4 * Copyright (c) 1987-2020 by the citadel.org team
6 * This program is open source software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 3.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
23 #include <sys/types.h>
25 #if TIME_WITH_SYS_TIME
26 # include <sys/time.h>
30 # include <sys/time.h>
39 #include <libcitadel.h>
42 #include "citserver.h"
47 #include "internet_addressing.h"
48 #include "ctdl_module.h"
52 * The next sections are enums and keys that drive the serialize/deserialize functions for the inbox rules/state configuration.
55 // Fields to be compared
73 char *field_keys[] = {
91 // Field comparison operators
100 char *fcomp_keys[] = {
118 char *action_keys[] = {
127 // Size comparison operators
132 char *scomp_keys[] = {
142 char *final_keys[] = {
147 // This data structure represents ONE inbox rule within the configuration.
150 int field_compare_op;
151 char compared_value[128];
155 char file_into[ROOMNAMELEN];
156 char redirect_to[1024];
157 char autoreply_message[SIZ];
161 // This data structure represents the entire inbox rules configuration AND current state for a single user.
169 // Destructor for 'struct inboxrules'
170 void free_inbox_rules(struct inboxrules *ibr) {
176 // Constructor for 'struct inboxrules' that deserializes the configuration from text input.
177 struct inboxrules *deserialize_inbox_rules(char *serialized_rules) {
180 if (!serialized_rules) {
184 /* Make a copy of the supplied buffer because we're going to shit all over it with strtok_r() */
185 char *sr = strdup(serialized_rules);
190 struct inboxrules *ibr = malloc(sizeof(struct inboxrules));
194 memset(ibr, 0, sizeof(struct inboxrules));
198 while ((token = strtok_r(rest, "\n", &rest))) {
200 // For backwards compatibility, "# WEBCIT_RULE" is an alias for "rule".
201 // Prior to version 930, WebCit converted its rules to Sieve scripts, but saved the rules as comments for later re-editing.
202 // Now, the rules hidden in the comments become the real rules.
203 if (!strncasecmp(token, "# WEBCIT_RULE|", 14)) {
204 strcpy(token, "rule|");
205 strcpy(&token[5], &token[14]);
208 // Lines containing actual rules are double-serialized with Base64. It seemed like a good idea at the time :(
209 if (!strncasecmp(token, "rule|", 5)) {
210 remove_token(&token[5], 0, '|');
211 char *decoded_rule = malloc(strlen(token));
212 CtdlDecodeBase64(decoded_rule, &token[5], strlen(&token[5]));
214 ibr->rules = realloc(ibr->rules, (sizeof(struct irule) * ibr->num_rules));
215 struct irule *new_rule = &ibr->rules[ibr->num_rules - 1];
216 memset(new_rule, 0, sizeof(struct irule));
218 // We have a rule , now parse it
220 int nt = num_tokens(decoded_rule, '|');
221 for (int t=0; t<nt; ++t) {
222 extract_token(rtoken, decoded_rule, t, '|', sizeof(rtoken));
225 case 1: // field to compare
226 for (i=0; i<=field_all; ++i) {
227 if (!strcasecmp(rtoken, field_keys[i])) {
228 new_rule->compared_field = i;
232 case 2: // field comparison operation
233 for (i=0; i<=fcomp_notmatches; ++i) {
234 if (!strcasecmp(rtoken, fcomp_keys[i])) {
235 new_rule->field_compare_op = i;
239 case 3: // field comparison value
240 safestrncpy(new_rule->compared_value, rtoken, sizeof(new_rule->compared_value));
242 case 4: // size comparison operation
243 for (i=0; i<=scomp_smaller; ++i) {
244 if (!strcasecmp(rtoken, scomp_keys[i])) {
245 new_rule->size_compare_op = i;
249 case 5: // size comparison value
250 new_rule->compared_size = atol(rtoken);
253 for (i=0; i<=action_vacation; ++i) {
254 if (!strcasecmp(rtoken, action_keys[i])) {
255 new_rule->action = i;
259 case 7: // file into (target room)
260 safestrncpy(new_rule->file_into, rtoken, sizeof(new_rule->file_into));
262 case 8: // redirect to (target address)
263 safestrncpy(new_rule->redirect_to, rtoken, sizeof(new_rule->redirect_to));
265 case 9: // autoreply message
266 safestrncpy(new_rule->autoreply_message, rtoken, sizeof(new_rule->autoreply_message));
268 case 10: // final_action;
269 for (i=0; i<=final_stop; ++i) {
270 if (!strcasecmp(rtoken, final_keys[i])) {
271 new_rule->final_action = i;
282 // "lastproc" indicates the newest message number in the inbox that was previously processed by our inbox rules.
