mirror of
https://github.com/knadh/listmonk.git
synced 2025-09-12 17:35:19 +08:00
This patch introduces new `campaigns:get_all` and `campaigns:manage_all` permissions which alter the behaviour of the the old `campaigns:get` and `campaigns:manage` permissions. This is a subtle breaking behavioural change. Old: - `campaigns:get` -> View all campaigns irrespective of a user's list permissions. - `campaigns:manage` -> Manage all campaigns irrespective of a user's list permissions. New: - `campaigns:get_all` -> View all campaigns irrespective of a user's list permissions. - `campaigns:manage_all` -> Manage all campaigns irrespective of a user's list permissions. - `campaigns:get` -> View only the campaigns that have at least one list to which which a user has get or manage access. - `campaigns:manage` -> Manage only the campaigns that have at list one list to which a user has get or manage access. In addition, this patch refactors and cleans up certain permission related logic and functions.
1023 lines
31 KiB
Go
1023 lines
31 KiB
Go
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/md5"
|
|
"database/sql"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"html/template"
|
|
"net/http"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/Masterminds/sprig/v3"
|
|
"github.com/gdgvda/cron"
|
|
"github.com/jmoiron/sqlx"
|
|
"github.com/jmoiron/sqlx/types"
|
|
"github.com/knadh/goyesql/v2"
|
|
goyesqlx "github.com/knadh/goyesql/v2/sqlx"
|
|
"github.com/knadh/koanf/maps"
|
|
"github.com/knadh/koanf/parsers/toml"
|
|
"github.com/knadh/koanf/providers/confmap"
|
|
"github.com/knadh/koanf/providers/file"
|
|
"github.com/knadh/koanf/providers/posflag"
|
|
"github.com/knadh/koanf/v2"
|
|
"github.com/knadh/listmonk/internal/auth"
|
|
"github.com/knadh/listmonk/internal/bounce"
|
|
"github.com/knadh/listmonk/internal/bounce/mailbox"
|
|
"github.com/knadh/listmonk/internal/captcha"
|
|
"github.com/knadh/listmonk/internal/core"
|
|
"github.com/knadh/listmonk/internal/i18n"
|
|
"github.com/knadh/listmonk/internal/manager"
|
|
"github.com/knadh/listmonk/internal/media"
|
|
"github.com/knadh/listmonk/internal/media/providers/filesystem"
|
|
"github.com/knadh/listmonk/internal/media/providers/s3"
|
|
"github.com/knadh/listmonk/internal/messenger/email"
|
|
"github.com/knadh/listmonk/internal/messenger/postback"
|
|
"github.com/knadh/listmonk/internal/subimporter"
|
|
"github.com/knadh/listmonk/models"
|
|
"github.com/knadh/stuffbin"
|
|
"github.com/labstack/echo/v4"
|
|
"github.com/lib/pq"
|
|
flag "github.com/spf13/pflag"
|
|
"gopkg.in/volatiletech/null.v6"
|
|
)
|
|
|
|
const (
|
|
queryFilePath = "queries.sql"
|
|
)
|
|
|
|
// constants contains static, constant config values required by the app.
|
|
type constants struct {
|
|
SiteName string `koanf:"site_name"`
|
|
RootURL string `koanf:"root_url"`
|
|
LogoURL string `koanf:"logo_url"`
|
|
FaviconURL string `koanf:"favicon_url"`
|
|
LoginURL string `koanf:"login_url"`
|
|
FromEmail string `koanf:"from_email"`
|
|
NotifyEmails []string `koanf:"notify_emails"`
|
|
EnablePublicSubPage bool `koanf:"enable_public_subscription_page"`
|
|
EnablePublicArchive bool `koanf:"enable_public_archive"`
|
|
EnablePublicArchiveRSSContent bool `koanf:"enable_public_archive_rss_content"`
|
|
SendOptinConfirmation bool `koanf:"send_optin_confirmation"`
|
|
Lang string `koanf:"lang"`
|
|
DBBatchSize int `koanf:"batch_size"`
|
|
Privacy struct {
|
|
IndividualTracking bool `koanf:"individual_tracking"`
|
|
AllowPreferences bool `koanf:"allow_preferences"`
|
|
AllowBlocklist bool `koanf:"allow_blocklist"`
|
|
AllowExport bool `koanf:"allow_export"`
|
|
AllowWipe bool `koanf:"allow_wipe"`
