discarded.
156 int ctdl_discard(sieve2_context_t *s, void *my)
158 struct ctdl_sieve *cs = (struct ctdl_sieve *)my;
160 syslog(LOG_DEBUG, "Action is DISCARD");
162 /* Cancel the implicit keep. That's all there is to it. */
163 cs->cancel_implicit_keep = 1;
169 * Callback function to indicate that a message should be rejected
171 int ctdl_reject(sieve2_context_t *s, void *my)
173 struct ctdl_sieve *cs = (struct ctdl_sieve *)my;
174 char *reject_text = NULL;
176 syslog(LOG_DEBUG, "Action is REJECT");
178 /* If we don't know who sent the message, do a DISCARD instead. */
179 if (IsEmptyStr(cs->sender)) {
180 syslog(LOG_INFO, "Unknown sender. Doing DISCARD instead of REJECT.");
181 return ctdl_discard(s, my);
184 /* Assemble the reject message. */
185 reject_text = malloc(strlen(sieve2_getvalue_string(s, "message")) + 1024);
186 if (reject_text == NULL) {
187 return SIEVE2_ERROR_FAIL;
191 "Content-type: text/plain\n"
193 "The message was refused by the recipient's mail filtering program.\n"
194 "The reason given was as follows:\n"
199 sieve2_getvalue_string(s, "message")
202 quickie_message( /* This delivers the message */
209 "Delivery status notification"
213 cs->cancel_implicit_keep = 1;
219 * Callback function to indicate that a vacation message should be generated
221 int ctdl_vacation(sieve2_context_t *s, void *my)
223 struct ctdl_sieve *cs = (struct ctdl_sieve *)my;
224 struct sdm_vacation *vptr;
227 char *vacamsg_text = NULL;
228 char vacamsg_subject[1024];
230 syslog(LOG_DEBUG, "Action is VACATION");
232 message = sieve2_getvalue_string(s, "message");
233 if (message == NULL) return SIEVE2_ERROR_BADARGS;
235 if (sieve2_getvalue_string(s, "subject") != NULL) {
236 safestrncpy(vacamsg_subject, sieve2_getvalue_string(s, "subject"), sizeof vacamsg_subject);
239 snprintf(vacamsg_subject, sizeof vacamsg_subject, "Re: %s", cs->subject);
242 days = sieve2_getvalue_int(s, "days");
243 if (days < 1) days = 1;
244 if (days > MAX_VACATION) days = MAX_VACATION;
246 /* Check to see whether we've already alerted this sender that we're on vacation. */
247 for (vptr = cs->u->first_vacation; vptr != NULL; vptr = vptr->next) {
248 if (!strcasecmp(vptr->fromaddr, cs->sender)) {
249 if ( (time(NULL) - vptr->timestamp) < (days * 86400) ) {
250 syslog(LOG_DEBUG, "Already alerted <%s> recently.", cs->sender);
256 /* Assemble the reject message. */
257 vacamsg_text = malloc(strlen(message) + 1024);
258 if (vacamsg_text == NULL) {
259 return SIEVE2_ERROR_FAIL;
262 sprintf(vacamsg_text,
263 "Content-type: text/plain charset=utf-8\n"
271 quickie_message( /* This delivers the message */
283 /* Now update the list to reflect the fact that we've alerted this sender.
284 * If they're already in the list, just update the timestamp.
286 for (vptr = cs->u->first_vacation; vptr != NULL; vptr = vptr->next) {
287 if (!strcasecmp(vptr->fromaddr, cs->sender)) {
288 vptr->timestamp = time(NULL);
293 /* If we get to this point, create a new record.
