Jinnrry 054336fe9e
v2.6.1 (#169)
1、新增垃圾邮件过滤插件
2、使用使用github.com/dlclark/regexp2替换go原生的正则包
3、修复空数据导致的邮件插入失败
2024-07-20 10:39:17 +08:00

189 lines
4.6 KiB
Go

package smtp_server
import (
"crypto/tls"
"database/sql"
"github.com/Jinnrry/pmail/config"
"github.com/Jinnrry/pmail/db"
"github.com/Jinnrry/pmail/models"
"github.com/Jinnrry/pmail/utils/context"
"github.com/Jinnrry/pmail/utils/errors"
"github.com/Jinnrry/pmail/utils/id"
"github.com/Jinnrry/pmail/utils/password"
"github.com/emersion/go-sasl"
"github.com/emersion/go-smtp"
log "github.com/sirupsen/logrus"
"net"
"strings"
"time"
)
// The Backend implements SMTP server methods.
type Backend struct{}
func (bkd *Backend) NewSession(conn *smtp.Conn) (smtp.Session, error) {
remoteAddress := conn.Conn().RemoteAddr()
ctx := &context.Context{}
ctx.SetValue(context.LogID, id.GenLogID())
log.WithContext(ctx).Debugf("新SMTP连接")
return &Session{
RemoteAddress: remoteAddress,
Ctx: ctx,
}, nil
}
// A Session is returned after EHLO.
type Session struct {
RemoteAddress net.Addr
User string
From string
To []string
Ctx *context.Context
}
// AuthMechanisms returns a slice of available auth mechanisms
// supported in this example.
func (s *Session) AuthMechanisms() []string {
return []string{sasl.Plain, sasl.Login}
}
// Auth is the handler for supported authenticators.
func (s *Session) Auth(mech string) (sasl.Server, error) {
log.WithContext(s.Ctx).Debugf("Auth :%s", mech)
if mech == sasl.Plain {
return sasl.NewPlainServer(func(identity, username, password string) error {
return s.AuthPlain(username, password)
}), nil
}
if mech == sasl.Login {
return sasl.NewLoginServer(func(username, password string) error {
return s.AuthPlain(username, password)
}), nil
}
return nil, errors.New("Auth Not Supported")
}
func (s *Session) AuthPlain(username, pwd string) error {
log.WithContext(s.Ctx).Debugf("Auth %s %s", username, pwd)
s.User = username
var user models.User
encodePwd := password.Encode(pwd)
infos := strings.Split(username, "@")
if len(infos) > 1 {
username = infos[0]
}
_, err := db.Instance.Where("account =? and password =? and disabled=0", username, encodePwd).Get(&user)
if err != nil && err != sql.ErrNoRows {
log.Errorf("%+v", err)
}
if user.ID > 0 {
s.Ctx.UserAccount = user.Account
s.Ctx.UserID = user.ID
s.Ctx.UserName = user.Name
s.Ctx.IsAdmin = user.IsAdmin == 1
log.WithContext(s.Ctx).Debugf("Auth Success %+v", user)
return nil
}
log.WithContext(s.Ctx).Debugf("登陆错误%s %s", username, pwd)
return errors.New("password error")
}
func (s *Session) Mail(from string, opts *smtp.MailOptions) error {
log.WithContext(s.Ctx).Debugf("Mail Success %+v %+v", from, opts)
s.From = from
return nil
}
func (s *Session) Rcpt(to string, opts *smtp.RcptOptions) error {
log.WithContext(s.Ctx).Debugf("Rcpt Success %+v", to)
s.To = append(s.To, to)
return nil
}
func (s *Session) Reset() {}
func (s *Session) Logout() error {
return nil
}
var instance *smtp.Server
var instanceTls *smtp.Server
func StartWithTLS() {
be := &Backend{}
instanceTls = smtp.NewServer(be)
instanceTls.Addr = ":465"
instanceTls.Domain = config.Instance.Domain
instanceTls.ReadTimeout = 10 * time.Second
instanceTls.WriteTimeout = 10 * time.Second
instanceTls.MaxMessageBytes = 1024 * 1024 * 30
instanceTls.MaxRecipients = 50
// force TLS for auth
instanceTls.AllowInsecureAuth = true
// Load the certificate and key
cer, err := tls.LoadX509KeyPair(config.Instance.SSLPublicKeyPath, config.Instance.SSLPrivateKeyPath)
if err != nil {
log.Fatal(err)
return
}
// Configure the TLS support
instanceTls.TLSConfig = &tls.Config{Certificates: []tls.Certificate{cer}}
log.Println("Starting Smtp With SSL Server Port:", instanceTls.Addr)
if err := instanceTls.ListenAndServeTLS(); err != nil {
log.Fatal(err)
}
}
func Start() {
be := &Backend{}
instance = smtp.NewServer(be)
instance.Addr = ":25"
instance.Domain = config.Instance.Domain
instance.ReadTimeout = 10 * time.Second
instance.WriteTimeout = 10 * time.Second
instance.MaxMessageBytes = 1024 * 1024 * 30
instance.MaxRecipients = 50
// force TLS for auth
instance.AllowInsecureAuth = false
// Load the certificate and key
cer, err := tls.LoadX509KeyPair(config.Instance.SSLPublicKeyPath, config.Instance.SSLPrivateKeyPath)
if err != nil {
log.Fatal(err)
return
}
// Configure the TLS support
instance.TLSConfig = &tls.Config{Certificates: []tls.Certificate{cer}}
log.Println("Starting Smtp Server Port:", instance.Addr)
if err := instance.ListenAndServe(); err != nil {
log.Fatal(err)
}
}
func Stop() {
if instance != nil {
instance.Close()
}
if instanceTls != nil {
instanceTls.Close()
}
}