1 /*
2 * options.c -- command-line option processing
3 *
4 * Copyright 1998 by Eric S. Raymond.
5 * For license terms, see the file COPYING in this directory.
6 */
7
8 #include "config.h"
9 #include "fetchmail.h"
10
11 #include <stdio.h>
12 #include <pwd.h>
13 #include <string.h>
14 #include <errno.h>
15 #if defined(STDC_HEADERS)
16 #include <stdlib.h>
17 #include <limits.h>
18 #else
19 #include <ctype.h>
20 #endif
21
22 #include "getopt.h"
23 #include "fetchmail.h"
24 #include "i18n.h"
25
26 enum {
27 LA_INVISIBLE = 256,
28 LA_PIDFILE,
29 LA_SYSLOG,
30 LA_NOSYSLOG,
31 LA_POSTMASTER,
32 LA_NOBOUNCE,
33 LA_AUTH,
34 LA_FETCHDOMAINS,
35 LA_BSMTP,
36 LA_LMTP,
37 LA_PLUGIN,
38 LA_PLUGOUT,
39 LA_CONFIGDUMP,
40 LA_SMTPNAME,
41 LA_SHOWDOTS,
42 LA_PRINCIPAL,
43 LA_TRACEPOLLS,
44 LA_SSL,
45 LA_SSLKEY,
46 LA_SSLCERT,
47 LA_SSLPROTO,
48 LA_SSLCERTCK,
49 LA_NOSSLCERTCK,
50 LA_SSLCERTFILE,
51 LA_SSLCERTPATH,
52 LA_SSLCOMMONNAME,
53 LA_SSLFINGERPRINT,
54 LA_FETCHSIZELIMIT,
55 LA_FASTUIDL,
56 LA_LIMITFLUSH,
57 LA_IDLE,
58 LA_NOSOFTBOUNCE,
59 LA_SOFTBOUNCE,
60 LA_BADHEADER
61 };
62
63 /* options still left: ACgGhHjJoORTWxXYz */
64 static const char *shortoptions =
65 "?Vcsvd:NqL:f:i:p:UP:t:E:Q:u:akKFnl:r:S:Z:b:B:e:m:I:M:yw:D:";
66
67 static const struct option longoptions[] = {
68 /* this can be const because all flag fields are 0 and will never get set */
69 {"help", no_argument, (int *) 0, '?' },
70 {"version", no_argument, (int *) 0, 'V' },
71 {"check", no_argument, (int *) 0, 'c' },
72 {"silent", no_argument, (int *) 0, 's' },
73 {"verbose", no_argument, (int *) 0, 'v' },
74 {"daemon", required_argument, (int *) 0, 'd' },
75 {"nodetach", no_argument, (int *) 0, 'N' },
76 {"quit", no_argument, (int *) 0, 'q' },
77 {"logfile", required_argument, (int *) 0, 'L' },
78 {"invisible", no_argument, (int *) 0, LA_INVISIBLE },
79 {"showdots", no_argument, (int *) 0, LA_SHOWDOTS },
80 {"syslog", no_argument, (int *) 0, LA_SYSLOG },
81 {"nosyslog", no_argument, (int *) 0, LA_NOSYSLOG },
82 {"fetchmailrc",required_argument,(int *) 0, 'f' },
83 {"idfile", required_argument, (int *) 0, 'i' },
84 {"pidfile", required_argument, (int *) 0, LA_PIDFILE },
85 {"postmaster",required_argument, (int *) 0, LA_POSTMASTER },
86 {"nobounce", no_argument, (int *) 0, LA_NOBOUNCE },
87 {"nosoftbounce", no_argument, (int *) 0, LA_NOSOFTBOUNCE },
88 {"softbounce", no_argument, (int *) 0, LA_SOFTBOUNCE },
89
90 {"protocol", required_argument, (int *) 0, 'p' },
91 {"proto", required_argument, (int *) 0, 'p' },
92 {"uidl", no_argument, (int *) 0, 'U' },
93 {"idle", no_argument, (int *) 0, LA_IDLE},
94 {"port", required_argument, (int *) 0, 'P' },
95 {"service", required_argument, (int *) 0, 'P' },
96 {"auth", required_argument, (int *) 0, LA_AUTH},
97 {"timeout", required_argument, (int *) 0, 't' },
98 {"envelope", required_argument, (int *) 0, 'E' },
99 {"qvirtual", required_argument, (int *) 0, 'Q' },
100 {"bad-header",required_argument, (int *) 0, LA_BADHEADER},
101
102 {"user", required_argument, (int *) 0, 'u' },
103 {"username", required_argument, (int *) 0, 'u' },
104
105 {"all", no_argument, (int *) 0, 'a' },
106 {"fetchall", no_argument, (int *) 0, 'a' },
107 {"nokeep", no_argument, (int *) 0, 'K' },
108 {"keep", no_argument, (int *) 0, 'k' },
109 {"flush", no_argument, (int *) 0, 'F' },
