/tags/Release_1_0b6/mailman/Mailman/MailList.py
Python | 1082 lines | 901 code | 114 blank | 67 comment | 103 complexity | 10ac0a576709e12f24ee3ea2accef946 MD5 | raw file
Possible License(s): GPL-2.0
- # Copyright (C) 1998 by the Free Software Foundation, Inc.
- #
- # This program is free software; you can redistribute it and/or
- # modify it under the terms of the GNU General Public License
- # as published by the Free Software Foundation; either version 2
- # of the License, or (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program; if not, write to the Free Software
- # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- """The class representing a Mailman mailing list.
- Mixes in many feature classes.
- """
- try:
- import mm_cfg
- except ImportError:
- raise RuntimeError, ('missing mm_cfg - has Config_dist been configured '
- 'for the site?')
- import sys, os, marshal, string, posixfile, time
- import re
- import Utils
- import Errors
- from ListAdmin import ListAdmin
- from Deliverer import Deliverer
- from MailCommandHandler import MailCommandHandler
- from HTMLFormatter import HTMLFormatter
- from Archiver import Archiver
- from Digester import Digester
- from SecurityManager import SecurityManager
- from Bouncer import Bouncer
- from GatewayManager import GatewayManager
- from Mailman.Logging.StampedLogger import StampedLogger
- # Note:
- # an _ in front of a member variable for the MailList class indicates
- # a variable that does not save when we marshal our state.
- # Use mixins here just to avoid having any one chunk be too large.
- class MailList(MailCommandHandler, HTMLFormatter, Deliverer, ListAdmin,
- Archiver, Digester, SecurityManager, Bouncer, GatewayManager):
- def __init__(self, name=None, lock=1):
- if name and name not in Utils.list_names():
- raise Errors.MMUnknownListError, 'list not found: %s' % name
- MailCommandHandler.__init__(self)
- self.InitTempVars(name, lock)
- if name:
- self._full_path = os.path.join(mm_cfg.LIST_DATA_DIR, name)
- self.Load()
- def __del__(self):
- for f in self._log_files.values():
- f.close()
- def GetAdminEmail(self):
- return '%s-admin@%s' % (self._internal_name, self.host_name)
- def GetMemberAdminEmail(self, member):
- """Usually the member addr, but modified for umbrella lists.
- Umbrella lists have other maillists as members, and so admin stuff
- like confirmation requests and passwords must not be sent to the
- member addresses - the sublists - but rather to the administrators
- of the sublists. This routine picks the right address, considering
- regular member address to be their own administrative addresses."""
- if not self.umbrella_list:
- return member
- else:
- acct, host = tuple(string.split(member, '@'))
- return "%s%s@%s" % (acct, self.umbrella_member_suffix, host)
- def GetRequestEmail(self):
- return '%s-request@%s' % (self._internal_name, self.host_name)
- def GetListEmail(self):
- return '%s@%s' % (self._internal_name, self.host_name)
- def GetListIdentifier(self):
- """Return the unique (RFC draft-chandhok-listid-02) identifier."""
- return ("%s <%s.%s>" %
- (self.description, self._internal_name, self.host_name))
- def GetRelativeScriptURL(self, script_name):
- prefix = '../'*Utils.GetNestingLevel()
- return '%s%s/%s' % (prefix,script_name, self._internal_name)
- def GetAbsoluteScriptURL(self, script_name):
- if self.web_page_url:
- prefix = self.web_page_url
- else:
- prefix = mm_cfg.DEFAULT_URL
- return os.path.join(prefix, '%s/%s' % (script_name,
- self._internal_name))
- def GetAbsoluteOptionsURL(self, addr, obscured=0,):
- options = self.GetAbsoluteScriptURL('options')
- if obscured:
- treated = Utils.ObscureEmail(addr, for_text=0)
- else:
- treated = addr
- return os.path.join(options, treated)
- def GetUserOption(self, user, option):
- if option == mm_cfg.Digests:
- return user in self.digest_members
- if not self.user_options.has_key(user):
- return 0
- return not not self.user_options[user] & option
- def SetUserOption(self, user, option, value):
- if not self.user_options.has_key(user):
- self.user_options[user] = 0
- if value:
- self.user_options[user] = self.user_options[user] | option
- else:
- self.user_options[user] = self.user_options[user] & ~(option)
- if not self.user_options[user]:
- del self.user_options[user]
- self.Save()
- def FindUser(self, email):
- matches = Utils.FindMatchingAddresses(email,
- (self.members
- + self.digest_members))
- if not matches or not len(matches):
- return None
- return matches[0]
- def InitTempVars(self, name, lock):
- """Set transient variables of this and inherited classes."""
- self._tmp_lock = lock
- self._lock_file = None
- self._internal_name = name
- self._ready = 0
- self._log_files = {} # 'class': log_file_obj
- if name:
- self._full_path = os.path.join(mm_cfg.LIST_DATA_DIR, name)
- Digester.InitTempVars(self)
- def InitVars(self, name=None, admin='', crypted_password=''):
- """Assign default values - some will be overriden by stored state."""