283 // This is a legacy location for this value and will only be used if it's the only one present.
284 else if (!strncasecmp(token, "lastproc|", 5)) {
285 ibr->lastproc = atol(&token[9]);
288 // Lines which do not contain a recognizable token must be IGNORED. These lines may be left over
289 // from a previous version and will disappear when we rewrite the config.
293 free(sr); // free our copy of the source buffer that has now been trashed with null bytes...
294 return(ibr); // and return our complex data type to the caller.
298 // Perform the "fileinto" action (save the message in another room)
299 // Returns: 1 or 0 to tell the caller to keep (1) or delete (0) the inbox copy of the message.
301 int inbox_do_fileinto(struct irule *rule, long msgnum) {
302 char *dest_folder = rule->file_into;
303 char original_room_name[ROOMNAMELEN];
304 char foldername[ROOMNAMELEN];
307 // Situations where we want to just keep the message in the inbox:
309 (IsEmptyStr(dest_folder)) // no destination room was specified
310 || (!strcasecmp(dest_folder, "INBOX")) // fileinto inbox is the same as keep
311 || (!strcasecmp(dest_folder, MAILROOM)) // fileinto "Mail" is the same as keep
313 return(1); // don't delete the inbox copy if this failed
316 // Remember what room we came from
317 safestrncpy(original_room_name, CC->room.QRname, sizeof original_room_name);
319 // First try a mailbox name match (check personal mail folders first)
320 strcpy(foldername, original_room_name); // This keeps the user namespace of the inbox
321 snprintf(&foldername[10], sizeof(foldername)-10, ".%s", dest_folder); // And this tacks on the target room name
322 c = CtdlGetRoom(&CC->room, foldername);
324 // Then a regular room name match (public and private rooms)
326 safestrncpy(foldername, dest_folder, sizeof foldername);
327 c = CtdlGetRoom(&CC->room, foldername);
331 syslog(LOG_WARNING, "inboxrules: target <%s> does not exist", dest_folder);
332 return(1); // don't delete the inbox copy if this failed
335 // Yes, we actually have to go there
336 CtdlUserGoto(NULL, 0, 0, NULL, NULL, NULL, NULL);
338 c = CtdlSaveMsgPointersInRoom(NULL, &msgnum, 1, 0, NULL, 0);
340 // Go back to the room we came from
341 if (strcasecmp(original_room_name, CC->room.QRname)) {
342 CtdlUserGoto(original_room_name, 0, 0, NULL, NULL, NULL, NULL);
345 return(0); // delete the inbox copy
349 // Perform the "redirect" action (divert the message to another email address)
350 // Returns: 1 or 0 to tell the caller to keep (1) or delete (0) the inbox copy of the message.