110 {"limitflush", no_argument, (int *) 0, LA_LIMITFLUSH },
111 {"norewrite", no_argument, (int *) 0, 'n' },
112 {"limit", required_argument, (int *) 0, 'l' },
113 {"warnings", required_argument, (int *) 0, 'w' },
114
115 {"folder", required_argument, (int *) 0, 'r' },
116 {"smtphost", required_argument, (int *) 0, 'S' },
117 {"fetchdomains", required_argument, (int *) 0, LA_FETCHDOMAINS },
118 {"smtpaddress", required_argument, (int *) 0, 'D' },
119 {"smtpname", required_argument, (int *) 0, LA_SMTPNAME },
120 {"antispam", required_argument, (int *) 0, 'Z' },
121
122 {"batchlimit",required_argument, (int *) 0, 'b' },
123 {"fetchlimit",required_argument, (int *) 0, 'B' },
124 {"fetchsizelimit",required_argument, (int *) 0, LA_FETCHSIZELIMIT },
125 {"fastuidl", required_argument, (int *) 0, LA_FASTUIDL },
126 {"expunge", required_argument, (int *) 0, 'e' },
127 {"mda", required_argument, (int *) 0, 'm' },
128 {"bsmtp", required_argument, (int *) 0, LA_BSMTP },
129 {"lmtp", no_argument, (int *) 0, LA_LMTP },
130
131 #ifdef SSL_ENABLE
132 {"ssl", no_argument, (int *) 0, LA_SSL },
133 {"sslkey", required_argument, (int *) 0, LA_SSLKEY },
134 {"sslcert", required_argument, (int *) 0, LA_SSLCERT },
135 {"sslproto", required_argument, (int *) 0, LA_SSLPROTO },
136 {"sslcertck", no_argument, (int *) 0, LA_SSLCERTCK },
137 {"nosslcertck", no_argument, (int *) 0, LA_NOSSLCERTCK },
138 {"sslcertfile", required_argument, (int *) 0, LA_SSLCERTFILE },
139 {"sslcertpath", required_argument, (int *) 0, LA_SSLCERTPATH },
140 {"sslcommonname", required_argument, (int *) 0, LA_SSLCOMMONNAME },
141 {"sslfingerprint", required_argument, (int *) 0, LA_SSLFINGERPRINT },
142 #endif
143
144 {"principal", required_argument, (int *) 0, LA_PRINCIPAL },
145
146 #ifdef CAN_MONITOR
147 {"interface", required_argument, (int *) 0, 'I' },
148 {"monitor", required_argument, (int *) 0, 'M' },
149 #endif /* CAN_MONITOR */
150 {"plugin", required_argument, (int *) 0, LA_PLUGIN },
151 {"plugout", required_argument, (int *) 0, LA_PLUGOUT },
152
153 {"configdump",no_argument, (int *) 0, LA_CONFIGDUMP },
154
155 {"yydebug", no_argument, (int *) 0, 'y' },
156
157 {"tracepolls",no_argument, (int *) 0, LA_TRACEPOLLS },
158
159 {(char *) 0, no_argument, (int *) 0, 0 }
160 };
161
xatoi(char * s,int * errflagptr)162 static int xatoi(char *s, int *errflagptr)
163 /* do safe conversion from string to number */
164 {
165 #if defined (STDC_HEADERS) && defined (LONG_MAX) && defined (INT_MAX)
166 /* parse and convert numbers, but also check for invalid characters in
167 * numbers
168 */
169
170 char *endptr;
171 long value;
172
173 errno = 0;
174
175 value = strtol(s, &endptr, 0);
176
177 /* any invalid chars in string? */
178 if ( (endptr == s) || (*endptr != '\0') ) {
179 (void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
180 (*errflagptr)++;
181 return 0;
182 }
183
184 /* is the range valid? */
185 if ( (((value == LONG_MAX) || (value == LONG_MIN)) && (errno == ERANGE)) ||
186 (value > INT_MAX) || (value < INT_MIN)) {
187
188 (void) fprintf(stderr, GT_("Value of string '%s' is %s than %d.\n"), s,
189 (value < 0) ? GT_("smaller"): GT_("larger"),
190 (value < 0) ? INT_MIN : INT_MAX);
191 (*errflagptr)++;
192 return 0;
193 }
194