- # Non-configurable list info
- if name:
- self._internal_name = name
- # Must save this state, even though it isn't configurable
- self.volume = 1
- self.members = [] # self.digest_members is initted in mm_digest
- self.data_version = mm_cfg.VERSION
- self.last_post_time = 0
-
- self.post_id = 1. # A float so it never has a chance to overflow.
- self.user_options = {}
- # This stuff is configurable
- self.filter_prog = mm_cfg.DEFAULT_FILTER_PROG
- self.dont_respond_to_post_requests = 0
- self.num_spawns = mm_cfg.DEFAULT_NUM_SPAWNS
- self.advertised = mm_cfg.DEFAULT_LIST_ADVERTISED
- self.max_num_recipients = mm_cfg.DEFAULT_MAX_NUM_RECIPIENTS
- self.max_message_size = mm_cfg.DEFAULT_MAX_MESSAGE_SIZE
- self.web_page_url = mm_cfg.DEFAULT_URL
- self.owner = [admin]
- self.reply_goes_to_list = mm_cfg.DEFAULT_REPLY_GOES_TO_LIST
- self.posters = []
- self.forbidden_posters = []
- self.admin_immed_notify = mm_cfg.DEFAULT_ADMIN_IMMED_NOTIFY
- self.moderated = mm_cfg.DEFAULT_MODERATED
- self.require_explicit_destination = \
- mm_cfg.DEFAULT_REQUIRE_EXPLICIT_DESTINATION
- self.acceptable_aliases = mm_cfg.DEFAULT_ACCEPTABLE_ALIASES
- self.umbrella_list = mm_cfg.DEFAULT_UMBRELLA_LIST
- self.umbrella_member_suffix = \
- mm_cfg.DEFAULT_UMBRELLA_MEMBER_ADMIN_SUFFIX
- self.send_reminders = mm_cfg.DEFAULT_SEND_REMINDERS
- self.send_welcome_msg = mm_cfg.DEFAULT_SEND_WELCOME_MSG
- self.bounce_matching_headers = \
- mm_cfg.DEFAULT_BOUNCE_MATCHING_HEADERS
- self.anonymous_list = mm_cfg.DEFAULT_ANONYMOUS_LIST
- self.real_name = '%s%s' % (string.upper(self._internal_name[0]),
- self._internal_name[1:])
- self.description = ''
- self.info = ''
- self.welcome_msg = ''
- self.goodbye_msg = ''
- self.subscribe_policy = mm_cfg.DEFAULT_SUBSCRIBE_POLICY
- self.private_roster = mm_cfg.DEFAULT_PRIVATE_ROSTER
- self.obscure_addresses = mm_cfg.DEFAULT_OBSCURE_ADDRESSES
- self.member_posting_only = mm_cfg.DEFAULT_MEMBER_POSTING_ONLY
- self.host_name = mm_cfg.DEFAULT_HOST_NAME
- self.admin_member_chunksize = mm_cfg.DEFAULT_ADMIN_MEMBER_CHUNKSIZE
- # Analogs to these are initted in Digester.InitVars
- self.nondigestable = mm_cfg.DEFAULT_NONDIGESTABLE
- Digester.InitVars(self) # has configurable stuff
- SecurityManager.InitVars(self, crypted_password)
- Archiver.InitVars(self) # has configurable stuff
- ListAdmin.InitVars(self)
- Bouncer.InitVars(self)
- GatewayManager.InitVars(self)
- HTMLFormatter.InitVars(self)
- # These need to come near the bottom because they're dependent on
- # other settings.
- self.subject_prefix = mm_cfg.DEFAULT_SUBJECT_PREFIX % self.__dict__
- self.msg_header = mm_cfg.DEFAULT_MSG_HEADER
- self.msg_footer = mm_cfg.DEFAULT_MSG_FOOTER
- def GetConfigInfo(self):
- config_info = {}
- config_info['digest'] = Digester.GetConfigInfo(self)
- config_info['archive'] = Archiver.GetConfigInfo(self)
- config_info['gateway'] = GatewayManager.GetConfigInfo(self)
- # XXX: Should this text be migrated into the templates dir?
