summaryrefslogtreecommitdiff
path: root/sqmail-4.3.07/src/qmail-mrtg.c
diff options
context:
space:
mode:
Diffstat (limited to 'sqmail-4.3.07/src/qmail-mrtg.c')
-rw-r--r--sqmail-4.3.07/src/qmail-mrtg.c322
1 files changed, 322 insertions, 0 deletions
diff --git a/sqmail-4.3.07/src/qmail-mrtg.c b/sqmail-4.3.07/src/qmail-mrtg.c
new file mode 100644
index 0000000..c956196
--- /dev/null
+++ b/sqmail-4.3.07/src/qmail-mrtg.c
@@ -0,0 +1,322 @@
+#include <unistd.h>
+#include "stralloc.h"
+#include "buffer.h"
+#include "getln.h"
+#include "exit.h"
+#include "open.h"
+#include "scan.h"
+#include "fmt.h"
+#include "case.h"
+#include "now.h"
+#include "str.h"
+#include "datetime.h"
+#include "logmsg.h"
+
+#define WHO "qmail-mrtg"
+#define TAI64NLEN 24
+
+/** @file qmail-mrtg.c
+ @return 0: ok
+ 1: Error: No TAI64N timestamp available
+ 2: Warning: Not enough time left between calls
+*/
+
+/* qmail-send */
+
+int local = 0;
+int remote = 0;
+int success = 0;
+int failure = 0;
+int bytes = 0;
+int tlstrans = 0;
+int deferral = 0;
+int bounces = 0;
+int triples = 0;
+int qmtp = 0;
+int qmtps = 0;
+
+/* qmail-smtpd */
+
+int asessions = 0;
+int rsessions = 0;
+int aorig = 0;
+int arcpt = 0;
+int rsend = 0;
+int rhelo = 0;
+int rorigbad = 0;
+int rorigdns = 0;
+int rrcptbad = 0;
+int rrcptfail = 0;
+int rsize = 0;
+int rmime = 0;
+int rloader = 0;
+int rvirus = 0;
+int rspam = 0;
+int aauth = 0;
+int rauth = 0;
+int atls = 0;
+int rtls = 0;
+int spfpass = 0;
+int spfail = 0;
+
+/* qmail-pop3d */
+
+int apop = 0;
+int rpop = 0;
+int pok = 0;
+int pdeny = 0;
+
+/* *server + rblsmtpd */
+
+int sok = 0;
+int sdeny = 0;
+int greet = 0;
+int grey = 0;
+int rbl = 0;
+
+char bufsmall[BUFFER_SMALL];
+buffer bo = BUFFER_INIT(write,1,bufsmall,sizeof(bufsmall));
+
+static void outs(char *s)
+{
+ if (buffer_puts(&bo,s) == -1) _exit(1);
+ if (buffer_puts(&bo,"\n") == -1) _exit(1);
+ if (buffer_flush(&bo) == -1) _exit(1);
+}
+
+static void out(int i)
+{
+ char num[FMT_ULONG];
+
+ if (buffer_put(&bo,num,fmt_ulong(num,(unsigned long) i)) == -1) _exit(1);
+ if (buffer_puts(&bo,"\n") == -1) _exit(1);
+ if (buffer_flush(&bo) == -1) _exit(1);
+}
+
+char bufspace[1024];
+buffer bi = BUFFER_INIT(read,0,bufspace,sizeof(bufspace));
+
+void mrtg_results(char flag)
+{
+ switch (flag) {
+ case '1': out(success); out(tlstrans); break;
+ case '2': bytes = bytes/1024; out(bytes); out(bytes); break;
+ case '3': out(local); out(remote); break;
+ case '4': out(failure); out(deferral); break;
+ case '5': out(bounces); out(triples); break;
+ case '6': qmtps += qmtp; out(qmtp); out(qmtps); break; /* QMTP */
+
+ case 'a': out(asessions); out(rsessions); break; /* total */
+ case 'b': out(aorig); out(arcpt); break; /* accepted */
+ case 'c': out(rsend); out(rhelo); break; /* rejected MTA */
+ case 'd': out(rorigbad); out(rorigdns); break; /* Orig */
+ case 'e': out(rrcptbad); out(rrcptfail); break; /* Recipient */
+ case 'f': out(rmime); out(rloader); break; /* Warlord */
+ case 'g': out(rvirus); out(rspam); break; /* Infected/Spam */
+ case 'h': out(aauth); out(rauth); break; /* Auth */