352 int inbox_do_redirect(struct irule *rule, long msgnum) {
353 if (IsEmptyStr(rule->redirect_to)) {
354 syslog(LOG_WARNING, "inboxrules: inbox_do_redirect() invalid recipient <%s>", rule->redirect_to);
355 return(1); // don't delete the inbox copy if this failed
358 recptypes *valid = validate_recipients(rule->redirect_to, NULL, 0);
360 syslog(LOG_WARNING, "inboxrules: inbox_do_redirect() invalid recipient <%s>", rule->redirect_to);
361 return(1); // don't delete the inbox copy if this failed
363 if (valid->num_error > 0) {
364 free_recipients(valid);
365 syslog(LOG_WARNING, "inboxrules: inbox_do_redirect() invalid recipient <%s>", rule->redirect_to);
366 return(1); // don't delete the inbox copy if this failed
369 struct CtdlMessage *msg = CtdlFetchMessage(msgnum, 1);
371 free_recipients(valid);
372 syslog(LOG_WARNING, "inboxrules: cannot reload message %ld for forwarding", msgnum);
373 return(1); // don't delete the inbox copy if this failed
376 CtdlSubmitMsg(msg, valid, NULL, 0); // send the message to the new recipient
377 free_recipients(valid);
379 return(0); // delete the inbox copy
384 * Perform the "reject" action (delete the message, and tell the sender we deleted it)
386 void inbox_do_reject(struct irule *rule, struct CtdlMessage *msg) {
387 syslog(LOG_DEBUG, "inbox_do_reject: sender: <%s>, reject message: <%s>",
388 msg->cm_fields[erFc822Addr],
389 rule->autoreply_message
392 // If we can't determine who sent the message, reject silently.
394 if (!IsEmptyStr(msg->cm_fields[eMessagePath])) {
395 sender = msg->cm_fields[eMessagePath];
397 else if (!IsEmptyStr(msg->cm_fields[erFc822Addr])) {
398 sender = msg->cm_fields[erFc822Addr];
404 // Assemble the reject message.
405 char *reject_text = malloc(strlen(rule->autoreply_message) + 1024);
406 if (reject_text == NULL) {
410 "Content-type: text/plain\n"
412 "The message was refused by the recipient's mail filtering program.\n"
413 "The reason given was as follows:\n"
418 rule->autoreply_message
421 // Deliver the message
424 msg->cm_fields[eenVelopeTo],
429 "Delivery status notification"
436 * Perform the "vacation" action (send an automatic response)
438 void inbox_do_vacation(struct irule *rule, struct CtdlMessage *msg) {
439 syslog(LOG_DEBUG, "inbox_do_vacation: sender: <%s>, vacation message: <%s>",
440 msg->cm_fields[erFc822Addr],
441 rule->autoreply_message
444 // If we can't determine who sent the message, reject silently.
446 if (!IsEmptyStr(msg->cm_fields[eMessagePath])) {
447 sender = msg->cm_fields[eMessagePath];
449 else if (!IsEmptyStr(msg->cm_fields[erFc822Addr])) {
450 sender = msg->cm_fields[erFc822Addr];
458 // FIXME use the S_USETABLE to avoid sending the same correspondent a vacation message repeatedly.
463 // Assemble the reject message.
464 char *reject_text = malloc(strlen(rule->autoreply_message) + 1024);
465 if (reject_text == NULL) {
469 "Content-type: text/plain\n"
474 rule->autoreply_message
477 // Deliver the message
480 msg->cm_fields[eenVelopeTo],
485 "Delivery status notification"
492 * Process a single message. We know the room, the user, the rules, the message number, etc.
494 void inbox_do_msg(long msgnum, void *userdata) {
495 struct inboxrules *ii = (struct inboxrules *) userdata;
496 struct CtdlMessage *msg = NULL; // If we are loading a message to process, put it here.
497 int headers_loaded = 0; // Did we load the headers yet? Do it only once.
498 int body_loaded = 0; // Did we load the message body yet? Do it only once.
499 int metadata_loaded = 0; // Did we load the metadata yet? Do it only once.
500 struct MetaData smi; // If we are loading the metadata to compare, put it here.
501 int rule_activated = 0; // On each rule, this is set if the compare succeeds and the rule activates.
502 char compare_me[SIZ]; // On each rule, we will store the field to be compared here.
503 int keep_message = 1; // Nonzero to keep the message in the inbox after processing, 0 to delete it.