- config_info['general'] = [
- "Fundamental list characteristics, including descriptive"
- " info and basic behaviors.",
- ('real_name', mm_cfg.String, 50, 0,
- 'The public name of this list (make case-changes only).',
- "The capitalization of this name can be changed to make it"
- " presentable in polite company as a proper noun, or to make an"
- " acronym part all upper case, etc. However, the name"
- " will be advertised as the email address (e.g., in subscribe"
- " confirmation notices), so it should <em>not</em> be otherwise"
- " altered. (Email addresses are not case sensitive, but"
- " they are sensitive to almost everything else:-)"),
- ('owner', mm_cfg.EmailList, (3,30), 0,
- "The list admin's email address - having multiple"
- " admins/addresses (on separate lines) is ok."),
- ('description', mm_cfg.String, 50, 0,
- 'A terse phrase identifying this list.',
- "This description is used when the maillist is listed with"
- " other maillists, or in headers, and so forth. It should"
- " be as succinct as you can get it, while still identifying"
- " what the list is."),
- ('info', mm_cfg.Text, (7, 50), 0,
- ' An introductory description - a few paragraphs - about the'
- ' list. It will be included, as html, at the top of the'
- ' listinfo page. Carriage returns will end a paragraph - see'
- ' the details for more info.',
- "The text will be treated as html <em>except</em> that newlines"
- " newlines will be translated to <br> - so you can use"
- " links, preformatted text, etc, but don't put in carriage"
- " returns except where you mean to separate paragraphs. And"
- " review your changes - bad html (like some unterminated HTML"
- " constructs) can prevent display of the entire listinfo page."),
- ('subject_prefix', mm_cfg.String, 10, 0,
- 'Prefix for subject line of list postings.',
- "This text will be prepended to subject lines of messages"
- " posted to the list, to distinguish maillist messages in"
- " in mailbox summaries. Brevity is premium here, it's ok"
- " to shorten long maillist names to something more concise,"
- " as long as it still identifies the maillist."),
- ('welcome_msg', mm_cfg.Text, (4, 50), 0,
- 'List-specific text prepended to new-subscriber welcome message',
- "This value, if any, will be added to the front of the"
- " new-subscriber welcome message. The rest of the"
- " welcome message already describes the important addresses"
- " and URLs for the maillist, so you don't need to include"
- " any of that kind of stuff here. This should just contain"
- " mission-specific kinds of things, like etiquette policies"
- " or team orientation, or that kind of thing."),
- ('goodbye_msg', mm_cfg.Text, (4, 50), 0,
- 'Text sent to people leaving the list. If empty, no special'
- ' text will be added to the unsubscribe message.'),
- ('reply_goes_to_list', mm_cfg.Radio, ('Poster', 'List'), 0,
- 'Are replies to a post directed to the original poster'
- ' or to the list? <tt>Poster</tt> is <em>strongly</em>'
- ' recommended.',
- "There are many reasons not to introduce headers like reply-to"
- " into other peoples messages - one is that some posters depend"
- " on their own reply-to setting to convey their valid email"
- " addr. See"
- ' <a href="http://www.unicom.com/pw/reply-to-harmful.html">'
- '"Reply-To" Munging Considered Harmful</a> for a general.'
- " discussion of this issue."),
- ('administrivia', mm_cfg.Radio, ('No', 'Yes'), 0,
- "check messages that are destined for the list for"
- " adminsitrative request content?",
- "Administrivia tests will check postings to see whether"
- " it's really meant as an administrative request (like"
- " subscribe, unsubscribe, etc), and will add it to the"
- " the administrative requests queue, notifying the "
- " administrator of the new request, in the process. "),
- ('umbrella_list', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Send password reminders to, eg, "-owner" address instead of'
- ' directly to user.',
- "Set this to yes when this list is intended to cascade only to"
- " other maillists. When set, meta notices like confirmations"
- " and password reminders will be directed to an address derived"
- " from the member\'s address - it will have the value of"
- ' \"umbrella_member_suffix\" appended to the'
- " member\'s account name."),
- ('umbrella_member_suffix', mm_cfg.String, 8, 0,
- 'Suffix for use when this list is an umbrella for other lists,'
- ' according to setting of previous "umbrella_list" setting.',
- 'When \"umbrella_list\" is set to indicate that this list has'
- " other maillists as members, then administrative notices like"
- " confirmations and password reminders need to not be sent"
- " to the member list addresses, but rather to the owner of those"
- " member lists. In that case, the value of this setting is"
- " appended to the member\'s account name for such notices."