|
|
RecordOptinIP bool `koanf:"record_optin_ip"`
|
|
UnsubHeader bool `koanf:"unsubscribe_header"`
|
|
Exportable map[string]bool `koanf:"-"`
|
|
DomainBlocklist []string `koanf:"-"`
|
|
DomainAllowlist []string `koanf:"-"`
|
|
} `koanf:"privacy"`
|
|
Security struct {
|
|
OIDC struct {
|
|
Enabled bool `koanf:"enabled"`
|
|
Provider string `koanf:"provider_url"`
|
|
ClientID string `koanf:"client_id"`
|
|
ClientSecret string `koanf:"client_secret"`
|
|
} `koanf:"oidc"`
|
|
|
|
EnableCaptcha bool `koanf:"enable_captcha"`
|
|
CaptchaKey string `koanf:"captcha_key"`
|
|
CaptchaSecret string `koanf:"captcha_secret"`
|
|
} `koanf:"security"`
|
|
|
|
Appearance struct {
|
|
AdminCSS []byte `koanf:"admin.custom_css"`
|
|
AdminJS []byte `koanf:"admin.custom_js"`
|
|
PublicCSS []byte `koanf:"public.custom_css"`
|
|
PublicJS []byte `koanf:"public.custom_js"`
|
|
}
|
|
|
|
HasLegacyUser bool
|
|
UnsubURL string
|
|
LinkTrackURL string
|
|
ViewTrackURL string
|
|
OptinURL string
|
|
MessageURL string
|
|
ArchiveURL string
|
|
AssetVersion string
|
|
|
|
MediaUpload struct {
|
|
Provider string
|
|
Extensions []string
|
|
}
|
|
|
|
BounceWebhooksEnabled bool
|
|
BounceSESEnabled bool
|
|
BounceSendgridEnabled bool
|
|
BouncePostmarkEnabled bool
|
|
BounceForwardemailEnabled bool
|
|
|
|
PermissionsRaw json.RawMessage
|
|
Permissions map[string]struct{}
|
|
}
|
|
|
|
type notifTpls struct {
|
|
tpls *template.Template
|
|
contentType string
|
|
}
|
|
|
|
func initFlags() {
|
|
f := flag.NewFlagSet("config", flag.ContinueOnError)
|
|
f.Usage = func() {
|
|
// Register --help handler.
|
|
fmt.Println(f.FlagUsages())
|
|
os.Exit(0)
|
|
}
|
|
|
|
// Register the commandline flags.
|
|
f.StringSlice("config", []string{"config.toml"},
|
|
"path to one or more config files (will be merged in order)")
|
|
f.Bool("install", false, "setup database (first time)")
|
|
f.Bool("idempotent", false, "make --install run only if the database isn't already setup")
|
|
f.Bool("upgrade", false, "upgrade database to the current version")
|
|
f.Bool("version", false, "show current version of the build")
|
|
f.Bool("new-config", false, "generate sample config file")
|
|
f.String("static-dir", "", "(optional) path to directory with static files")
|
|
f.String("i18n-dir", "", "(optional) path to directory with i18n language files")
|
|
f.Bool("yes", false, "assume 'yes' to prompts during --install/upgrade")
|
|
f.Bool("passive", false, "run in passive mode where campaigns are not processed")
|
|
if err := f.Parse(os.Args[1:]); err != nil {
|
|
lo.Fatalf("error loading flags: %v", err)
|
|
}
|
|
|
|
if err := ko.Load(posflag.Provider(f, ".", ko), nil); err != nil {
|
|
lo.Fatalf("error loading config: %v", err)
|
|
}
|
|
}
|
|
|
|
// initConfigFiles loads the given config files into the koanf instance.
|
|
func initConfigFiles(files []string, ko *koanf.Koanf) {
|
|
for _, f := range files {
|
|
lo.Printf("reading config: %s", f)
|
|
if err := ko.Load(file.Provider(f), toml.Parser()); err != nil {
|
|
if os.IsNotExist(err) {
|
|
lo.Fatal("config file not found. If there isn't one yet, run --new-config to generate one.")
|
|
}
|
|
lo.Fatalf("error loading config from file: %v.", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
// initFileSystem initializes the stuffbin FileSystem to provide
|
|
// access to bundled static assets to the app.
|
|
func initFS(appDir, frontendDir, staticDir, i18nDir string) stuffbin.FileSystem {
|
|
var (
|
|
// stuffbin real_path:virtual_alias paths to map local assets on disk
|
|
// when there an embedded filestystem is not found.
|
|
|
|
// These paths are joined with appDir.