+ case 'i': out(atls); out(rtls); break; /* TLS */
+ case 'j': out(spfpass); out(spfail); break; /* SPF */
+ case 'k': out(grey); break; /* Greylisted */
+ case 'z': sdeny +=rbl; out(sok); out(sdeny); break; /* reject session */
+
+ case 'A': out(apop); out(rpop); break;
+ case 'B': out(pok); out(pdeny); break;
+
+ default: break;
+ }
+}
+
+void mrtg_sendlog(char *in, char flag)
+{
+ int i, j, k = 0;
+
+ switch (flag) {
+ case '1': if (case_starts(in,"delivery")) {
+ i = str_chr(in,':') + 2;
+ if (case_starts(in + i,"success:")) success++;
+ i = str_chr(in,'T');
+ if (case_starts(in + i,"TLS_")) tlstrans++;
+ }; break;
+ case '2': if (case_starts(in,"info msg")) {
+ i = str_chr(in,':') + 8;
+ if ((j = str_chr(in + i,' '))) in[i + j] = '\0';
+ bytes += atoi(in + i);
+ }; break;
+ case '3': if (case_starts(in,"status:")) {
+ i = str_rchr(in,'c') + 4;
+ k = str_rchr(in,'r') + 7;
+ if ((j = str_chr(in + i,'/'))) in[i + j] = '\0';
+ if (atoi(in + i) > local) local = atoi(in + i);
+ if ((j = str_chr(in + k,'/'))) in[k + j] = '\0';
+ if (atoi(in + k) > remote) remote = atoi(in + k);
+ }; break;
+ case '4': if (case_starts(in,"delivery")) {
+ i = str_chr(in,':') + 2;
+ if (case_starts(in + i,"failure:")) failure++;
+ if (case_starts(in + i,"deferral:")) deferral++;
+ }; break;
+ case '5': if (case_starts(in,"bounce msg")) bounces++;
+ if (case_starts(in,"triple bounce:")) triples++;
+ break;
+ case '6': if (case_starts(in,"delivery")) {
+ i = str_chr(in,'q');
+ if (case_starts(in + i,"qmtp:_ok")) qmtp++;
+ if (case_starts(in + i,"qmtps:_ok")) qmtps++;
+ }; break;
+ default: break;
+ }
+}
+
+void mrtg_smtplog(char *in, char flag)
+{
+ int i, j, k = 0;
+
+ i = str_chr(in,'A');
+ j = str_chr(in,'R');
+ k = str_chr(in,'P');
+
+ switch (flag) {
+ case 'a': if (case_starts(in + i,"Accept")) asessions++;
+ if (case_starts(in + j,"Reject")) rsessions++;
+ break;
+ case 'b': if (case_starts(in + i,"Accept::ORIG:")) aorig++;
+ if (case_starts(in + i,"Accept::RCPT:")) arcpt++;
+ break;
+ case 'c': if (case_starts(in + j,"Reject::SNDR::Invalid_Relay")) rsend++;
+ if (case_starts(in + j,"Reject::SNDR::Bad_Helo")) rhelo++;
+ if (case_starts(in + j,"Reject::SNDR::DNS_Helo")) rhelo++;
+ break;
+ case 'd': if (case_starts(in + j,"Reject::ORIG::Bad_Mailfrom")) rorigbad++;
+ if (case_starts(in + j,"Reject::ORIG::DNS_MF")) rorigdns++;
+ break;
+ case 'e': if (case_starts(in + j,"Reject::RCPT::Bad_Rcptto")) rrcptbad++;
+ if (case_starts(in + j,"Reject::RCPT::Failed_Rcptto")) rrcptfail++;
+ break;
+ case 'f': if (case_starts(in + j,"Reject::DATA::Invalid_Size")) rsize++;
+ if (case_starts(in + j,"Reject::DATA::Bad_MIME")) rmime++;
+ if (case_starts(in + j,"Reject::DATA::MIME_Attach")) rmime++;
+ if (case_starts(in + j,"Reject::DATA::Bad_Loader")) rloader++;
+ break;
+ case 'g': if (case_starts(in + j,"Reject::DATA::Spam_Message")) rspam++;
+ if (case_starts(in + j,"Reject::DATA::Virus_Infected")) rvirus++;
+ break;
+ case 'h': if (case_starts(in + i,"Accept::AUTH:")) aauth++;
+ if (case_starts(in + j,"Reject::AUTH:")) rauth++;
+ break;
+ case 'i': if (case_starts(in + k,"P:ESMTPS")) atls++;