- " \'-owner\' is the typical choice. This setting has no"
- ' effect when \"umbrella_list\" is \"No\".'),
- ('send_reminders', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Send monthly password reminders or no? Overrides the previous '
- 'option.'),
- ('send_welcome_msg', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Send welcome message when people subscribe?',
- "Turn this on only if you plan on subscribing people manually "
- "and don't want them to know that you did so. This option "
- "is most useful for transparently migrating lists from "
- "some other mailing list manager to Mailman."),
- ('admin_immed_notify', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Should administrator get immediate notice of new requests, '
- 'as well as daily notices about collected ones?',
- "List admins are sent daily reminders of pending admin approval"
- " requests, like subscriptions to a moderated list or postings"
- " that are being held for one reason or another. Setting this"
- " option causes notices to be sent immediately on the arrival"
- " of new requests, as well."),
- ('dont_respond_to_post_requests', mm_cfg.Radio, ('Yes', 'No'), 0,
- 'Send mail to poster when their posting is held for approval?',
- "Approval notices are sent when mail triggers certain of the"
- " limits <em>except</em> routine list moderation and spam"
- " filters, for which notices are <em>not</em> sent. This"
- " option overrides ever sending the notice."),
- ('max_message_size', mm_cfg.Number, 3, 0,
- 'Maximum length in Kb of a message body. Use 0 for no limit.'),
- ('num_spawns', mm_cfg.Number, 3, 0,
- 'Number of outgoing connections to open at once '
- '(expert users only).',
- "This determines the maximum number of batches into which"
- " a mass posting will be divided."),
- ('host_name', mm_cfg.Host, 50, 0, 'Host name this list prefers.',
- "The host_name is the preferred name for email to mailman-related"
- " addresses on this host, and generally should be the mail"
- " host's exchanger address, if any. This setting can be useful"
- " for selecting among alternative names of a host that has"
- " multiple addresses."),
- ('web_page_url', mm_cfg.String, 50, 0,
- 'Base URL for Mailman web interface',
- "This is the common root for all mailman URLs concerning this"
- " list. It is also used in the listinfo overview of maillists"
- " to identify whether or not this list resides on the virtual"
- " host identified by the overview URL - if this value is found"
- " (anywhere) in the URL, then this list is considered to be"
- " on that virtual host, and if not, then it is excluded from"
- " the listing. Note that you should use the \'advertised\'"
- " privacy option to inhibit any listing of the host."),
- ]
- if mm_cfg.ALLOW_OPEN_SUBSCRIBE:
- sub_cfentry = ('subscribe_policy', mm_cfg.Radio,
- ('none', 'confirm', 'require approval',
- 'confirm+approval'), 0,
- "What steps are required for subscription?<br>",
- "None - no verification steps (<em>Not"
- " Recommended </em>)<br>"
- "confirm (*) - email confirmation step"
- " required <br>"
- "require approval - require list administrator"
- " approval for subscriptions <br>"
- "confirm+approval - both confirm and approve"
-
- "<p> (*) when someone requests a subscription,"
- " mailman sends them a notice with a unique"
- " subscription request number that they must"
- " reply to in order to subscribe.<br> This"
- " prevents mischievous (or malicious) people"
- " from creating subscriptions for others"
- " without their consent."
- )
- else:
- sub_cfentry = ('subscribe_policy', mm_cfg.Radio,
- ('confirm', 'require approval',
- 'confirm+approval'), 1,
- "What steps are required for subscription?<br>",
- "confirm (*) - email confirmation required <br>"
- "require approval - require list administrator"
- " approval for subscriptions <br>"
- "confirm+approval - both confirm and approve"
- "<p> (*) when someone requests a subscription,"
- " mailman sends them a notice with a unique"
- " subscription request number that they must"
- " reply to in order to subscribe.<br> This"
- " prevents mischievous (or malicious) people"
- " from creating subscriptions for others"
- " without their consent."
- )
- config_info['privacy'] = [
- "List access policies, including anti-spam measures,"
- " covering members and outsiders."
- ' (See also the <a href="%s">Archival Options section</a> for'
- ' separate archive-privacy settings.)'
- % os.path.join(self.GetRelativeScriptURL('admin'), 'archive'),
- "Subscribing",
- ('advertised', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Advertise this list when people ask what lists are on '
- 'this machine?'),
- sub_cfentry,
-
- "Membership exposure",
- ('private_roster', mm_cfg.Radio,
- ('Anyone', 'List members', 'List admin only'), 0,
- 'Who can view subscription list?',
- "When set, the list of subscribers is protected by"
- " member or admin password authentication."),
- ('obscure_addresses', mm_cfg.Radio, ('No', 'Yes'), 0,
- "Show member addrs so they're not directly recognizable"
- ' as email addrs?',
- "Setting this option causes member email addresses to be"
- " transformed when they are presented on list web pages (both"
- " in text and as links), so they're not trivially"
- " recognizable as email addresses. The intention is to"
- " to prevent the addresses from being snarfed up by"
- " automated web scanners for use by spammers."),
- "General posting filters",
- ('moderated', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Must posts be approved by an administrator?'),
- ('member_posting_only', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Restrict posting privilege to list members?',
- "Use this option if you want to restrict posting to list members. "
- "If you want list members to be able to "
- "post, plus a handful of other posters, see the <i> posters </i> "
- "setting below"),
- ('posters', mm_cfg.EmailList, (5, 30), 1,
- 'Addresses of members accepted for posting to this'
- ' list with no required approval. (See <i> member_posting_only </i> '
- 'above for whether or not list members posting is effected by adding '
- 'addresses here.',
- "Adding any entries here will have one of 2 effects according to the "
- "setting of <i>member_posting_only </i>: <p> If <i>member_posting_only</i> "
- "is set to 'yes', then adding entries here will allow list members and anyone "
- "listed here to post without going through administrative approval. <p> "
- "If <i>member_posting_only</i> is set to 'no', then <em>only</em> the "
- "posters listed here will be able to post without administrative approval. "),
- "Spam-specific posting filters",
- ('require_explicit_destination', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Must posts have list named in destination (to, cc) field'
- ' (or be among the acceptable alias names, specified below)?',
- "Many (in fact, most) spams do not explicitly name their myriad"
- " destinations in the explicit destination addresses - in fact,"
- " often the to field has a totally bogus address for"
- " obfuscation. The constraint applies only to the stuff in"
- " the address before the '@' sign, but still catches all such"
- " spams."
