#ifndef lint static char *sccsid = "@(#)inews.c 1.15 (Berkeley) 2/6/88"; #endif /* * Itty-bitty inews for talking to remote server. * Simply accept input on stdin (or via a named file) and dump this * to the server; add a From: and Path: line if missing in the original. * Print meaningful errors from the server. * Limit .signature files to MAX_SIGNATURE lines. * No processing of command line options. * * Original by Steven Grady , with thanks from * Phil Lapsley , who is now responsible for it. */ #include #include #include #include "../common/conf.h" #include "../common/nntp.h" #ifdef USG #include #else not USG #include #endif not USG #define MAX_SIGNATURE 4 extern FILE *ser_wr_fp; char host_name[256]; main(argc, argv) int argc; char *argv[]; { char line[NNTP_STRLEN], s[NNTP_STRLEN]; int seen_fromline, in_header; int response; char *server; char *getserverbyfile(); register char *cp; ++argv; while (argc > 1) if (*argv[0] == '-') { ++argv; --argc; } else break; if (argc > 1) { if (freopen(*argv, "r", stdin) == NULL) { perror(*argv); exit(1); } } uname(host_name); server = getserverbyfile(SERVER_FILE); if (server == NULL) { fprintf(stderr, "Can't get the name of the news server from %s.\n", SERVER_FILE); fprintf(stderr, "Either fix this file, or put NNTPSERVER in your enviroment.\n"); exit(1); } response = server_init(server); if (response < 0) { printf("Couldn't connect to %s news server, try again later.\n", server); exit(1); } if (handle_server_response(response, server) < 0 || response == OK_NOPOST) { close_server(); exit(1); } put_server("POST"); (void) get_server(line, sizeof(line)); if (*line != CHAR_CONT) { if (atoi(line) == ERR_NOPOST) { close_server(); fprintf(stderr, "Sorry, you can't post from this machine.\n"); exit(1); } else { close_server(); fprintf(stderr, "Remote error: %s\n", line); exit(1); } } in_header = 1; seen_fromline = 0; while (gets(s) != NULL) { if (s[0] == '.') /* Single . is eof, so put in extra one */ (void) fputc('.', ser_wr_fp); if (in_header && strneql(s, "From:", sizeof("From:")-1)) seen_fromline = 1; if (in_header && s[0] == '\0') { in_header = 0; if (!seen_fromline) gen_frompath(); } fprintf(ser_wr_fp, "%s\r\n", s); } append_signature(); fprintf(ser_wr_fp, ".\r\n"); (void) fflush(ser_wr_fp); (void) get_server(line, sizeof(line)); if (*line != CHAR_OK) { if (atoi(line) == ERR_POSTFAIL) { close_server(); printf("Article not accepted by server; not posted.\n"); for (cp = line + 4; *cp && *cp != '\r'; cp++) if (*cp == '\\') putchar('\n'); else putchar(*cp); exit(1); } else { close_server(); fprintf(stderr, "Remote error: %s\n", line); exit(1); } } /* * Close server sends the server a * "quit" command for us, which is why we don't send it. */ close_server(); exit(0); } /* * append_signature -- append the person's .signature file if * they have one. Limit .signature to MAX_SIGNATURE lines. */ append_signature() { char line[256], sigfile[256]; char *cp; struct passwd *passwd; FILE *fp; char *index(); int count = 0; passwd = getpwuid(getuid()); if (passwd == NULL) return; (void) strcpy(sigfile, passwd->pw_dir); (void) strcat(sigfile, "/"); (void) strcat(sigfile, ".signature"); fp = fopen(sigfile, "r"); if (fp == NULL) return; while (fgets(line, sizeof (line), fp)) { count++; if (count > MAX_SIGNATURE) { fprintf(stderr, "Warning: .signature files should be no longer than %d lines.\n", MAX_SIGNATURE); fprintf(stderr, "(Only %d lines of your .signature were posted.)\n", MAX_SIGNATURE); break; } if (cp = index(line, '\n')) *cp = '\0'; fprintf(ser_wr_fp, "%s\r\n", line); } (void) fclose(fp); } /* * gen_frompath -- generate From: and Path: lines, in the form * * From: user@host.domain (full_name) * Path: host!user * * This routine should only be called if the message doesn't have * a From: line in it. */ gen_frompath() { char *full_name; char *cp; struct passwd *passwd; char *index(), *getenv(); passwd = getpwuid(getuid()); full_name = getenv("NAME"); if (full_name == NULL) { full_name = passwd->pw_gecos; if ((cp = index(full_name, ','))) *cp = '\0'; } #ifdef DOMAIN /* A heuristic to see if we should tack on a domain */ cp = index(host_name, '.'); if (cp) fprintf(ser_wr_fp, "From: %s@%s (", passwd->pw_name, host_name); else fprintf(ser_wr_fp, "From: %s@%s.%s (", passwd->pw_name, host_name, DOMAIN); #else fprintf(ser_wr_fp, "From: %s@%s (", passwd->pw_name, host_name); #endif for (cp = full_name; *cp != '\0'; ++cp) if (*cp != '&') putc(*cp, ser_wr_fp); else { /* Stupid & hack. God damn it. */ putc(toupper(passwd->pw_name[0]), ser_wr_fp); fprintf(ser_wr_fp, passwd->pw_name+1); } fprintf(ser_wr_fp, ")\r\n"); fprintf(ser_wr_fp, "Path: %s!%s\r\n", host_name, passwd->pw_name); } /* * strneql -- determine if two strings are equal in the first n * characters, ignoring case. * * Parameters: "a" and "b" are the pointers * to characters to be compared. * "n" is the number of characters to compare. * * Returns: 1 if the strings are equal, 0 otherwise. * * Side effects: None. */ strneql(a, b, n) register char *a, *b; int n; { char lower(); while (n && lower(*a) == lower(*b)) { if (*a == '\0') return (1); a++; b++; n--; } if (n) return (0); else return (1); } /* * lower -- convert a character to lower case, if it's * upper case. * * Parameters: "c" is the character to be * converted. * * Returns: "c" if the character is not * upper case, otherwise the lower * case eqivalent of "c". * * Side effects: None. */ char lower(c) register char c; { if (isascii(c) && isupper(c)) c = c - 'A' + 'a'; return(c); }