]> git.proxmox.com Git - pve-manager.git/blame_incremental - bin/pvemailforward.pl
bump version to 8.2.7
[pve-manager.git] / bin / pvemailforward.pl
... / ...
CommitLineData
1#!/usr/bin/perl -w -T
2
3use strict;
4use warnings;
5use PVE::Tools;
6use PVE::SafeSyslog;
7use PVE::AccessControl;
8use PVE::Cluster qw (cfs_read_file);
9
10# NOTE: we need to run this with setgid www-data
11# else we cant read /etc/pve/user.cfg
12
13$( = $); # $GID = $EGID
14
15$ENV{'PATH'} = '/sbin:/bin:/usr/sbin:/usr/bin';
16
17initlog('pvemailforward');
18
19
20PVE::Cluster::cfs_update();
21
22eval {
23 my $usercfg = cfs_read_file("user.cfg");
24 my $rootcfg = $usercfg->{users}->{'root@pam'} || {};
25 my $mailto = $rootcfg->{email};
26
27 die "user 'root\@pam' does not have a email address\n" if !$mailto;
28
29 syslog("info", "forward mail to <$mailto>");
30
31 # we never send DSN (avoid mail loops)
32 open(CMD, "|sendmail -bm -N never $mailto") ||
33 die "can't exec sendmail - $!\n";
34 while (<>) { print CMD $_; }
35 close(CMD);
36};
37if (my $err = $@) {
38 syslog('err', "mail forward failed: $err");
39}
40
41exit(0);