- "<p>The cost is that the list will not accept unhindered any"
- " postings relayed from other addresses, unless <ol>"
- " <li>The relaying address has the same name, or"
- " <li>The relaying address name is included on the options that"
- " specifies acceptable aliases for the list. </ol>"),
- ('acceptable_aliases', mm_cfg.Text, ('4', '30'), 0,
- 'Alias names (regexps) which qualify as explicit to or cc'
- ' destination names for this list.',
- "Alternate list names (the stuff before the '@') that are to be"
- " accepted when the explicit-destination constraint (a prior"
- " option) is active. This enables things like cascading"
- " maillists and relays while the constraint is still"
- " preventing random spams."),
- ('max_num_recipients', mm_cfg.Number, 3, 0,
- 'Ceiling on acceptable number of recipients for a posting.',
- "If a posting has this number, or more, of recipients, it is"
- " held for admin approval. Use 0 for no ceiling."),
- ('forbidden_posters', mm_cfg.EmailList, (5, 30), 1,
- 'Addresses whose postings are always held for approval.',
- "Email addresses whose posts should always be held for"
- " approval, no matter what other options you have set."
- " See also the subsequent option which applies to arbitrary"
- " content of arbitrary headers."),
- ('bounce_matching_headers', mm_cfg.Text, ('6', '50'), 0,
- 'Hold posts with header value matching a specified regexp.',
- "Use this option to prohibit posts according to specific header"
- " values. The target value is a regular-expression for"
- " matching against the specified header. The match is done"
- " disregarding letter case. Lines beginning with '#' are"
- " ignored as comments."
- "<p>For example:<pre>to: .*@public.com </pre> says"
- " to hold all postings with a <em>to</em> mail header"
- " containing '@public.com' anywhere among the addresses."
- "<p>Note that leading whitespace is trimmed from the"
- " regexp. This can be circumvented in a number of ways, eg"
- " by escaping or bracketing it."
- "<p> See also the <em>forbidden_posters</em> option for"
- " a related mechanism."),
- ('anonymous_list', mm_cfg.Radio, ('No', 'Yes'), 0,
- 'Hide the sender of a message, replacing it with the list '
- 'address (Removes From, Sender and Reply-To fields)'),
-
- ]
- config_info['nondigest'] = [
- "Policies concerning immediately delivered list traffic.",
- ('nondigestable', mm_cfg.Toggle, ('No', 'Yes'), 1,
- 'Can subscribers choose to receive mail immediately,'
- ' rather than in batched digests?'),
- ('msg_header', mm_cfg.Text, (4, 55), 0,
- 'Header added to mail sent to regular list members',
- "Text prepended to the top of every immediately-delivery"
- " message. <p>" + Errors.MESSAGE_DECORATION_NOTE),
-
- ('msg_footer', mm_cfg.Text, (4, 55), 0,
- 'Footer added to mail sent to regular list members',
- "Text appended to the bottom of every immediately-delivery"
- " message. <p>" + Errors.MESSAGE_DECORATION_NOTE),
- ]
- config_info['bounce'] = Bouncer.GetConfigInfo(self)
- return config_info
- def Create(self, name, admin, crypted_password):
- if name in Utils.list_names():
- raise ValueError, 'List %s already exists.' % name
- else:
- Utils.MakeDirTree(os.path.join(mm_cfg.LIST_DATA_DIR, name))
- self._full_path = os.path.join(mm_cfg.LIST_DATA_DIR, name)
- self._internal_name = name
- self.Lock()
- self.InitVars(name, admin, crypted_password)
- self._ready = 1
- self.InitTemplates()
- self.Save()
- self.CreateFiles()
- def CreateFiles(self):
- # Touch these files so they have the right dir perms no matter what.
- # A "just-in-case" thing. This shouldn't have to be here.
- ou = os.umask(002)
- try:
- open(os.path.join(mm_cfg.LOCK_DIR, '%s.lock' %
- self._internal_name), 'a+').close()
- open(os.path.join(self._full_path, "next-digest"), "a+").close()
- open(os.path.join(self._full_path, "next-digest-topics"),
- "a+").close()
- finally:
- os.umask(ou)
-
- def Save(self):
- # If more than one client is manipulating the database at once, we're
- # pretty hosed. That's a good reason to make this a daemon not a
- # program.
- self.IsListInitialized()
- ou = os.umask(002)
- try:
- fname = os.path.join(self._full_path, 'config.db')
- fname_last = fname + ".last"
- if os.path.exists(fname_last):
- os.unlink(fname_last)
- if os.path.exists(fname):
- os.link(fname, fname_last)
- os.unlink(fname)
- file = open(fname, 'w')
- finally:
- os.umask(ou)
- dict = {}
- for (key, value) in self.__dict__.items():
- if key[0] <> '_':
- dict[key] = value
- marshal.dump(dict, file)
- file.close()
- self.CheckHTMLArchiveDir()
- def Load(self, check_version = 1):
- if self._tmp_lock:
- self.Lock()
- try:
- file = open(os.path.join(self._full_path, 'config.db'), 'r')
- except IOError:
- raise mm_cfg.MMBadListError, 'Failed to access config info'
- try:
- dict = marshal.load(file)
- except (EOFError, ValueError, TypeError):
- raise mm_cfg.MMBadListError, 'Failed to unmarshal config info'
- for (key, value) in dict.items():
- setattr(self, key, value)
- file.close()
- self._ready = 1
- if check_version:
- self.CheckValues()
- self.CheckVersion(dict)
- def LogMsg(self, kind, msg, *args):
- """Append a message to the log file for messages of specified kind."""