195 return (int) value; /* shut up, I know what I'm doing */
196 #else
197 int i;
198 char *dp;
199 # if defined (STDC_HEADERS)
200 size_t len;
201 # else
202 int len;
203 # endif
204
205 /* We do only base 10 conversions here (atoi)! */
206
207 len = strlen(s);
208 /* check for leading white spaces */
209 for (i = 0; (i < len) && isspace((unsigned char)s[i]); i++)
210 ;
211
212 dp = &s[i];
213
214 /* check for +/- */
215 if (i < len && (s[i] == '+' || s[i] == '-')) i++;
216
217 /* skip over digits */
218 for ( /* no init */ ; (i < len) && isdigit((unsigned char)s[i]); i++)
219 ;
220
221 /* check for trailing garbage */
222 if (i != len) {
223 (void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
224 (*errflagptr)++;
225 return 0;
226 }
227
228 /* atoi should be safe by now, except for number range over/underflow */
229 return atoi(dp);
230 #endif
231 }
232
233 /** parse and validate the command line options */
parsecmdline(int argc,char ** argv,struct runctl * rctl,struct query * ctl,flag * safewithbg)234 int parsecmdline (int argc /** argument count */,
235 char **argv /** argument strings */,
236 struct runctl *rctl /** global run controls to modify */,
237 struct query *ctl /** option record to initialize */,
238 flag *safewithbg /** set to whether options are
239 compatible with another copy
240 running in the background */)
241 {
242 /*
243 * return value: if positive, argv index of last parsed option + 1
244 * (presumes one or more server names follows). if zero, the
245 * command line switches are such that no server names are
246 * required (e.g. --version). if negative, the command line is
247 * has one or more syntax errors.
248 */
249
250 int c;
251 int ocount = 0; /* count of destinations specified */
252 int errflag = 0; /* TRUE when a syntax error is detected */
253 int helpflag = 0; /* TRUE when option help was explicitly requested */
254 int option_index;
255 int option_safe; /* to track if option currently parsed is safe
256 with a background copy */
257 char *buf, *cp;
258
259 rctl->poll_interval = -1;
260 *safewithbg = TRUE;
261
262 memset(ctl, '\0', sizeof(struct query)); /* start clean */
263 ctl->smtp_socket = -1;
264
265 while (!errflag &&
266 (c = getopt_long(argc,argv,shortoptions,
267 longoptions, &option_index)) != -1)
268 {
269 option_safe = FALSE;
270
271 switch (c) {
272 case 'V':
273 versioninfo = TRUE;
274 option_safe = TRUE;
275 break;
276 case 'c':
277 check_only = TRUE;
278 break;
279 case 's':
280 outlevel = O_SILENT;
281 option_safe = 1;
282 break;
283 case 'v':
284 if (outlevel >= O_VERBOSE)
285 outlevel = O_DEBUG;
286 else
287 outlevel = O_VERBOSE;
288 option_safe = TRUE;
289 break;
290 case 'd':
291 rctl->poll_interval = xatoi(optarg, &errflag);
292 break;
293 case 'N':
294 nodetach = TRUE;
295 break;
296 case 'q':
297 quitmode = TRUE;
298 quitind = optind;
299 break;
300 case 'L':
301 rctl->logfile = prependdir (optarg, currentwd);
302 break;
303 case LA_INVISIBLE:
304 rctl->invisible = FLAG_TRUE;
305 break;
306 case LA_SHOWDOTS:
307 rctl->showdots = FLAG_TRUE;
308 break;
309 case 'f':
310 xfree(rcfile);
311 rcfile = prependdir (optarg, currentwd);
312 break;
313 case 'i':
314 rctl->idfile = prependdir (optarg, currentwd);
315 break;
316 case LA_PIDFILE:
317 rctl->pidfile = prependdir (optarg, currentwd);