295 vptr = malloc(sizeof(struct sdm_vacation));
296 memset(vptr, 0, sizeof(struct sdm_vacation));
297 vptr->timestamp = time(NULL);
298 safestrncpy(vptr->fromaddr, cs->sender, sizeof vptr->fromaddr);
299 vptr->next = cs->u->first_vacation;
300 cs->u->first_vacation = vptr;
307 * Callback function to parse message envelope
309 int ctdl_getenvelope(sieve2_context_t *s, void *my)
311 struct ctdl_sieve *cs = (struct ctdl_sieve *)my;
313 syslog(LOG_DEBUG, "Action is GETENVELOPE");
314 syslog(LOG_DEBUG, "EnvFrom: %s", cs->envelope_from);
315 syslog(LOG_DEBUG, "EnvTo: %s", cs->envelope_to);
317 if (cs->envelope_from != NULL) {
318 if ((cs->envelope_from[0] != '@')&&(cs->envelope_from[strlen(cs->envelope_from)-1] != '@')) {
319 sieve2_setvalue_string(s, "from", cs->envelope_from);
322 sieve2_setvalue_string(s, "from", "invalid_envelope_from@example.org");
326 sieve2_setvalue_string(s, "from", "null_envelope_from@example.org");
330 if (cs->envelope_to != NULL) {
331 if ((cs->envelope_to[0] != '@') && (cs->envelope_to[strlen(cs->envelope_to)-1] != '@')) {
332 sieve2_setvalue_string(s, "to", cs->envelope_to);
335 sieve2_setvalue_string(s, "to", "invalid_envelope_to@example.org");
339 sieve2_setvalue_string(s, "to", "null_envelope_to@example.org");
349 * Given the on-disk representation of our Sieve config, load
350 * it into an in-memory data structure.
352 void parse_sieve_config(char *conf, struct sdm_userdata *u) {
356 struct sdm_script *sptr;
357 struct sdm_vacation *vptr;
360 while (c = ptr, ptr = bmstrcasestr(ptr, CTDLSIEVECONFIGSEPARATOR), ptr != NULL) {
362 ptr += strlen(CTDLSIEVECONFIGSEPARATOR);
364 extract_token(keyword, c, 0, '|', sizeof keyword);
366 if (!strcasecmp(keyword, "lastproc")) {
367 u->lastproc = extract_long(c, 1);
370 else if (!strcasecmp(keyword, "script")) {
371 sptr = malloc(sizeof(struct sdm_script));
372 extract_token(sptr->script_name, c, 1, '|', sizeof sptr->script_name);
373 sptr->script_active = extract_int(c, 2);
374 remove_token(c, 0, '|');
375 remove_token(c, 0, '|');
376 remove_token(c, 0, '|');
377 sptr->script_content = strdup(c);
378 sptr->next = u->first_script;
379 u->first_script = sptr;
382 else if (!strcasecmp(keyword, "vacation")) {
384 if (c != NULL) while (vacrec=c, c=strchr(c, '\n'), (c != NULL)) {
389 if (strncasecmp(vacrec, "vacation|", 9)) {
390 vptr = malloc(sizeof(struct sdm_vacation));
391 extract_token(vptr->fromaddr, vacrec, 0, '|', sizeof vptr->fromaddr);
392 vptr->timestamp = extract_long(vacrec, 1);
393 vptr->next = u->first_vacation;
394 u->first_vacation = vptr;
399 /* ignore unknown keywords */
408 * Write our citadel sieve config back to disk
410 * (Set yes_write_to_disk to nonzero to make it actually write the config;
411 * otherwise it just frees the data structures.)
413 void rewrite_ctdl_sieve_config(struct sdm_userdata *u, int yes_write_to_disk) {
415 struct sdm_script *sptr;
416 struct sdm_vacation *vptr;
418 text = NewStrBufPlain(NULL, SIZ);
420 "Content-type: application/x-citadel-sieve-config\n"
422 CTDLSIEVECONFIGSEPARATOR
424 CTDLSIEVECONFIGSEPARATOR
429 while (u->first_script != NULL) {
430 StrBufAppendPrintf(text,
431 "script|%s|%d|%s" CTDLSIEVECONFIGSEPARATOR,
432 u->first_script->script_name,
433 u->first_script->script_active,
434 u->first_script->script_content
436 sptr = u->first_script;
437 u->first_script = u->first_script->next;
438 free(sptr->script_content);
442 if (u->first_vacation != NULL) {
444 StrBufAppendPrintf(text, "vacation|\n");
445 while (u->first_vacation != NULL) {
446 if ( (time(NULL) - u->first_vacation->timestamp) < (MAX_VACATION * 86400)) {
447 StrBufAppendPrintf(text, "%s|%ld\n",
448 u->first_vacation->fromaddr,
449 u->first_vacation->timestamp
452 vptr = u->first_vacation;
453 u->first_vacation = u->first_vacation->next;
456 StrBufAppendPrintf(text, CTDLSIEVECONFIGSEPARATOR);
459 if (yes_write_to_disk)
461 /* Save the config */
462 quickie_message("Citadel", NULL, NULL, u->config_roomname,
465 "Sieve configuration"
468 /* And delete the old one */
469 if (u->config_msgnum > 0) {
470 CtdlDeleteMessages(u->config_roomname, &u->config_msgnum, 1, "");
483 * The next sections are enums and keys that drive the serialize/deserialize functions for the inbox rules/state configuration.
