dbaa9dbd6c
on files in plugins dir: fixed a number of POD errors formatted some # comments into POD removed bare 1; (these are plugins, not perl modules) most instances of this were copy/pasted from a previous plugin that had it removed instances of # vim ts=N ... they weren't consistent, many didn't match .perltidyrc on modules that failed perl -c tests, added 'use Qpsmtpd::Constants;' Conflicts: plugins/async/check_earlytalker plugins/async/dns_whitelist_soft plugins/async/dnsbl plugins/async/queue/smtp-forward plugins/async/require_resolvable_fromhost plugins/async/rhsbl plugins/async/uribl plugins/auth/auth_checkpassword plugins/auth/auth_cvm_unix_local plugins/auth/auth_flat_file plugins/auth/auth_ldap_bind plugins/auth/auth_vpopmail plugins/auth/auth_vpopmail_sql plugins/auth/authdeny plugins/check_badmailfromto plugins/check_badrcptto_patterns plugins/check_bogus_bounce plugins/check_earlytalker plugins/check_norelay plugins/check_spamhelo plugins/connection_time plugins/dns_whitelist_soft plugins/dnsbl plugins/domainkeys plugins/greylisting plugins/hosts_allow plugins/http_config plugins/logging/adaptive plugins/logging/apache plugins/logging/connection_id plugins/logging/transaction_id plugins/logging/warn plugins/milter plugins/queue/exim-bsmtp plugins/queue/maildir plugins/queue/postfix-queue plugins/queue/smtp-forward plugins/quit_fortune plugins/random_error plugins/rcpt_map plugins/rcpt_regexp plugins/relay_only plugins/require_resolvable_fromhost plugins/rhsbl plugins/sender_permitted_from plugins/spamassassin plugins/tls plugins/tls_cert plugins/uribl plugins/virus/aveclient plugins/virus/bitdefender plugins/virus/clamav plugins/virus/clamdscan plugins/virus/hbedv plugins/virus/kavscanner plugins/virus/klez_filter plugins/virus/sophie plugins/virus/uvscan
49 lines
1.2 KiB
Perl
49 lines
1.2 KiB
Perl
#!perl -Tw
|
|
|
|
=head1 NAME
|
|
|
|
rcpt_ok
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
this plugin checks the standard rcpthosts config
|
|
|
|
It should be configured to be run _LAST_!
|
|
|
|
=cut
|
|
|
|
use Qpsmtpd::DSN;
|
|
|
|
sub hook_rcpt {
|
|
my ($self, $transaction, $recipient, %param) = @_;
|
|
my $host = lc $recipient->host;
|
|
|
|
my @rcpt_hosts = ($self->qp->config("me"), $self->qp->config("rcpthosts"));
|
|
|
|
# Allow 'no @' addresses for 'postmaster' and 'abuse'
|
|
# qmail-smtpd will do this for all users without a domain, but we'll
|
|
# be a bit more picky. Maybe that's a bad idea.
|
|
my $user = $recipient->user;
|
|
$host = $self->qp->config("me")
|
|
if ($host eq "" && (lc $user eq "postmaster" || lc $user eq "abuse"));
|
|
|
|
# Check if this recipient host is allowed
|
|
for my $allowed (@rcpt_hosts) {
|
|
$allowed =~ s/^\s*(\S+)/$1/;
|
|
return (OK) if $host eq lc $allowed;
|
|
return (OK) if substr($allowed,0,1) eq "." and $host =~ m/\Q$allowed\E$/i;
|
|
}
|
|
|
|
my $more_rcpt_hosts = $self->qp->config('morercpthosts', 'map');
|
|
return (OK) if exists $more_rcpt_hosts->{$host};
|
|
|
|
if ( $self->qp->connection->relay_client ) { # failsafe
|
|
return (OK);
|
|
}
|
|
else {
|
|
# default of relaying_denied is obviously DENY,
|
|
# we use the default "Relaying denied" message...
|
|
return Qpsmtpd::DSN->relaying_denied();
|
|
}
|
|
}
|