- # For want of a better fallback, we use sys.stderr if we can't get
- # a log file. We need a better way to warn of failed log access...
- if self._log_files.has_key(kind):
- logf = self._log_files[kind]
- else:
- logf = self._log_files[kind] = StampedLogger(kind)
- logf.write("%s\n" % (msg % args))
- logf.flush()
- def CheckVersion(self, stored_state):
- """Migrate prior version's state to new structure, if changed."""
- if (self.data_version >= mm_cfg.DATA_FILE_VERSION and
- type(self.data_version) == type(mm_cfg.DATA_FILE_VERSION)):
- return
- else:
- self.InitVars() # Init any new variables,
- self.Load(check_version = 0) # then reload the file
- from versions import Update
- Update(self, stored_state)
- self.data_version = mm_cfg.DATA_FILE_VERSION
- self.Save()
- def CheckValues(self):
- """Normalize selected values to known formats."""
- if self.web_page_url and self.web_page_url[-1] != '/':
- self.web_page_url = self.web_page_url + '/'
- def IsListInitialized(self):
- if not self._ready:
- raise Errors.MMListNotReady
- def AddMember(self, name, password, digest=0, remote=None):
- self.IsListInitialized()
- # Remove spaces... it's a common thing for people to add...
- name = string.join(string.split(name), '')
- # lower case only the domain part
- name = Utils.LCDomain(name)
- # Validate the e-mail address to some degree.
- if not Utils.ValidEmail(name):
- raise Errors.MMBadEmailError
- if self.IsMember(name):
- raise Errors.MMAlreadyAMember
- if name == string.lower(self.GetListEmail()):
- # Trying to subscribe the list to itself!
- raise mm_err.MMBadEmailError
- if digest and not self.digestable:
- raise Errors.MMCantDigestError
- elif not digest and not self.nondigestable:
- raise Errors.MMMustDigestError
- if self.subscribe_policy == 0:
- # no confirmation or approval necessary:
- self.ApprovedAddMember(name, password, digest)
- elif self.subscribe_policy == 1 or self.subscribe_policy == 3:
- # confirmation:
- from Pending import Pending
- cookie = Pending().new(name, password, digest)
- if remote is not None:
- by = " " + remote
- remote = " from %s" % remote
- else:
- by = ""
- remote = ""
- recipient = self.GetMemberAdminEmail(name)
- text = Utils.maketext('verify.txt',
- {"email" : name,
- "listaddr" : self.GetListEmail(),
- "listname" : self.real_name,
- "cookie" : cookie,
- "hostname" : remote,
- "requestaddr": self.GetRequestEmail(),
- "remote" : remote,
- "listadmin" : self.GetAdminEmail(),
- })
- self.SendTextToUser(
- subject=("%s -- confirmation of subscription -- request %d" %
- (self.real_name, cookie)),
- recipient = recipient,
- sender = self.GetRequestEmail(),
- text = text,
- add_headers = ["Reply-to: %s" % self.GetRequestEmail(),
- "Errors-To: %s" % self.GetAdminEmail()])
- if recipient != name:
- who = "%s (%s)" % (name, string.split(recipient, '@')[0])
- else: who = name
- self.LogMsg("subscribe", "%s: pending %s %s",
- self._internal_name,
- who,
- by)
- raise Errors.MMSubscribeNeedsConfirmation
- else: # approval needed
- self.AddRequest('add_member', digest, name, password)
- raise Errors.MMNeedApproval, self.GetAdminEmail()
-
- def ApprovedAddMember(self, name, password, digest, ack=None):
- if ack is None:
- if self.send_welcome_msg:
- ack = 1
- else:
- ack = 0
- name = Utils.LCDomain(name)
- if self.IsMember(name):
- raise Errors.MMAlreadyAMember
- if digest:
- self.digest_members.append(name)
- kind = " (D)"
- else:
- self.members.append(name)
- kind = ""
- self.LogMsg("subscribe", "%s: new%s %s",
- self._internal_name, kind, name)
- self.passwords[name] = password
- self.Save()
- if ack:
- self.SendSubscribeAck(name, password, digest)
-
- def ProcessConfirmation(self, cookie):
- from Pending import Pending
- got = Pending().confirmed(cookie)
- if not got:
- raise Errors.MMBadConfirmation
- else:
- (email_addr, password, digest) = got
- if self.subscribe_policy == 3: # confirm + approve
- self.AddRequest('add_member', digest, email_addr, password)
- raise Errors.MMNeedApproval, self.GetAdminEmail()
- self.ApprovedAddMember(email_addr, password, digest)
- def DeleteMember(self, name, whence=None):
- self.IsListInitialized()
- # FindMatchingAddresses *should* never return more than 1 address.