486 // Fields to be compared
504 char *field_keys[] = {
522 // Field comparison operators
531 char *fcomp_keys[] = {
549 char *action_keys[] = {
558 // Size comparison operators
563 char *scomp_keys[] = {
573 char *final_keys[] = {
578 // This data structure represents ONE inbox rule within the configuration.
581 int field_compare_op;
582 char compared_value[128];
586 char file_into[ROOMNAMELEN];
587 char redirect_to[1024];
588 char autoreply_message[SIZ];
592 // This data structure represents the entire inbox rules configuration AND current state for a single user.
600 // Destructor for 'struct inboxrules'
601 void free_inbox_rules(struct inboxrules *ibr) {
607 // Constructor for 'struct inboxrules' that deserializes the configuration from text input.
608 struct inboxrules *deserialize_inbox_rules(char *serialized_rules) {
611 if (!serialized_rules) {
615 /* Make a copy of the supplied buffer because we're going to shit all over it with strtok_r() */
616 char *sr = strdup(serialized_rules);
621 struct inboxrules *ibr = malloc(sizeof(struct inboxrules));
625 memset(ibr, 0, sizeof(struct inboxrules));
629 while ((token = strtok_r(rest, "\n", &rest))) {
631 // For backwards compatibility, "# WEBCIT_RULE" is an alias for "rule".
632 // Prior to version 930, WebCit converted its rules to Sieve scripts, but saved the rules as comments for later re-editing.
633 // Now, the rules hidden in the comments become the real rules.
634 if (!strncasecmp(token, "# WEBCIT_RULE|", 14)) {
635 strcpy(token, "rule|");
636 strcpy(&token[5], &token[14]);
639 // Lines containing actual rules are double-serialized with Base64. It seemed like a good idea at the time :(
640 if (!strncasecmp(token, "rule|", 5)) {
641 remove_token(&token[5], 0, '|');
642 char *decoded_rule = malloc(strlen(token));
643 CtdlDecodeBase64(decoded_rule, &token[5], strlen(&token[5]));
645 ibr->rules = realloc(ibr->rules, (sizeof(struct irule) * ibr->num_rules));
646 struct irule *new_rule = &ibr->rules[ibr->num_rules - 1];
647 memset(new_rule, 0, sizeof(struct irule));
649 // We have a rule , now parse it
651 int nt = num_tokens(decoded_rule, '|');
652 for (int t=0; t<nt; ++t) {
653 extract_token(rtoken, decoded_rule, t, '|', sizeof(rtoken));
656 case 1: // field to compare
657 for (i=0; i<=field_all; ++i) {
658 if (!strcasecmp(rtoken, field_keys[i])) {
659 new_rule->compared_field = i;
663 case 2: // field comparison operation
664 for (i=0; i<=fcomp_notmatches; ++i) {
665 if (!strcasecmp(rtoken, fcomp_keys[i])) {
666 new_rule->field_compare_op = i;
670 case 3: // field comparison value
671 safestrncpy(new_rule->compared_value, rtoken, sizeof(new_rule->compared_value));
673 case 4: // size comparison operation
674 for (i=0; i<=scomp_smaller; ++i) {
675 if (!strcasecmp(rtoken, scomp_keys[i])) {
676 new_rule->size_compare_op = i;
680 case 5: // size comparison value
681 new_rule->compared_size = atol(rtoken);
684 for (i=0; i<=action_vacation; ++i) {
685 if (!strcasecmp(rtoken, action_keys[i])) {
686 new_rule->action = i;
690 case 7: // file into (target room)
691 safestrncpy(new_rule->file_into, rtoken, sizeof(new_rule->file_into));
693 case 8: // redirect to (target address)
694 safestrncpy(new_rule->redirect_to, rtoken, sizeof(new_rule->redirect_to));
696 case 9: // autoreply message
697 safestrncpy(new_rule->autoreply_message, rtoken, sizeof(new_rule->autoreply_message));
699 case 10: // final_action;
700 for (i=0; i<=final_stop; ++i) {
701 if (!strcasecmp(rtoken, final_keys[i])) {
702 new_rule->final_action = i;
712 // if we re-serialized this now, what would it look like?
