2
0
mirror of https://github.com/vdukhovni/postfix synced 2025-08-29 13:18:12 +00:00

postfix-2.0.16-20031026

This commit is contained in:
Wietse Venema 2003-10-22 00:00:00 -05:00 committed by Viktor Dukhovni
parent 8a2c6280e8
commit b4c4f6c4a4
6 changed files with 20 additions and 5 deletions

View File

@ -8692,6 +8692,20 @@ Apologies for any names omitted.
with incorrectly implemented SQL or LDAP tables. File: with incorrectly implemented SQL or LDAP tables. File:
global/maps_find.c. global/maps_find.c.
20031023
Bugfix: the MYSQL and PGSQL modules invoked dict_register().
This was fixed a while ago but never made it into the
distribution. Files: util/dict*sql.c.
Robustness: added three ISSPACE() calls in the smtpd proxy
parser. File: smtpd/smtpd_proxy.c.
20031024
Portability: added localhost to mydestination for sites that
turn off append_dot_mydomain. File: global/mail_params.h.
Open problems: Open problems:
High: when virtual aliasing is turned off after content High: when virtual aliasing is turned off after content

View File

@ -87,7 +87,7 @@ extern char *var_myorigin;
* mail to other destinations. * mail to other destinations.
*/ */
#define VAR_MYDEST "mydestination" #define VAR_MYDEST "mydestination"
#define DEF_MYDEST "$myhostname, localhost.$mydomain" #define DEF_MYDEST "$myhostname, localhost.$mydomain localhost"
extern char *var_mydest; extern char *var_mydest;
/* /*

View File

@ -3812,6 +3812,8 @@ char *smtpd_check_size(SMTPD_STATE *state, off_t size)
|| BLOCKS(var_message_limit) >= fsbuf.block_free / 2) { || BLOCKS(var_message_limit) >= fsbuf.block_free / 2) {
(void) smtpd_check_reject(state, MAIL_ERROR_RESOURCE, (void) smtpd_check_reject(state, MAIL_ERROR_RESOURCE,
"452 Insufficient system storage"); "452 Insufficient system storage");
msg_warn("not enough free space in mail queue: %lu bytes",
(unsigned long) fsbuf.block_free * fsbuf.block_size);
return (STR(error_text)); return (STR(error_text));
} }
return (0); return (0);

View File

@ -1,6 +1,6 @@
/*++ /*++
/* NAME /* NAME
/* smtpd_proto 3 /* smtpd_proxy 3
/* SUMMARY /* SUMMARY
/* SMTP server pass-through proxy client /* SMTP server pass-through proxy client
/* SYNOPSIS /* SYNOPSIS
@ -234,7 +234,8 @@ int smtpd_proxy_open(SMTPD_STATE *state, const char *service,
*/ */
lines = STR(state->proxy_buffer); lines = STR(state->proxy_buffer);
while ((line = mystrtok(&lines, "\n")) != 0) while ((line = mystrtok(&lines, "\n")) != 0)
if ((line[3] == ' ' || line[3] == '-') if (ISDIGIT(line[0]) && ISDIGIT(line[1]) && ISDIGIT(line[2])
&& (line[3] == ' ' || line[3] == '-')
&& strcmp(line + 4, XLOGINFO_CMD) == 0) && strcmp(line + 4, XLOGINFO_CMD) == 0)
(void) smtpd_proxy_cmd(state, SMTPD_PROX_WANT_ANY, "%s %s %s", (void) smtpd_proxy_cmd(state, SMTPD_PROX_WANT_ANY, "%s %s %s",
XLOGINFO_CMD, state->addr, state->name); XLOGINFO_CMD, state->addr, state->name);

View File

@ -382,7 +382,6 @@ DICT *dict_mysql_open(const char *name, int open_flags, int dict_flags)
dict_mysql->name->len_hosts); dict_mysql->name->len_hosts);
if (dict_mysql->pldb == NULL) if (dict_mysql->pldb == NULL)
msg_fatal("couldn't intialize pldb!\n"); msg_fatal("couldn't intialize pldb!\n");
dict_register(name, (DICT *) dict_mysql);
return (DICT_DEBUG (&dict_mysql->dict)); return (DICT_DEBUG (&dict_mysql->dict));
} }

View File

@ -512,7 +512,6 @@ DICT *dict_pgsql_open(const char *name, int open_flags, int dict_flags)
dict_pgsql->dict.flags = dict_flags | DICT_FLAG_FIXED; dict_pgsql->dict.flags = dict_flags | DICT_FLAG_FIXED;
if (dict_pgsql->pldb == NULL) if (dict_pgsql->pldb == NULL)
msg_fatal("couldn't intialize pldb!\n"); msg_fatal("couldn't intialize pldb!\n");
dict_register(name, (DICT *) dict_pgsql);
return &dict_pgsql->dict; return &dict_pgsql->dict;
} }