|
|
appFiles = []string{
|
|
"./config.toml.sample:config.toml.sample",
|
|
"./queries.sql:queries.sql",
|
|
"./schema.sql:schema.sql",
|
|
"./permissions.json:permissions.json",
|
|
}
|
|
|
|
frontendFiles = []string{
|
|
// Admin frontend's static assets accessible at /admin/* during runtime.
|
|
// These paths are sourced from frontendDir.
|
|
"./:/admin",
|
|
}
|
|
|
|
staticFiles = []string{
|
|
// These paths are joined with staticDir.
|
|
"./email-templates:static/email-templates",
|
|
"./public:/public",
|
|
}
|
|
|
|
i18nFiles = []string{
|
|
// These paths are joined with i18nDir.
|
|
"./:/i18n",
|
|
}
|
|
)
|
|
|
|
// Get the executable's execPath.
|
|
execPath, err := os.Executable()
|
|
if err != nil {
|
|
lo.Fatalf("error getting executable path: %v", err)
|
|
}
|
|
|
|
// Load embedded files in the executable.
|
|
hasEmbed := true
|
|
fs, err := stuffbin.UnStuff(execPath)
|
|
if err != nil {
|
|
hasEmbed = false
|
|
|
|
// Running in local mode. Load local assets into
|
|
// the in-memory stuffbin.FileSystem.
|
|
lo.Printf("unable to initialize embedded filesystem (%v). Using local filesystem", err)
|
|
|
|
fs, err = stuffbin.NewLocalFS("/")
|
|
if err != nil {
|
|
lo.Fatalf("failed to initialize local file for assets: %v", err)
|
|
}
|
|
}
|
|
|
|
// If the embed failed, load app and frontend files from the compile-time paths.
|
|
files := []string{}
|
|
if !hasEmbed {
|
|
files = append(files, joinFSPaths(appDir, appFiles)...)
|
|
files = append(files, joinFSPaths(frontendDir, frontendFiles)...)
|
|
}
|
|
|
|
// Irrespective of the embeds, if there are user specified static or i18n paths,
|
|
// load files from there and override default files (embedded or picked up from CWD).
|
|
if !hasEmbed || i18nDir != "" {
|
|
if i18nDir == "" {
|
|
// Default dir in cwd.
|
|
i18nDir = "i18n"
|
|
}
|
|
lo.Printf("loading i18n files from: %v", i18nDir)
|
|
files = append(files, joinFSPaths(i18nDir, i18nFiles)...)
|
|
}
|
|
|
|
if !hasEmbed || staticDir != "" {
|
|
if staticDir == "" {
|
|
// Default dir in cwd.
|
|
staticDir = "static"
|
|
} else {
|
|
// There is a custom static directory. Any paths that aren't in it, exclude.
|
|
sf := []string{}
|
|
for _, def := range staticFiles {
|
|
s := strings.Split(def, ":")[0]
|
|
if _, err := os.Stat(path.Join(staticDir, s)); err == nil {
|
|
sf = append(sf, def)
|
|
}
|
|
}
|
|
staticFiles = sf
|
|
}
|
|
|
|
lo.Printf("loading static files from: %v", staticDir)
|
|
files = append(files, joinFSPaths(staticDir, staticFiles)...)
|
|
}
|
|
|
|
// No additional files to load.
|
|
if len(files) == 0 {
|
|
return fs
|
|
}
|
|
|
|
// Load files from disk and overlay into the FS.
|
|
fStatic, err := stuffbin.NewLocalFS("/", files...)
|
|
if err != nil {
|
|
lo.Fatalf("failed reading static files from disk: '%s': %v", staticDir, err)
|
|
}
|
|
|
|
if err := fs.Merge(fStatic); err != nil {
|
|
lo.Fatalf("error merging static files: '%s': %v", staticDir, err)
|
|
}
|
|
|
|
return fs
|
|
}
|
|
|
|
// initDB initializes the main DB connection pool and parse and loads the app's
|
|
// SQL queries into a prepared query map.