713 syslog(LOG_DEBUG, "test reserialize: 0|%s|%s|%s|%s|%ld|%s|%s|%s|%s|%s",
714 field_keys[new_rule->compared_field],
715 fcomp_keys[new_rule->field_compare_op],
716 new_rule->compared_value,
717 scomp_keys[new_rule->size_compare_op],
718 new_rule->compared_size,
719 action_keys[new_rule->action],
721 new_rule->redirect_to,
722 new_rule->autoreply_message,
723 final_keys[new_rule->final_action]
725 // delete the above after moving it to a reserialize function
729 // "lastproc" indicates the newest message number in the inbox that was previously processed by our inbox rules.
730 else if (!strncasecmp(token, "lastproc|", 5)) {
731 ibr->lastproc = atol(&token[9]);
736 free(sr); // free our copy of the source buffer that has now been trashed with null bytes...
737 return(ibr); // and return our complex data type to the caller.
742 * Process a single message. We know the room, the user, the rules, the message number, etc.
744 void inbox_do_msg(long msgnum, void *userdata) {
745 struct inboxrules *ii = (struct inboxrules *) userdata;
746 struct CtdlMessage *msg = NULL; // If we are loading a message to process, put it here.
747 int headers_loaded = 0; // Did we load the headers yet? Do it only once.
748 int body_loaded = 0; // Did we load the message body yet? Do it only once.
749 int metadata_loaded = 0; // Did we load the metadata yet? Do it only once.
750 struct MetaData smi; // If we are loading the metadata to compare, put it here.
751 int rule_activated = 0; // On each rule, this is set if the compare succeeds and the rule activates.
752 char compare_me[SIZ]; // On each rule, we will store the field to be compared here.
755 syslog(LOG_DEBUG, "inboxrules: processing message #%ld which is higher than %ld, we are in %s", msgnum, ii->lastproc, CC->room.QRname);
757 if (ii->num_rules <= 0) {
758 syslog(LOG_DEBUG, "inboxrules: rule set is empty");
762 for (i=0; i<ii->num_rules; ++i) {
763 syslog(LOG_DEBUG, "inboxrules: processing rule %d is %s", i, field_keys[ ii->rules[i].compared_field ]);
766 // Before doing a field compare, check to see if we have the correct parts of the message in memory.
768 switch(ii->rules[i].compared_field) {
769 // These fields require loading only the top-level headers
770 case field_from: // From:
771 case field_tocc: // To: or Cc:
772 case field_subject: // Subject:
773 case field_replyto: // Reply-to:
774 case field_listid: // List-ID:
775 case field_envto: // Envelope-to:
776 case field_envfrom: // Return-path:
777 if (!headers_loaded) {
778 syslog(LOG_DEBUG, "inboxrules: loading headers for message %ld", msgnum);
779 msg = CtdlFetchMessage(msgnum, 0);
786 // These fields are not stored as Citadel headers, and therefore require a full message load.
788 case field_resentfrom:
791 case field_xspamflag:
792 case field_xspamstatus:
794 syslog(LOG_DEBUG, "inboxrules: loading all of message %ld", msgnum);
798 msg = CtdlFetchMessage(msgnum, 1);
807 if (!metadata_loaded) {
808 syslog(LOG_DEBUG, "inboxrules: loading metadata for message %ld", msgnum);
809 GetMetaData(&smi, msgnum);
814 syslog(LOG_DEBUG, "inboxrules: this is an always-on rule");
817 syslog(LOG_DEBUG, "inboxrules: unknown rule key");
820 // If the rule involves a field comparison, load the field to be compared.