- # However, should log this, just to make sure.
- aliases = Utils.FindMatchingAddresses(name, self.members +
- self.digest_members)
- if not len(aliases):
- raise Errors.MMNoSuchUserError
- def DoActualRemoval(alias, me=self):
- kind = "(unfound)"
- try:
- del me.passwords[alias]
- except KeyError:
- pass
- if me.user_options.has_key(alias):
- del me.user_options[alias]
- try:
- me.members.remove(alias)
- kind = "regular"
- except ValueError:
- pass
- try:
- me.digest_members.remove(alias)
- kind = "digest"
- except ValueError:
- pass
- map(DoActualRemoval, aliases)
- if self.goodbye_msg and len(self.goodbye_msg):
- self.SendUnsubscribeAck(name)
- self.ClearBounceInfo(name)
- self.Save()
- if whence: whence = "; %s" % whence
- else: whence = ""
- self.LogMsg("subscribe", "%s: deleted %s%s",
- self._internal_name, name, whence)
- def IsMember(self, address):
- return len(Utils.FindMatchingAddresses(address, self.members +
- self.digest_members))
- def HasExplicitDest(self, msg):
- """True if list name or any acceptable_alias is included among the
- to or cc addrs."""
- # Note that qualified host can be different! This allows, eg, for
- # relaying from remote lists that have the same name. Still
- # stringent, but offers a way to provide for remote exploders.
- lowname = string.lower(self.real_name)
- recips = []
- # First check all dests against simple name:
- for recip in msg.getaddrlist('to') + msg.getaddrlist('cc'):
- curr = string.lower(string.split(recip[1], '@')[0])
- if lowname == curr:
- return 1
- recips.append(curr)
- # ... and only then try the regexp acceptable aliases.
- for recip in recips:
- for alias in string.split(self.acceptable_aliases, '\n'):
- stripped = string.strip(alias)
- if stripped and re.match(stripped, recip):
- return 1
- return 0
- def parse_matching_header_opt(self):
- """Return a list of triples [(field name, regex, line), ...]."""
- # - Blank lines and lines with '#' as first char are skipped.
- # - Leading whitespace in the matchexp is trimmed - you can defeat
- # that by, eg, containing it in gratuitous square brackets.
- all = []
- for line in string.split(self.bounce_matching_headers, '\n'):
- stripped = string.strip(line)
- if not stripped or (stripped[0] == "#"):
- # Skip blank lines and lines *starting* with a '#'.
- continue
- else:
- try:
- h, e = re.split(":[ ]*", stripped)
- all.append((h, e, stripped))
- except ValueError:
- # Whoops - some bad data got by:
- self.LogMsg("config", "%s - "
- "bad bounce_matching_header line %s"
- % (self.real_name, `stripped`))
- return all
- def HasMatchingHeader(self, msg):
- """True if named header field (case-insensitive) matches regexp.
- Case insensitive.
- Returns constraint line which matches or empty string for no
- matches."""
-
- pairs = self.parse_matching_header_opt()
- for field, matchexp, line in pairs:
- fragments = msg.getallmatchingheaders(field)
- subjs = []
- l = len(field)
- for f in fragments:
- # Consolidate header lines, stripping header name & whitespace.
- if (len(f) > l
- and f[l] == ":"
- and string.lower(field) == string.lower(f[0:l])):
- # Non-continuation line - trim header name:
- subjs.append(f[l+2:])
- elif not subjs:
- # Whoops - non-continuation that matches?
- subjs.append(f)
- else:
- # Continuation line.
- subjs[-1] = subjs[-1] + f
- for s in subjs:
- if re.search(matchexp, s, re.I):
- return line
- return 0
- # msg should be an IncomingMessage object.
- def Post(self, msg, approved=0):
- self.IsListInitialized()
- # Be sure to ExtractApproval, whether or not flag is already set!
- msgapproved = self.ExtractApproval(msg)
- if not approved:
- approved = msgapproved
- sender = msg.GetSender()
- # If it's the admin, which we know by the approved variable,
- # we can skip a large number of checks.