|
|
func initDB() *sqlx.DB {
|
|
var c struct {
|
|
Host string `koanf:"host"`
|
|
Port int `koanf:"port"`
|
|
User string `koanf:"user"`
|
|
Password string `koanf:"password"`
|
|
DBName string `koanf:"database"`
|
|
SSLMode string `koanf:"ssl_mode"`
|
|
Params string `koanf:"params"`
|
|
MaxOpen int `koanf:"max_open"`
|
|
MaxIdle int `koanf:"max_idle"`
|
|
MaxLifetime time.Duration `koanf:"max_lifetime"`
|
|
}
|
|
if err := ko.Unmarshal("db", &c); err != nil {
|
|
lo.Fatalf("error loading db config: %v", err)
|
|
}
|
|
|
|
lo.Printf("connecting to db: %s:%d/%s", c.Host, c.Port, c.DBName)
|
|
db, err := sqlx.Connect("postgres",
|
|
fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=%s %s", c.Host, c.Port, c.User, c.Password, c.DBName, c.SSLMode, c.Params))
|
|
if err != nil {
|
|
lo.Fatalf("error connecting to DB: %v", err)
|
|
}
|
|
|
|
db.SetMaxOpenConns(c.MaxOpen)
|
|
db.SetMaxIdleConns(c.MaxIdle)
|
|
db.SetConnMaxLifetime(c.MaxLifetime)
|
|
|
|
return db
|
|
}
|
|
|
|
// readQueries reads named SQL queries from the SQL queries file into a query map.
|
|
func readQueries(sqlFile string, fs stuffbin.FileSystem) goyesql.Queries {
|
|
// Load SQL queries.
|
|
qB, err := fs.Read(sqlFile)
|
|
if err != nil {
|
|
lo.Fatalf("error reading SQL file %s: %v", sqlFile, err)
|
|
}
|
|
qMap, err := goyesql.ParseBytes(qB)
|
|
if err != nil {
|
|
lo.Fatalf("error parsing SQL queries: %v", err)
|
|
}
|
|
|
|
return qMap
|
|
}
|
|
|
|
// prepareQueries queries prepares a query map and returns a *Queries
|
|
func prepareQueries(qMap goyesql.Queries, db *sqlx.DB, ko *koanf.Koanf) *models.Queries {
|
|
var (
|
|
countQuery = "get-campaign-analytics-counts"
|
|
linkSel = "*"
|
|
)
|
|
if ko.Bool("privacy.individual_tracking") {
|
|
countQuery = "get-campaign-analytics-unique-counts"
|
|
linkSel = "DISTINCT subscriber_id"
|
|
}
|
|
|
|
// These don't exist in the SQL file but are in the queries struct to be prepared.
|
|
qMap["get-campaign-view-counts"] = &goyesql.Query{
|
|
Query: fmt.Sprintf(qMap[countQuery].Query, "campaign_views"),
|
|
Tags: map[string]string{"name": "get-campaign-view-counts"},
|
|
}
|
|
qMap["get-campaign-click-counts"] = &goyesql.Query{
|
|
Query: fmt.Sprintf(qMap[countQuery].Query, "link_clicks"),
|
|
Tags: map[string]string{"name": "get-campaign-click-counts"},
|
|
}
|
|
qMap["get-campaign-link-counts"].Query = fmt.Sprintf(qMap["get-campaign-link-counts"].Query, linkSel)
|
|
|
|
// Scan and prepare all queries.
|
|
var q models.Queries
|
|
if err := goyesqlx.ScanToStruct(&q, qMap, db.Unsafe()); err != nil {
|
|
lo.Fatalf("error preparing SQL queries: %v", err)
|
|
}
|
|
|
|
return &q
|
|
}
|
|
|
|
// initSettings loads settings from the DB into the given Koanf map.
|
|
func initSettings(query string, db *sqlx.DB, ko *koanf.Koanf) {
|
|
var s types.JSONText
|
|
if err := db.Get(&s, query); err != nil {
|
|
msg := err.Error()
|
|
if err, ok := err.(*pq.Error); ok {
|
|
if err.Detail != "" {
|
|
msg = fmt.Sprintf("%s. %s", err, err.Detail)
|
|
}
|
|
}
|
|
|
|
lo.Fatalf("error reading settings from DB: %s", msg)
|
|
}
|
|
|
|
// Setting keys are dot separated, eg: app.favicon_url. Unflatten them into
|
|
// nested maps {app: {favicon_url}}.
|
|
var out map[string]interface{}
|
|
if err := json.Unmarshal(s, &out); err != nil {
|
|
lo.Fatalf("error unmarshalling settings from DB: %v", err)
|
|
}
|
|
if err := ko.Load(confmap.Provider(out, "."), nil); err != nil {
|
|
lo.Fatalf("error parsing settings from DB: %v", err)
|
|
}
|
|
}
|
|
|
|
func initConstants() *constants {
|
|
// Read constants.