506 syslog(LOG_DEBUG, "inboxrules: processing message #%ld which is higher than %ld, we are in %s", msgnum, ii->lastproc, CC->room.QRname);
508 if (ii->num_rules <= 0) {
509 syslog(LOG_DEBUG, "inboxrules: rule set is empty");
513 for (i=0; i<ii->num_rules; ++i) {
514 syslog(LOG_DEBUG, "inboxrules: processing rule %d is %s", i, field_keys[ ii->rules[i].compared_field ]);
517 // Before doing a field compare, check to see if we have the correct parts of the message in memory.
519 switch(ii->rules[i].compared_field) {
520 // These fields require loading only the top-level headers
521 case field_from: // From:
522 case field_tocc: // To: or Cc:
523 case field_subject: // Subject:
524 case field_replyto: // Reply-to:
525 case field_listid: // List-ID:
526 case field_envto: // Envelope-to:
527 case field_envfrom: // Return-path:
528 if (!headers_loaded) {
529 syslog(LOG_DEBUG, "inboxrules: loading headers for message %ld", msgnum);
530 msg = CtdlFetchMessage(msgnum, 0);
537 // These fields are not stored as Citadel headers, and therefore require a full message load.
539 case field_resentfrom:
542 case field_xspamflag:
543 case field_xspamstatus:
545 syslog(LOG_DEBUG, "inboxrules: loading all of message %ld", msgnum);
549 msg = CtdlFetchMessage(msgnum, 1);
558 if (!metadata_loaded) {
559 syslog(LOG_DEBUG, "inboxrules: loading metadata for message %ld", msgnum);
560 GetMetaData(&smi, msgnum);
565 syslog(LOG_DEBUG, "inboxrules: this is an always-on rule");
568 syslog(LOG_DEBUG, "inboxrules: unknown rule key");
571 // If the rule involves a field comparison, load the field to be compared.
573 switch(ii->rules[i].compared_field) {
575 case field_from: // From:
576 if (!IsEmptyStr(msg->cm_fields[erFc822Addr])) {
577 safestrncpy(compare_me, msg->cm_fields[erFc822Addr], sizeof compare_me);
580 case field_tocc: // To: or Cc:
581 if (!IsEmptyStr(msg->cm_fields[eRecipient])) {
582 safestrncpy(compare_me, msg->cm_fields[eRecipient], sizeof compare_me);
584 if (!IsEmptyStr(msg->cm_fields[eCarbonCopY])) {
585 if (!IsEmptyStr(compare_me)) {
586 strcat(compare_me, ",");
588 safestrncpy(&compare_me[strlen(compare_me)], msg->cm_fields[eCarbonCopY], (sizeof compare_me - strlen(compare_me)));
591 case field_subject: // Subject:
592 if (!IsEmptyStr(msg->cm_fields[eMsgSubject])) {
593 safestrncpy(compare_me, msg->cm_fields[eMsgSubject], sizeof compare_me);
596 case field_replyto: // Reply-to:
597 if (!IsEmptyStr(msg->cm_fields[eReplyTo])) {
598 safestrncpy(compare_me, msg->cm_fields[eReplyTo], sizeof compare_me);
601 case field_listid: // List-ID:
602 if (!IsEmptyStr(msg->cm_fields[eListID])) {
603 safestrncpy(compare_me, msg->cm_fields[eListID], sizeof compare_me);
606 case field_envto: // Envelope-to:
607 if (!IsEmptyStr(msg->cm_fields[eenVelopeTo])) {
608 safestrncpy(compare_me, msg->cm_fields[eenVelopeTo], sizeof compare_me);
611 case field_envfrom: // Return-path:
612 if (!IsEmptyStr(msg->cm_fields[eMessagePath])) {
613 safestrncpy(compare_me, msg->cm_fields[eMessagePath], sizeof compare_me);
618 case field_resentfrom:
621 case field_xspamflag:
622 case field_xspamstatus:
628 // Message data to compare is loaded, now do something.