- if not approved:
- beentheres = map(lambda x: string.split(x, ": ")[1][:-1],
- msg.getallmatchingheaders('x-beenthere'))
- if self.GetListEmail() in beentheres:
- self.AddRequest('post', Utils.SnarfMessage(msg),
- Errors.LOOPING_POST,
- msg.getheader('subject'))
- if len(self.forbidden_posters):
- addrs = Utils.FindMatchingAddresses(sender,
- self.forbidden_posters)
- if len(addrs):
- self.AddRequest('post', Utils.SnarfMessage(msg),
- Errors.FORBIDDEN_SENDER_MSG,
- msg.getheader('subject'))
- if self.moderated:
- self.AddRequest('post', Utils.SnarfMessage(msg),
- Errors.MODERATED_LIST_MSG,
- msg.getheader('subject'))
- if len(self.posters):
- addrs = Utils.FindMatchingAddresses(sender, self.posters)
- if not len(addrs):
- if self.member_posting_only:
- if not self.IsMember(sender):
- self.AddRequest('post', Utils.SnarfMessage(msg),
- 'Only approved posters may post without '
- 'moderator approval.',
- msg.getheader('subject'))
- else:
- self.AddRequest('post', Utils.SnarfMessage(msg),
- 'Only approved posters may post without '
- 'moderator approval.',
- msg.getheader('subject'))
- elif self.member_posting_only and not self.IsMember(sender):
- self.AddRequest('post', Utils.SnarfMessage(msg),
- 'Postings from member addresses only.',
- msg.getheader('subject'))
- if self.max_num_recipients > 0:
- recips = []
- toheader = msg.getheader('to')
- if toheader:
- recips = recips + string.split(toheader, ',')
- ccheader = msg.getheader('cc')
- if ccheader:
- recips = recips + string.split(ccheader, ',')
- if len(recips) > self.max_num_recipients:
- self.AddRequest('post', Utils.SnarfMessage(msg),
- 'Too many recipients.',
- msg.getheader('subject'))
- if (self.require_explicit_destination and
- not self.HasExplicitDest(msg)):
- self.AddRequest('post', Utils.SnarfMessage(msg),
- Errors.IMPLICIT_DEST_MSG,
- msg.getheader('subject'))
- if self.administrivia and Utils.IsAdministrivia(msg):
- self.AddRequest('post', Utils.SnarfMessage(msg),
- 'possible administrivia to list',
- msg.getheader("subject"))
-
- if self.bounce_matching_headers:
- triggered = self.HasMatchingHeader(msg)
- if triggered:
- # Darn - can't include the matching line for the admin
- # message because the info would also go to the sender.
- self.AddRequest('post', Utils.SnarfMessage(msg),
- Errors.SUSPICIOUS_HEADER_MSG,
- msg.getheader('subject'))
- if self.max_message_size > 0:
- if len(msg.body)/1024. > self.max_message_size:
- self.AddRequest('post', Utils.SnarfMessage(msg),
- 'Message body too long (>%dk)' %
- self.max_message_size,
- msg.getheader('subject'))
- # Prepend the subject_prefix to the subject line.
- subj = msg.getheader('subject')
- prefix = self.subject_prefix
- if not subj:
- msg.SetHeader('Subject', '%s(no subject)' % prefix)
- elif not re.match("(re:? *)?" + re.escape(self.subject_prefix),
- subj, re.I):
- msg.SetHeader('Subject', '%s%s' % (prefix, subj))
- if self.anonymous_list:
- del msg['reply-to']
- del msg['sender']
- msg.SetHeader('From', self.GetAdminEmail())
- if self.digestable:
- self.SaveForDigest(msg)
- if self.archive:
- self.ArchiveMail(msg)
- if self.gateway_to_news:
- self.SendMailToNewsGroup(msg)
- dont_send_to_sender = 0
- ack_post = 0
- # Try to get the address the list thinks this sender is
- sender = self.FindUser(msg.GetSender())
- if sender:
- if self.GetUserOption(sender, mm_cfg.DontReceiveOwnPosts):
- dont_send_to_sender = 1
- if self.GetUserOption(sender, mm_cfg.AcknowlegePosts):
- ack_post = 1
- # Deliver the mail.
- recipients = self.members[:]
- if dont_send_to_sender:
- try:
- recipients.remove(sender)
- #
- # sender not in list (case sensitive username problem?)
- #
- except ValueError:
- self.LogMsg("error",
- "couldn't remove %s from recipient list: %s",
- sender,
- str(recipients))
- def DeliveryEnabled(x, s=self, v=mm_cfg.DisableDelivery):
- return not s.GetUserOption(x, v)
- recipients = filter(DeliveryEnabled, recipients)
- self.DeliverToList(msg, recipients,
- header = self.msg_header % self.__dict__,
- footer = self.msg_footer % self.__dict__)
- if ack_post:
- self.SendPostAck(msg, sender)
- self.last_post_time = time.time()
- self.post_id = self.post_id + 1
- self.Save()
- def Locked(self):
- try:
- return self._lock_file and 1
- except AttributeError:
- return 0
- def Lock(self):
- try:
- if self._lock_file:
- return
- except AttributeError:
- return
- ou = os.umask(0)
- try:
- self._lock_file = posixfile.open(
- os.path.join(mm_cfg.LOCK_DIR, '%s.lock' % self._internal_name),
- 'a+')
- finally:
- os.umask(ou)
- self._lock_file.lock('w|', 1)
-
- def Unlock(self):
- if self.Locked():
- self._lock_file.lock('u')
- self._lock_file.close()
- self._lock_file = None
- def __repr__(self):
- if self.Locked(): status = " (locked)"
- else: status = ""
- return ("<%s.%s %s%s at %s>"
- % (self.__module__, self.__class__.__name__,
- `self._internal_name`, status, hex(id(self))[2:]))