822 switch(ii->rules[i].compared_field) {
824 case field_from: // From:
825 if (!IsEmptyStr(msg->cm_fields[erFc822Addr])) {
826 safestrncpy(compare_me, msg->cm_fields[erFc822Addr], sizeof compare_me);
829 case field_tocc: // To: or Cc:
830 if (!IsEmptyStr(msg->cm_fields[eRecipient])) {
831 safestrncpy(compare_me, msg->cm_fields[eRecipient], sizeof compare_me);
833 if (!IsEmptyStr(msg->cm_fields[eCarbonCopY])) {
834 if (!IsEmptyStr(compare_me)) {
835 strcat(compare_me, ",");
837 safestrncpy(&compare_me[strlen(compare_me)], msg->cm_fields[eCarbonCopY], (sizeof compare_me - strlen(compare_me)));
840 case field_subject: // Subject:
841 if (!IsEmptyStr(msg->cm_fields[eMsgSubject])) {
842 safestrncpy(compare_me, msg->cm_fields[eMsgSubject], sizeof compare_me);
845 case field_replyto: // Reply-to:
846 if (!IsEmptyStr(msg->cm_fields[eReplyTo])) {
847 safestrncpy(compare_me, msg->cm_fields[eReplyTo], sizeof compare_me);
850 case field_listid: // List-ID:
851 if (!IsEmptyStr(msg->cm_fields[eListID])) {
852 safestrncpy(compare_me, msg->cm_fields[eListID], sizeof compare_me);
855 case field_envto: // Envelope-to:
856 if (!IsEmptyStr(msg->cm_fields[eenVelopeTo])) {
857 safestrncpy(compare_me, msg->cm_fields[eenVelopeTo], sizeof compare_me);
860 case field_envfrom: // Return-path:
861 if (!IsEmptyStr(msg->cm_fields[eMessagePath])) {
862 safestrncpy(compare_me, msg->cm_fields[eMessagePath], sizeof compare_me);
867 case field_resentfrom:
870 case field_xspamflag:
871 case field_xspamstatus:
877 // Message data to compare is loaded, now do something.
878 switch(ii->rules[i].compared_field) {
879 case field_from: // From:
880 case field_tocc: // To: or Cc:
881 case field_subject: // Subject:
882 case field_replyto: // Reply-to:
883 case field_listid: // List-ID:
884 case field_envto: // Envelope-to:
885 case field_envfrom: // Return-path:
887 case field_resentfrom:
890 case field_xspamflag:
891 case field_xspamstatus:
893 // For all of the above fields, we can compare the field we've loaded into the buffer.
894 syslog(LOG_DEBUG, "Value of field to compare is: <%s>", compare_me);
895 switch(ii->rules[i].field_compare_op) {
898 rule_activated = (bmstrcasestr(compare_me, ii->rules[i].compared_value) ? 1 : 0);
899 syslog(LOG_DEBUG, "Does %s contain %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
901 case fcomp_notcontains:
902 case fcomp_notmatches:
903 rule_activated = (bmstrcasestr(compare_me, ii->rules[i].compared_value) ? 0 : 1);
904 syslog(LOG_DEBUG, "Does %s contain %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
907 rule_activated = (strcasecmp(compare_me, ii->rules[i].compared_value) ? 0 : 1);
908 syslog(LOG_DEBUG, "Does %s equal %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
911 rule_activated = (strcasecmp(compare_me, ii->rules[i].compared_value) ? 1 : 0);
912 syslog(LOG_DEBUG, "Does %s equal %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
919 syslog(LOG_DEBUG, "comparing actual message size %ld to rule message size %ld", smi.meta_rfc822_length, ii->rules[i].compared_size);
920 switch(ii->rules[i].field_compare_op) {
922 rule_activated = ((smi.meta_rfc822_length > ii->rules[i].compared_size) ? 1 : 0);
923 syslog(LOG_DEBUG, "Is %ld larger than %ld? %s", smi.meta_rfc822_length, ii->rules[i].compared_size, (smi.meta_rfc822_length > ii->rules[i].compared_size) ? "yes":"no");
926 rule_activated = ((smi.meta_rfc822_length < ii->rules[i].compared_size) ? 1 : 0);
927 syslog(LOG_DEBUG, "Is %ld smaller than %ld? %s", smi.meta_rfc822_length, ii->rules[i].compared_size, (smi.meta_rfc822_length < ii->rules[i].compared_size) ? "yes":"no");
931 case field_all: // The "all messages" rule ALWAYS triggers
934 default: // no matches, fall through and do nothing
935 syslog(LOG_DEBUG, "inboxrules: an unknown field comparison was encountered");
940 // FIXME you are here YOU ARE HERE next write the code to take action
941 if (rule_activated) {
942 syslog(LOG_DEBUG, "\033[32m\033[7mrule activated\033[0m"); // FIXME remove color
949 // do final action (anything other than "stop" means continue)
950 if (ii->rules[i].final_action == final_stop) {
951 syslog(LOG_DEBUG, "\033[33m\033[7mSTOP\033[0m"); // FIXME remove color
952 i = ii->num_rules + 1;
958 syslog(LOG_DEBUG, "\033[31m\033[7mrule not activated\033[0m"); // FIXME remove color
970 * A user account is identified as requring inbox processing.