+ if (case_starts(in + j,"Reject::TLS:")) rtls++;
+ break;
+ case 'j': if (case_starts(in + i,"Accept::SPF:")) spfpass++;
+ if (case_starts(in + j,"Reject::SPF:")) spfail++;
+ break;
+ case 'k': if (case_starts(in + i,"Deferred::SNDR::Grey_Listed")) grey++;
+ break;
+ case 'z': if (case_starts(in,"tcpserver") || case_starts(in,"sslserver") || case_starts(in,"rblsmtpd")) {
+ i = str_chr(in,':') + 2;
+ if (case_starts(in + i,"ok")) sok++;
+ if (case_starts(in + i,"deny")) sdeny++;
+ j = str_chr(in+i,':') + 2;
+ if (case_starts(in + i + j,"451")) rbl++;
+ if (case_starts(in + i + j,"553")) rbl++;
+ if (case_starts(in + i + j,"greetdelay:")) greet++;
+ } break;
+ default: break;
+ }
+}
+
+void mrtg_pop3log(char *in, char flag)
+{
+ int i, j = 0;
+
+ switch (flag) {
+ case 'A': i = str_chr(in,'A'); j = str_chr(in,'R');
+ if (case_starts(in + i,"Accept::AUTH:")) apop++;
+ if (case_starts(in + j,"Reject::AUTH:")) rpop++;
+ break;
+ case 'B': if (case_starts(in,"tcpserver:") || case_starts(in,"sslserver:")) {
+ i = str_chr(in,':') + 2;
+ if (case_starts(in + i,"ok")) pok++;
+ if (case_starts(in + i,"deny")) pdeny++;
+ }; break;
+ default: break;
+ }
+}
+
+int main(int argc, char **argv)
+{
+ int i;
+ int c;
+ int match;
+ int enoughtime = 0;
+ unsigned long u;
+ unsigned long calltime;
+ unsigned long seconds;
+ unsigned long nanoseconds;
+ unsigned int history = 305;
+ char flag;
+
+ stralloc line = {0};
+ calltime = now();
+
+ if (argc < 2)
+ logmsg(WHO,100,USAGE,"qmail-mrtg [ -1 | -2 | -3 | -4 | -5 | -6 |\
+ -a | -b | -c | -d | -e | -f | -g | -h | -i | -j | -k | -z | -A | -B ] [time (min)] \n\
+ qmail-mrtg needs to be called every [time] minutes (i.e. by crontab) - default 305 secs");
+
+ flag = *(argv[1] + 1);
+ if (argc == 3) { scan_ulong(argv[2],&u); history = 60 * u + 5; }
+
+/* Read input lines sequentially */
+
+ buffer_init(&bi,read,0,bufspace,sizeof(bufspace));
+
+ for (;;) {
+ if (getln(&bi,&line,&match,'\n') != 0) _exit(1);
+ if (!match) break;
+ if (!stralloc_0(&line)) _exit(1);
+
+ seconds = 0;
+ nanoseconds = 0;
+
+ if (line.s[0] == '@') { /* tai64 timestamp */
+ for (i = 1; i <= TAI64NLEN; i++) {
+ c = (int)line.s[i];
+ u = c - '0';
+ if (u >= 10) {
+ u = c - 'a';
+ if (u >= 6) break;
+ u += 10;
+ }
+ seconds <<= 4;
+ seconds += nanoseconds >> 28;
+ nanoseconds &= 0xfffffff;
+ nanoseconds <<= 4;
+ nanoseconds += u;
+ }
+ seconds -= 4611686018427387914ULL;
+ seconds = seconds > 0 ? seconds : 0;
+ } else {
+ outs("Error: No TAI64N timestamp available.");
+ _exit(1);
+ }
+
+ if (enoughtime) { /* default history = 305 sec => evaluate logs every ~5 mins */
+ if (seconds <= calltime && seconds >= (calltime - history)) {
+ if (flag >= '1' && flag <= '9') mrtg_sendlog(line.s + TAI64NLEN + 2,flag);
+ else if (flag >= 'a' && flag <= 'z') mrtg_smtplog(line.s + TAI64NLEN + 2,flag);
+ else if (flag >= 'A' && flag <= 'Z') mrtg_pop3log(line.s + TAI64NLEN + 2,flag);
+ }
+ } else {
+ if (seconds) {
+ enoughtime++;
+ } else {
+ outs("Warning: Not enough time left between calls");
+ _exit(1);
+ }
+ }
+ }
+
+ mrtg_results(flag);
+
+ _exit(0);
+}