318 break;
319 case LA_POSTMASTER:
320 rctl->postmaster = (char *) xstrdup(optarg);
321 break;
322 case LA_NOBOUNCE:
323 rctl->bouncemail = FLAG_FALSE;
324 break;
325 case LA_NOSOFTBOUNCE:
326 rctl->softbounce = FLAG_FALSE;
327 break;
328 case LA_SOFTBOUNCE:
329 rctl->softbounce = FLAG_TRUE;
330 break;
331 case LA_BADHEADER:
332 if (strcasecmp(optarg,"accept") == 0) {
333 ctl->server.badheader = BHACCEPT;
334 } else if (strcasecmp(optarg,"reject") == 0) {
335 ctl->server.badheader = BHREJECT;
336 } else {
337 fprintf(stderr,GT_("Invalid bad-header policy `%s' specified.\n"), optarg);
338 errflag++;
339 }
340 break;
341
342 case 'p':
343 /* XXX -- should probably use a table lookup here */
344 if (strcasecmp(optarg,"auto") == 0)
345 ctl->server.protocol = P_AUTO;
346 else if (strcasecmp(optarg,"pop2") == 0)
347 ctl->server.protocol = P_POP2;
348 #ifdef SDPS_ENABLE
349 else if (strcasecmp(optarg,"sdps") == 0)
350 {
351 ctl->server.protocol = P_POP3;
352 ctl->server.sdps = TRUE;
353 }
354 #endif /* SDPS_ENABLE */
355 else if (strcasecmp(optarg,"pop3") == 0)
356 ctl->server.protocol = P_POP3;
357 else if (strcasecmp(optarg,"apop") == 0)
358 ctl->server.protocol = P_APOP;
359 else if (strcasecmp(optarg,"rpop") == 0)
360 ctl->server.protocol = P_RPOP;
361 else if (strcasecmp(optarg,"kpop") == 0)
362 {
363 ctl->server.protocol = P_POP3;
364 ctl->server.service = xstrdup(KPOP_PORT);
365 #ifdef KERBEROS_V5
366 ctl->server.authenticate = A_KERBEROS_V5;
367 #else
368 ctl->server.authenticate = A_KERBEROS_V4;
369 #endif /* KERBEROS_V5 */
370 }
371 else if (strcasecmp(optarg,"imap") == 0)
372 ctl->server.protocol = P_IMAP;
373 else if (strcasecmp(optarg,"etrn") == 0)
374 ctl->server.protocol = P_ETRN;
375 else if (strcasecmp(optarg,"odmr") == 0)
376 ctl->server.protocol = P_ODMR;
377 else {
378 fprintf(stderr,GT_("Invalid protocol `%s' specified.\n"), optarg);
379 errflag++;
380 }
381 break;
382 case 'U':
383 ctl->server.uidl = FLAG_TRUE;
384 break;
385 case LA_IDLE:
386 ctl->idle = FLAG_TRUE;
387 break;
388 case 'P':
389 ctl->server.service = optarg;
390 break;
391 case LA_AUTH:
392 if (strcmp(optarg, "password") == 0)
393 ctl->server.authenticate = A_PASSWORD;
394 else if (strcmp(optarg, "kerberos") == 0)
395 #ifdef KERBEROS_V5
396 ctl->server.authenticate = A_KERBEROS_V5;
397 #else
398 ctl->server.authenticate = A_KERBEROS_V4;
399 #endif /* KERBEROS_V5 */
400 else if (strcmp(optarg, "kerberos_v5") == 0)
401 ctl->server.authenticate = A_KERBEROS_V5;
402 else if (strcmp(optarg, "kerberos_v4") == 0)
403 ctl->server.authenticate = A_KERBEROS_V4;
404 else if (strcmp(optarg, "ssh") == 0)
405 ctl->server.authenticate = A_SSH;
406 else if (strcasecmp(optarg, "external") == 0)
407 ctl->server.authenticate = A_EXTERNAL;
408 else if (strcmp(optarg, "otp") == 0)
409 ctl->server.authenticate = A_OTP;
410 else if (strcmp(optarg, "opie") == 0)
411 ctl->server.authenticate = A_OTP;
412 else if (strcmp(optarg, "ntlm") == 0)
413 ctl->server.authenticate = A_NTLM;
414 else if (strcmp(optarg, "cram") == 0)
415 ctl->server.authenticate = A_CRAM_MD5;
416 else if (strcmp(optarg, "cram-md5") == 0)
417 ctl->server.authenticate = A_CRAM_MD5;
418 else if (strcmp(optarg, "gssapi") == 0)
419 ctl->server.authenticate = A_GSSAPI;
420 else if (strcmp(optarg, "any") == 0)