629 switch(ii->rules[i].compared_field) {
630 case field_from: // From:
631 case field_tocc: // To: or Cc:
632 case field_subject: // Subject:
633 case field_replyto: // Reply-to:
634 case field_listid: // List-ID:
635 case field_envto: // Envelope-to:
636 case field_envfrom: // Return-path:
638 case field_resentfrom:
641 case field_xspamflag:
642 case field_xspamstatus:
644 // For all of the above fields, we can compare the field we've loaded into the buffer.
645 syslog(LOG_DEBUG, "Value of field to compare is: <%s>", compare_me);
646 switch(ii->rules[i].field_compare_op) {
649 rule_activated = (bmstrcasestr(compare_me, ii->rules[i].compared_value) ? 1 : 0);
650 syslog(LOG_DEBUG, "Does %s contain %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
652 case fcomp_notcontains:
653 case fcomp_notmatches:
654 rule_activated = (bmstrcasestr(compare_me, ii->rules[i].compared_value) ? 0 : 1);
655 syslog(LOG_DEBUG, "Does %s contain %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
658 rule_activated = (strcasecmp(compare_me, ii->rules[i].compared_value) ? 0 : 1);
659 syslog(LOG_DEBUG, "Does %s equal %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
662 rule_activated = (strcasecmp(compare_me, ii->rules[i].compared_value) ? 1 : 0);
663 syslog(LOG_DEBUG, "Does %s equal %s? %s", compare_me, ii->rules[i].compared_value, rule_activated?"yes":"no");
670 syslog(LOG_DEBUG, "comparing actual message size %ld to rule message size %ld", smi.meta_rfc822_length, ii->rules[i].compared_size);
671 switch(ii->rules[i].field_compare_op) {
673 rule_activated = ((smi.meta_rfc822_length > ii->rules[i].compared_size) ? 1 : 0);
674 syslog(LOG_DEBUG, "Is %ld larger than %ld? %s", smi.meta_rfc822_length, ii->rules[i].compared_size, (smi.meta_rfc822_length > ii->rules[i].compared_size) ? "yes":"no");
677 rule_activated = ((smi.meta_rfc822_length < ii->rules[i].compared_size) ? 1 : 0);
678 syslog(LOG_DEBUG, "Is %ld smaller than %ld? %s", smi.meta_rfc822_length, ii->rules[i].compared_size, (smi.meta_rfc822_length < ii->rules[i].compared_size) ? "yes":"no");
682 case field_all: // The "all messages" rule ALWAYS triggers
685 default: // no matches, fall through and do nothing
686 syslog(LOG_DEBUG, "inboxrules: an unknown field comparison was encountered");
691 // If the rule matched, perform the requested action.
692 if (rule_activated) {
693 syslog(LOG_DEBUG, "inboxrules: rule activated");
695 // Perform the requested action
696 switch(ii->rules[i].action) {
704 inbox_do_reject(&ii->rules[i], msg);
707 case action_fileinto:
708 keep_message = inbox_do_fileinto(&ii->rules[i], msgnum);
710 case action_redirect:
711 keep_message = inbox_do_redirect(&ii->rules[i], msgnum);
713 case action_vacation:
714 inbox_do_vacation(&ii->rules[i], msg);
719 // Now perform the "final" action (anything other than "stop" means continue)
720 if (ii->rules[i].final_action == final_stop) {
721 syslog(LOG_DEBUG, "inboxrules: stop processing");
722 i = ii->num_rules + 1; // throw us out of scope to stop
728 syslog(LOG_DEBUG, "inboxrules: rule not activated");
732 if (msg != NULL) { // Delete the copy of the message that is currently in memory. We don't need it anymore.
736 if (!keep_message) { // Delete the copy of the message that is currently in the inbox, if rules dictated that.
737 syslog(LOG_DEBUG, "inboxrules: delete %ld from inbox", msgnum);
738 CtdlDeleteMessages(CC->room.QRname, &msgnum, 1, ""); // we're in the inbox already
741 ii->lastproc = msgnum; // make note of the last message we processed, so we don't scan the whole inbox again
746 * A user account is identified as requring inbox processing.