973 void do_inbox_processing_for_user(long usernum) {
974 struct CtdlMessage *msg;
975 struct inboxrules *ii;
976 char roomname[ROOMNAMELEN];
978 if (CtdlGetUserByNumber(&CC->user, usernum) == 0) {
979 if (CC->user.msgnum_inboxrules <= 0) {
980 return; // this user has no inbox rules
983 msg = CtdlFetchMessage(CC->user.msgnum_inboxrules, 1);
985 return; // config msgnum is set but that message does not exist
988 ii = deserialize_inbox_rules(msg->cm_fields[eMesageText]);
992 return; // config message exists but body is null
995 syslog(LOG_DEBUG, "inboxrules: for %s", CC->user.fullname);
997 // Go to the user's inbox room and process all new messages
998 snprintf(roomname, sizeof roomname, "%010ld.%s", usernum, MAILROOM);
999 if (CtdlGetRoom(&CC->room, roomname) == 0) {
1000 CtdlForEachMessage(MSGS_GT, ii->lastproc, NULL, NULL, NULL, inbox_do_msg, (void *) ii);
1003 // FIXME reserialize our inbox rules/state and write changes back to the config room
1004 free_inbox_rules(ii);
1010 * Here is an array of users (by number) who have received messages in their inbox and may require processing.
1012 long *users_requiring_inbox_processing = NULL;
1014 int num_urip_alloc = 0;
1018 * Perform inbox processing for all rooms which require it
1020 void perform_inbox_processing(void) {
1021 if (num_urip == 0) {
1022 return; // no action required
1025 for (int i=0; i<num_urip; ++i) {
1026 do_inbox_processing_for_user(users_requiring_inbox_processing[i]);
1029 free(users_requiring_inbox_processing);
1030 users_requiring_inbox_processing = NULL;
1037 * This function is called after a message is saved to a room.
1038 * If it's someone's inbox, we have to check for inbox rules
1040 int serv_inboxrules_roomhook(struct ctdlroom *room) {
1042 // Is this someone's inbox?
1043 if (!strcasecmp(&room->QRname[11], MAILROOM)) {
1044 long usernum = atol(room->QRname);
1047 // first check to see if this user is already on the list
1049 for (int i=0; i<=num_urip; ++i) {
1050 if (users_requiring_inbox_processing[i] == usernum) { // already on the list!
1056 // make room if we need to
1057 if (num_urip_alloc == 0) {
1058 num_urip_alloc = 100;
1059 users_requiring_inbox_processing = malloc(sizeof(long) * num_urip_alloc);
1061 else if (num_urip >= num_urip_alloc) {
1062 num_urip_alloc += 100;
1063 users_requiring_inbox_processing = realloc(users_requiring_inbox_processing, (sizeof(long) * num_urip_alloc));
1066 // now add the user to the list
1067 users_requiring_inbox_processing[num_urip++] = usernum;
1071 // No errors are possible from this function.
1080 * This is a client-facing function which fetches the user's inbox rules -- it omits all lines containing anything other than a rule.
1082 * hmmmmm ... should we try to rebuild this in terms of deserialize_inbox_rules() instread?