421 ctl->server.authenticate = A_ANY;
422 else if (strcmp(optarg, "msn") == 0)
423 ctl->server.authenticate = A_MSN;
424 else {
425 fprintf(stderr,GT_("Invalid authentication `%s' specified.\n"), optarg);
426 errflag++;
427 }
428 break;
429 case 't':
430 ctl->server.timeout = xatoi(optarg, &errflag);
431 if (ctl->server.timeout == 0)
432 ctl->server.timeout = -1;
433 break;
434 case 'E':
435 ctl->server.envelope = xstrdup(optarg);
436 break;
437 case 'Q':
438 ctl->server.qvirtual = xstrdup(optarg);
439 break;
440
441 case 'u':
442 ctl->remotename = xstrdup(optarg);
443 break;
444 case 'a':
445 ctl->fetchall = FLAG_TRUE;
446 break;
447 case 'K':
448 ctl->keep = FLAG_FALSE;
449 break;
450 case 'k':
451 ctl->keep = FLAG_TRUE;
452 break;
453 case 'F':
454 ctl->flush = FLAG_TRUE;
455 break;
456 case LA_LIMITFLUSH:
457 ctl->limitflush = FLAG_TRUE;
458 break;
459 case 'n':
460 ctl->rewrite = FLAG_FALSE;
461 break;
462 case 'l':
463 c = xatoi(optarg, &errflag);
464 ctl->limit = NUM_VALUE_IN(c);
465 break;
466 case 'r':
467 buf = xstrdup(optarg);
468 cp = strtok(buf, ",");
469 do {
470 save_str(&ctl->mailboxes, cp, 0);
471 } while
472 ((cp = strtok((char *)NULL, ",")));
473 free(buf);
474 break;
475 case 'S':
476 buf = xstrdup(optarg);
477 cp = strtok(buf, ",");
478 do {
479 save_str(&ctl->smtphunt, cp, TRUE);
480 } while
481 ((cp = strtok((char *)NULL, ",")));
482 free(buf);
483 ocount++;
484 break;
485 case LA_FETCHDOMAINS:
486 buf = xstrdup(optarg);
487 cp = strtok(buf, ",");
488 do {
489 save_str(&ctl->domainlist, cp, TRUE);
490 } while
491 ((cp = strtok((char *)NULL, ",")));
492 free(buf);
493 break;
494 case 'D':
495 ctl->smtpaddress = xstrdup(optarg);
496 break;
497 case LA_SMTPNAME:
498 ctl->smtpname = xstrdup(optarg);
499 break;
500 case 'Z':
501 buf = xstrdup(optarg);
502 cp = strtok(buf, ",");
503 do {
504 struct idlist *idp = save_str(&ctl->antispam, STRING_DUMMY, 0);
505
506 idp->val.status.num = xatoi(cp, &errflag);
507 } while
508 ((cp = strtok((char *)NULL, ",")));
509 free(buf);
510 break;
511 case 'b':
512 c = xatoi(optarg, &errflag);
513 ctl->batchlimit = NUM_VALUE_IN(c);
514 break;
515 case 'B':
516 c = xatoi(optarg, &errflag);
517 ctl->fetchlimit = NUM_VALUE_IN(c);
518 break;
519 case LA_FETCHSIZELIMIT:
520 c = xatoi(optarg, &errflag);
521 ctl->fetchsizelimit = NUM_VALUE_IN(c);
522 break;
523 case LA_FASTUIDL:
524 c = xatoi(optarg, &errflag);
525 ctl->fastuidl = NUM_VALUE_IN(c);
526 break;
527 case 'e':
528 c = xatoi(optarg, &errflag);
529 ctl->expunge = NUM_VALUE_IN(c);
530 break;
531 case 'm':
532 ctl->mda = xstrdup(optarg);
533 ocount++;
534 break;
535 case LA_BSMTP:
536 ctl->bsmtp = prependdir (optarg, currentwd);
537 ocount++;
538 break;
539 case LA_LMTP:
540 ctl->listener = LMTP_MODE;
541 break;
542
543 #ifdef CAN_MONITOR
544 case 'I':
545 interface_parse(optarg, &ctl->server);
546 break;
547 case 'M':
548 ctl->server.monitor = xstrdup(optarg);
549 break;
550 #endif /* CAN_MONITOR */
551 case LA_PLUGIN:
552 ctl->server.plugin = xstrdup(optarg);
553 break;
554 case LA_PLUGOUT:
555 ctl->server.plugout = xstrdup(optarg);
556 break;
557
558 #ifdef SSL_ENABLE
559 case LA_SSL:
560 ctl->use_ssl = FLAG_TRUE;
561 break;
562
563 case LA_SSLKEY:
564 ctl->sslkey = prependdir (optarg, currentwd);
565 break;
566
567 case LA_SSLCERT:
568 ctl->sslcert = prependdir (optarg, currentwd);
569 break;
570
571 case LA_SSLPROTO:
572 ctl->sslproto = xstrdup(optarg);
573 break;
574
575 case LA_SSLCERTCK:
576 ctl->sslcertck = FLAG_TRUE;
577 break;
578
579 case LA_NOSSLCERTCK:
580 ctl->sslcertck = FLAG_FALSE;
581 break;
582
583 case LA_SSLCERTFILE:
584 ctl->sslcertfile = prependdir(optarg, currentwd);
585 break;
586
587 case LA_SSLCERTPATH:
588 ctl->sslcertpath = prependdir(optarg, currentwd);
589 break;
590
591 case LA_SSLCOMMONNAME:
592 ctl->sslcommonname = xstrdup(optarg);
593 break;
594
595 case LA_SSLFINGERPRINT:
596 ctl->sslfingerprint = xstrdup(optarg);
597 break;
598 #endif
599
600 case LA_PRINCIPAL:
601 ctl->server.principal = xstrdup(optarg);
602 break;
603
604 case 'y':
605 yydebug = TRUE;
606 break;
607
608 case 'w':
609 c = xatoi(optarg, &errflag);
610 ctl->warnings = NUM_VALUE_IN(c);
611 break;
612
613 case LA_CONFIGDUMP:
614 configdump = TRUE;
615 option_safe = TRUE;
616 break;
617
618 case LA_SYSLOG:
619 rctl->use_syslog = FLAG_TRUE;
620 break;
621
622 case LA_NOSYSLOG:
623 rctl->use_syslog = FLAG_FALSE;
624 break;
625
626 case LA_TRACEPOLLS:
627 ctl->server.tracepolls = FLAG_TRUE;
628 break;
629
630 case '?':
631 helpflag = 1;
632 default:
633 break;
634 }
635 *safewithbg &= option_safe;
636 }
637
638 if (errflag || ocount > 1 || helpflag) {
639 /* squawk if syntax errors were detected */
640 #define P(s) fputs(s, helpflag ? stdout : stderr)
641 P(GT_("usage: fetchmail [options] [server ...]\n"));
642 P(GT_(" Options are as follows:\n"));
643 P(GT_(" -?, --help display this option help\n"));
644 P(GT_(" -V, --version display version info\n"));
645
646 P(GT_(" -c, --check check for messages without fetching\n"));
647 P(GT_(" -s, --silent work silently\n"));
648 P(GT_(" -v, --verbose work noisily (diagnostic output)\n"));
649 P(GT_(" -d, --daemon run as a daemon once per n seconds\n"));
650 P(GT_(" -N, --nodetach don't detach daemon process\n"));
651 P(GT_(" -q, --quit kill daemon process\n"));
652 P(GT_(" -L, --logfile specify logfile name\n"));
653 P(GT_(" --syslog use syslog(3) for most messages when running as a daemon\n"));
654 P(GT_(" --nosyslog turns off use of syslog(3)\n"));
655 P(GT_(" --invisible don't write Received & enable host spoofing\n"));
656 P(GT_(" -f, --fetchmailrc specify alternate run control file\n"));
657 P(GT_(" -i, --idfile specify alternate UIDs file\n"));
658 P(GT_(" --pidfile specify alternate PID (lock) file\n"));
659 P(GT_(" --postmaster specify recipient of last resort\n"));
660 P(GT_(" --nobounce redirect bounces from user to postmaster.\n"));
661 P(GT_(" --nosoftbounce fetchmail deletes permanently undeliverable messages.\n"));
662 P(GT_(" --softbounce keep permanently undeliverable messages on server (default).\n"));
663 #ifdef CAN_MONITOR
664 P(GT_(" -I, --interface interface required specification\n"));
665 P(GT_(" -M, --monitor monitor interface for activity\n"));
666 #endif
667 #if defined( SSL_ENABLE )
668 P(GT_(" --ssl enable ssl encrypted session\n"));
669 P(GT_(" --sslkey ssl private key file\n"));
670 P(GT_(" --sslcert ssl client certificate\n"));
671 P(GT_(" --sslcertck do strict server certificate check (recommended)\n"));
672 P(GT_(" --nosslcertck skip strict server certificate check (insecure)\n"));