749 void do_inbox_processing_for_user(long usernum) {
750 struct CtdlMessage *msg;
751 struct inboxrules *ii;
752 char roomname[ROOMNAMELEN];
755 if (CtdlGetUserByNumber(&CC->user, usernum) != 0) { // grab the user record
756 return; // and bail out if we were given an invalid user
759 strcpy(username, CC->user.fullname); // save the user name so we can fetch it later and lock it
761 if (CC->user.msgnum_inboxrules <= 0) {
762 return; // this user has no inbox rules
765 msg = CtdlFetchMessage(CC->user.msgnum_inboxrules, 1);
767 return; // config msgnum is set but that message does not exist
770 ii = deserialize_inbox_rules(msg->cm_fields[eMesageText]);
774 return; // config message exists but body is null
778 syslog(LOG_DEBUG, "ii->lastproc %ld", ii->lastproc);
779 syslog(LOG_DEBUG, "CC->user.lastproc_inboxrules %ld", CC->user.lastproc_inboxrules);
781 if (ii->lastproc > CC->user.lastproc_inboxrules) { // There might be a "last message processed" number left over
782 CC->user.lastproc_inboxrules = ii->lastproc; // in the ruleset from a previous version. Use this if it is
783 } // a higher number.
785 ii->lastproc = CC->user.lastproc_inboxrules;
788 long original_lastproc = ii->lastproc;
789 syslog(LOG_DEBUG, "inboxrules: for %s, messages newer than %ld", CC->user.fullname, original_lastproc);
791 // Go to the user's inbox room and process all new messages
792 snprintf(roomname, sizeof roomname, "%010ld.%s", usernum, MAILROOM);
793 if (CtdlGetRoom(&CC->room, roomname) == 0) {
794 CtdlForEachMessage(MSGS_GT, ii->lastproc, NULL, NULL, NULL, inbox_do_msg, (void *) ii);
797 // Record the number of the last message we processed
798 if (ii->lastproc > original_lastproc) {
799 CtdlGetUserLock(&CC->user, username);
800 CC->user.lastproc_inboxrules = ii->lastproc; // Avoid processing the entire inbox next time
801 CtdlPutUserLock(&CC->user);
804 // And free the memory.
805 free_inbox_rules(ii);
810 * Here is an array of users (by number) who have received messages in their inbox and may require processing.
812 long *users_requiring_inbox_processing = NULL;
814 int num_urip_alloc = 0;
818 * Perform inbox processing for all rooms which require it
820 void perform_inbox_processing(void) {
822 return; // no action required
825 for (int i=0; i<num_urip; ++i) {
826 do_inbox_processing_for_user(users_requiring_inbox_processing[i]);
829 free(users_requiring_inbox_processing);
830 users_requiring_inbox_processing = NULL;
837 * This function is called after a message is saved to a room.
838 * If it's someone's inbox, we have to check for inbox rules
840 int serv_inboxrules_roomhook(struct ctdlroom *room) {
842 // Is this someone's inbox?
843 if (!strcasecmp(&room->QRname[11], MAILROOM)) {
844 long usernum = atol(room->QRname);
847 // first check to see if this user is already on the list
849 for (int i=0; i<=num_urip; ++i) {
850 if (users_requiring_inbox_processing[i] == usernum) { // already on the list!
856 // make room if we need to
857 if (num_urip_alloc == 0) {
858 num_urip_alloc = 100;
859 users_requiring_inbox_processing = malloc(sizeof(long) * num_urip_alloc);
861 else if (num_urip >= num_urip_alloc) {
862 num_urip_alloc += 100;
863 users_requiring_inbox_processing = realloc(users_requiring_inbox_processing, (sizeof(long) * num_urip_alloc));
866 // now add the user to the list
867 users_requiring_inbox_processing[num_urip++] = usernum;
871 // No errors are possible from this function.