1084 void cmd_gibr(char *argbuf) {
1086 if (CtdlAccessCheck(ac_logged_in)) return;
1088 cprintf("%d inbox rules for %s\n", LISTING_FOLLOWS, CC->user.fullname);
1090 struct CtdlMessage *msg = CtdlFetchMessage(CC->user.msgnum_inboxrules, 1);
1092 if (!CM_IsEmpty(msg, eMesageText)) {
1094 char *rest = msg->cm_fields[eMesageText];
1095 while ((token = strtok_r(rest, "\n", &rest))) {
1097 // for backwards compatibility, "# WEBCIT_RULE" is an alias for "rule"
1098 if (!strncasecmp(token, "# WEBCIT_RULE|", 14)) {
1099 strcpy(token, "rule|");
1100 strcpy(&token[5], &token[14]);
1103 // Output only lines containing rules.
1104 if (!strncasecmp(token, "rule|", 5)) {
1105 cprintf("%s\n", token);
1118 * User transmits the new inbox rules for the account. They are inserted into the account, replacing the ones already there.
1120 void cmd_pibr(char *argbuf) {
1121 if (CtdlAccessCheck(ac_logged_in)) return;
1124 cprintf("%d send new rules\n", SEND_LISTING);
1125 char *newrules = CtdlReadMessageBody(HKEY("000"), CtdlGetConfigLong("c_maxmsglen"), NULL, 0);
1126 StrBuf *NewConfig = NewStrBufPlain("Content-type: application/x-citadel-sieve-config; charset=UTF-8\nContent-transfer-encoding: 8bit\n\n", -1);
1129 char *rest = newrules;
1130 while ((token = strtok_r(rest, "\n", &rest))) {
1131 // Accept only lines containing rules
1132 if (!strncasecmp(token, "rule|", 5)) {
1133 StrBufAppendBufPlain(NewConfig, token, -1, 0);
1134 StrBufAppendBufPlain(NewConfig, HKEY("\n"), 0);
1139 // Fetch the existing config so we can merge in anything that is NOT a rule
1140 // (Does not start with "rule|" but has at least one vertical bar)
1141 struct CtdlMessage *msg = CtdlFetchMessage(CC->user.msgnum_inboxrules, 1);
1143 if (!CM_IsEmpty(msg, eMesageText)) {
1144 rest = msg->cm_fields[eMesageText];
1145 while ((token = strtok_r(rest, "\n", &rest))) {
1146 // for backwards compatibility, "# WEBCIT_RULE" is an alias for "rule"
1147 if ((strncasecmp(token, "# WEBCIT_RULE|", 14)) && (strncasecmp(token, "rule|", 5)) && (haschar(token, '|'))) {
1148 StrBufAppendBufPlain(NewConfig, token, -1, 0);
1149 StrBufAppendBufPlain(NewConfig, HKEY("\n"), 0);
1156 /* we have composed the new configuration , now save it */
1157 long old_msgnum = CC->user.msgnum_inboxrules;
1158 char userconfigroomname[ROOMNAMELEN];
1159 CtdlMailboxName(userconfigroomname, sizeof userconfigroomname, &CC->user, USERCONFIGROOM);
1160 long new_msgnum = quickie_message("Citadel", NULL, NULL, userconfigroomname, ChrPtr(NewConfig), FMT_RFC822, "inbox rules configuration");
1161 FreeStrBuf(&NewConfig);
1162 CtdlGetUserLock(&CC->user, CC->curr_user);
1163 CC->user.msgnum_inboxrules = new_msgnum;
1164 CtdlPutUserLock(&CC->user);
1165 if (old_msgnum > 0) {
1166 syslog(LOG_DEBUG, "Deleting old message %ld from %s", old_msgnum, userconfigroomname);
1167 CtdlDeleteMessages(userconfigroomname, &old_msgnum, 1, "");
1172 CTDL_MODULE_INIT(sieve)
1176 CtdlRegisterProtoHook(cmd_gibr, "GIBR", "Get InBox Rules");
1177 CtdlRegisterProtoHook(cmd_pibr, "PIBR", "Put InBox Rules");
1178 CtdlRegisterRoomHook(serv_inboxrules_roomhook);
1179 CtdlRegisterSessionHook(perform_inbox_processing, EVT_HOUSE, PRIO_HOUSE + 10);
1182 /* return our module name for the log */
1183 return "inboxrules";