use RRDs;
use Filesys::Df;
use Encode;
+use utf8;
+no utf8;
+
use HTML::Entities;
use PVE::ProcFSTools;
PVE::JSONSchema::register_standard_option('pmg-email-address', {
description => "Email Address (allow most characters).",
type => 'string',
- pattern => '(?:|[^\s\/\@]+\@[^\s\/\@]+)',
+ pattern => '(?:[^\s\/\\\@]+\@[^\s\/\\\@]+)',
maxLength => 512,
minLength => 3,
});
+PVE::JSONSchema::register_standard_option('pmg-whiteblacklist-entry-list', {
+ description => "White/Blacklist entry list (allow most characters). Can contain globs",
+ type => 'string',
+ pattern => '(?:[^\s\/\\\;\,]+)(?:\,[^\s\/\\\;\,]+)*',
+ minLength => 3,
+});
+
sub lastid {
my ($dbh, $seq) = @_;
}
}
- if (!$smtp->mail($sender)) {
+ my $has_utf8_targets = 0;
+ foreach my $target (@$targets) {
+ if (utf8::is_utf8($target)) {
+ $has_utf8_targets = 1;
+ last;
+ }
+ }
+
+ my $mail_opts = " BODY=8BITMIME";
+ my $sender_addr;
+ if (utf8::is_utf8($sender)) {
+ $sender_addr = encode('UTF-8', $smtp->_addr($sender));
+ $mail_opts .= " SMTPUTF8";
+ } else {
+ $sender_addr = $smtp->_addr($sender);
+ $mail_opts .= " SMTPUTF8" if $has_utf8_targets;
+ }
+
+ if (!$smtp->_MAIL("FROM:" . $sender_addr . $mail_opts)) {
syslog('err', "smtp error - got: %s %s", $smtp->code, scalar ($smtp->message));
die "smtp from: ERROR";
}
- my $dsnopts = $nodsn ? {Notify => ['NEVER']} : {};
+ my $rcpt_opts = $nodsn ? " NOTIFY=NEVER" : "";
- if (!$smtp->to (@$targets, $dsnopts)) {
- syslog ('err', "smtp error - got: %s %s", $smtp->code, scalar($smtp->message));
- die "smtp to: ERROR";
+ foreach my $target (@$targets) {
+ my $rcpt_addr;
+ if (utf8::is_utf8($target)) {
+ $rcpt_addr = encode('UTF-8', $smtp->_addr($target));
+ } else {
+ $rcpt_addr = $smtp->_addr($target);
+ }
+ if (!$smtp->_RCPT("TO:" . $rcpt_addr . $rcpt_opts)) {
+ syslog ('err', "smtp error - got: %s %s", $smtp->code, scalar($smtp->message));
+ die "smtp to: ERROR";
+ }
}
# Output the head:
return wantarray ? ($resid, $rescode, $resmess) : $resid;
}
+sub analyze_custom_check {
+ my ($queue, $dname, $pmg_cfg) = @_;
+
+ my $enable_custom_check = $pmg_cfg->get('admin', 'custom_check');
+ return undef if !$enable_custom_check;
+
+ my $timeout = 60*5;
+ my $customcheck_exe = $pmg_cfg->get('admin', 'custom_check_path');
+ my $customcheck_apiver = 'v1';
+ my ($csec, $usec) = gettimeofday();
+
+ my $vinfo;
+ my $spam_score;
+
+ eval {
+
+ my $log_err = sub {
+ my ($errmsg) = @_;
+ $errmsg =~ s/%/%%/;
+ syslog('err', $errmsg);
+ };
+
+ my $customcheck_output_apiver;
+ my $have_result;
+ my $parser = sub {
+ my ($line) = @_;
+
+ my $result_flag;
+ if ($line =~ /^v\d$/) {
+ die "api version already defined!\n" if defined($customcheck_output_apiver);
+ $customcheck_output_apiver = $line;
+ die "api version mismatch - expected $customcheck_apiver, got $customcheck_output_apiver !\n"
+ if ($customcheck_output_apiver ne $customcheck_apiver);
+ } elsif ($line =~ /^SCORE: (-?[0-9]+|.[0-9]+|[0-9]+.[0-9]+)$/) {
+ $spam_score = $1;
+ $result_flag = 1;
+ } elsif ($line =~ /^VIRUS: (.+)$/) {
+ $vinfo = $1;
+ $result_flag = 1;
+ } elsif ($line =~ /^OK$/) {
+ $result_flag = 1;
+ } else {
+ die "got unexpected output!\n";
+ }
+ die "got more than 1 result outputs\n" if ( $have_result && $result_flag);
+ $have_result = $result_flag;
+ };
+
+ PVE::Tools::run_command([$customcheck_exe, $customcheck_apiver, $dname],
+ errmsg => "$queue->{logid} custom check error",
+ errfunc => $log_err, outfunc => $parser, timeout => $timeout);
+
+ die "no api version returned\n" if !defined($customcheck_output_apiver);
+ die "no result output!\n" if !$have_result;
+ };
+ my $err = $@;
+
+ if ($vinfo) {
+ syslog('info', "$queue->{logid}: virus detected: $vinfo (custom)");
+ }
+
+ my ($csec_end, $usec_end) = gettimeofday();
+ $queue->{ptime_custom} =
+ int (($csec_end-$csec)*1000 + ($usec_end - $usec)/1000);
+
+ if ($err) {
+ syslog ('err', $err);
+ $vinfo = undef;
+ $queue->{errors} = 1;
+ }
+
+ $queue->{vinfo_custom} = $vinfo;
+ $queue->{spam_custom} = $spam_score;
+
+ return ($vinfo, $spam_score);
+}
+
sub analyze_virus_clam {
my ($queue, $dname, $pmg_cfg) = @_;