880 * This is a client-facing function which fetches the user's inbox rules -- it omits all lines containing anything other than a rule.
882 * hmmmmm ... should we try to rebuild this in terms of deserialize_inbox_rules() instread?
884 void cmd_gibr(char *argbuf) {
886 if (CtdlAccessCheck(ac_logged_in)) return;
888 cprintf("%d inbox rules for %s\n", LISTING_FOLLOWS, CC->user.fullname);
890 struct CtdlMessage *msg = CtdlFetchMessage(CC->user.msgnum_inboxrules, 1);
892 if (!CM_IsEmpty(msg, eMesageText)) {
894 char *rest = msg->cm_fields[eMesageText];
895 while ((token = strtok_r(rest, "\n", &rest))) {
897 // for backwards compatibility, "# WEBCIT_RULE" is an alias for "rule"
898 if (!strncasecmp(token, "# WEBCIT_RULE|", 14)) {
899 strcpy(token, "rule|");
900 strcpy(&token[5], &token[14]);
903 // Output only lines containing rules.
904 if (!strncasecmp(token, "rule|", 5)) {
905 cprintf("%s\n", token);
908 cprintf("# invalid rule found : %s\n", token);
919 * Rewrite the rule set to disk after it has been modified
920 * Called by cmd_pibr()
921 * Returns the msgnum of the new rules message
923 void rewrite_rules_to_disk(const char *new_config) {
924 long old_msgnum = CC->user.msgnum_inboxrules;
925 char userconfigroomname[ROOMNAMELEN];
926 CtdlMailboxName(userconfigroomname, sizeof userconfigroomname, &CC->user, USERCONFIGROOM);
927 long new_msgnum = quickie_message("Citadel", NULL, NULL, userconfigroomname, new_config, FMT_RFC822, "inbox rules configuration");
928 CtdlGetUserLock(&CC->user, CC->curr_user);
929 CC->user.msgnum_inboxrules = new_msgnum; // Now we know where to get the rules next time
930 CC->user.lastproc_inboxrules = new_msgnum; // Avoid processing the entire inbox next time
931 CtdlPutUserLock(&CC->user);
932 if (old_msgnum > 0) {
933 syslog(LOG_DEBUG, "Deleting old message %ld from %s", old_msgnum, userconfigroomname);
934 CtdlDeleteMessages(userconfigroomname, &old_msgnum, 1, "");
942 * User transmits the new inbox rules for the account. They are inserted into the account, replacing the ones already there.
944 void cmd_pibr(char *argbuf) {
945 if (CtdlAccessCheck(ac_logged_in)) return;
948 cprintf("%d send new rules\n", SEND_LISTING);
949 char *newrules = CtdlReadMessageBody(HKEY("000"), CtdlGetConfigLong("c_maxmsglen"), NULL, 0);
950 StrBuf *NewConfig = NewStrBufPlain("Content-type: application/x-citadel-sieve-config; charset=UTF-8\nContent-transfer-encoding: 8bit\n\n", -1);
953 char *rest = newrules;
954 while ((token = strtok_r(rest, "\n", &rest))) {
955 // Accept only lines containing rules
956 if (!strncasecmp(token, "rule|", 5)) {
957 StrBufAppendBufPlain(NewConfig, token, -1, 0);
958 StrBufAppendBufPlain(NewConfig, HKEY("\n"), 0);
962 rewrite_rules_to_disk(ChrPtr(NewConfig));
963 FreeStrBuf(&NewConfig);
967 CTDL_MODULE_INIT(sieve)
971 CtdlRegisterProtoHook(cmd_gibr, "GIBR", "Get InBox Rules");
972 CtdlRegisterProtoHook(cmd_pibr, "PIBR", "Put InBox Rules");
973 CtdlRegisterRoomHook(serv_inboxrules_roomhook);
974 CtdlRegisterSessionHook(perform_inbox_processing, EVT_HOUSE, PRIO_HOUSE + 10);
977 /* return our module name for the log */