673 P(GT_(" --sslcertfile path to trusted-CA ssl certificate file\n"));
674 P(GT_(" --sslcertpath path to trusted-CA ssl certificate directory\n"));
675 P(GT_(" --sslcommonname expect this CommonName from server (discouraged)\n"));
676 P(GT_(" --sslfingerprint fingerprint that must match that of the server's cert.\n"));
677 P(GT_(" --sslproto force ssl protocol (see manual)\n"));
678 #endif
679 P(GT_(" --plugin specify external command to open connection\n"));
680 P(GT_(" --plugout specify external command to open smtp connection\n"));
681 P(GT_(" --bad-header {reject|accept}\n"
682 " specify policy for handling messages with bad headers\n"));
683
684 P(GT_(" -p, --proto[col] specify retrieval protocol (see man page)\n"));
685 P(GT_(" -U, --uidl force the use of UIDLs (pop3 only)\n"));
686 P(GT_(" --idle tells the IMAP server to send notice of new messages\n"));
687 P(GT_(" --port TCP port to connect to (obsolete, use --service)\n"));
688 P(GT_(" -P, --service TCP service to connect to (can be numeric TCP port)\n"));
689 P(GT_(" --auth authentication type (see manual)\n"));
690 P(GT_(" -t, --timeout server nonresponse timeout\n"));
691 P(GT_(" -E, --envelope envelope address header\n"));
692 P(GT_(" -Q, --qvirtual prefix to remove from local user id\n"));
693 P(GT_(" --principal mail service principal\n"));
694 P(GT_(" --tracepolls add poll-tracing information to Received header\n"));
695
696 P(GT_(" -u, --user[name] specify users's login on server\n"));
697 P(GT_(" -a, --[fetch]all retrieve old and new messages\n"));
698 P(GT_(" -K, --nokeep delete new messages after retrieval\n"));
699 P(GT_(" -k, --keep save new messages after retrieval\n"));
700 P(GT_(" -F, --flush delete old messages from server\n"));
701 P(GT_(" --limitflush delete oversized messages\n"));
702 P(GT_(" -n, --norewrite don't rewrite header addresses\n"));
703 P(GT_(" -l, --limit don't fetch messages over given size\n"));
704 P(GT_(" -w, --warnings interval between warning mail notification\n"));
705
706 P(GT_(" -S, --smtphost set SMTP forwarding host\n"));
707 P(GT_(" --fetchdomains fetch mail for specified domains\n"));
708 P(GT_(" -D, --smtpaddress set SMTP delivery domain to use\n"));
709 P(GT_(" --smtpname set SMTP full name username@domain\n"));
710 P(GT_(" -Z, --antispam, set antispam response values\n"));
711 P(GT_(" -b, --batchlimit set batch limit for SMTP connections\n"));
712 P(GT_(" -B, --fetchlimit set fetch limit for server connections\n"));
713 P(GT_(" --fetchsizelimit set fetch message size limit\n"));
714 P(GT_(" --fastuidl do a binary search for UIDLs\n"));
715 P(GT_(" -e, --expunge set max deletions between expunges\n"));
716 P(GT_(" -m, --mda set MDA to use for forwarding\n"));
717 P(GT_(" --bsmtp set output BSMTP file\n"));
718 P(GT_(" --lmtp use LMTP (RFC2033) for delivery\n"));
719 P(GT_(" -r, --folder specify remote folder name\n"));
720 P(GT_(" --showdots show progress dots even in logfiles\n"));
721 #undef P
722 /* undocumented:
723 * --configdump (internal use by fetchmailconf, dumps
724 * configuration as Python source code)
725 * --yydebug (developer use, enables parser debugging) */
726
727 if (helpflag)
728 exit(PS_SUCCESS);
729 else
730 exit(PS_SYNTAX);
731 }
732
733 return(optind);
734 }
735
736 /* options.c ends here */
737