|
|
var c constants
|
|
if err := ko.Unmarshal("app", &c); err != nil {
|
|
lo.Fatalf("error loading app config: %v", err)
|
|
}
|
|
if err := ko.Unmarshal("privacy", &c.Privacy); err != nil {
|
|
lo.Fatalf("error loading app.privacy config: %v", err)
|
|
}
|
|
if err := ko.Unmarshal("security", &c.Security); err != nil {
|
|
lo.Fatalf("error loading app.security config: %v", err)
|
|
}
|
|
|
|
if err := ko.UnmarshalWithConf("appearance", &c.Appearance, koanf.UnmarshalConf{FlatPaths: true}); err != nil {
|
|
lo.Fatalf("error loading app.appearance config: %v", err)
|
|
}
|
|
|
|
c.RootURL = strings.TrimRight(c.RootURL, "/")
|
|
c.LoginURL = path.Join(uriAdmin, "/login")
|
|
c.Lang = ko.String("app.lang")
|
|
c.Privacy.Exportable = maps.StringSliceToLookupMap(ko.Strings("privacy.exportable"))
|
|
c.MediaUpload.Provider = ko.String("upload.provider")
|
|
c.MediaUpload.Extensions = ko.Strings("upload.extensions")
|
|
c.Privacy.DomainBlocklist = ko.Strings("privacy.domain_blocklist")
|
|
c.Privacy.DomainAllowlist = ko.Strings("privacy.domain_allowlist")
|
|
|
|
// Static URLS.
|
|
// url.com/subscription/{campaign_uuid}/{subscriber_uuid}
|
|
c.UnsubURL = fmt.Sprintf("%s/subscription/%%s/%%s", c.RootURL)
|
|
|
|
// url.com/subscription/optin/{subscriber_uuid}
|
|
c.OptinURL = fmt.Sprintf("%s/subscription/optin/%%s?%%s", c.RootURL)
|
|
|
|
// url.com/link/{campaign_uuid}/{subscriber_uuid}/{link_uuid}
|
|
c.LinkTrackURL = fmt.Sprintf("%s/link/%%s/%%s/%%s", c.RootURL)
|
|
|
|
// url.com/link/{campaign_uuid}/{subscriber_uuid}
|
|
c.MessageURL = fmt.Sprintf("%s/campaign/%%s/%%s", c.RootURL)
|
|
|
|
// url.com/archive
|
|
c.ArchiveURL = c.RootURL + "/archive"
|
|
|
|
// url.com/campaign/{campaign_uuid}/{subscriber_uuid}/px.png
|
|
c.ViewTrackURL = fmt.Sprintf("%s/campaign/%%s/%%s/px.png", c.RootURL)
|
|
|
|
c.BounceWebhooksEnabled = ko.Bool("bounce.webhooks_enabled")
|
|
c.BounceSESEnabled = ko.Bool("bounce.ses_enabled")
|
|
c.BounceSendgridEnabled = ko.Bool("bounce.sendgrid_enabled")
|
|
c.BouncePostmarkEnabled = ko.Bool("bounce.postmark.enabled")
|
|
c.BounceForwardemailEnabled = ko.Bool("bounce.forwardemail.enabled")
|
|
c.HasLegacyUser = ko.Exists("app.admin_username") || ko.Exists("app.admin_password")
|
|
|
|
b := md5.Sum([]byte(time.Now().String()))
|
|
c.AssetVersion = fmt.Sprintf("%x", b)[0:10]
|
|
|
|
pm, err := fs.Read("/permissions.json")
|
|
if err != nil {
|
|
lo.Fatalf("error reading permissions file: %v", err)
|
|
}
|
|
c.PermissionsRaw = pm
|
|
|
|
// Make a lookup map of permissions.
|
|
permGroups := []struct {
|
|
Group string `json:"group"`
|
|
Permissions []string `json:"permissions"`
|
|
}{}
|
|
if err := json.Unmarshal(pm, &permGroups); err != nil {
|
|
lo.Fatalf("error loading permissions file: %v", err)
|
|
}
|
|
|
|
c.Permissions = map[string]struct{}{}
|
|
for _, group := range permGroups {
|
|
for _, g := range group.Permissions {
|
|
c.Permissions[g] = struct{}{}
|
|
}
|
|
}
|
|
|
|
return &c
|
|
}
|
|
|
|
// initI18n initializes a new i18n instance with the selected language map
|
|
// loaded from the filesystem. English is a loaded first as the default map
|
|
// and then the selected language is loaded on top of it so that if there are
|
|
// missing translations in it, the default English translations show up.
|
|
func initI18n(lang string, fs stuffbin.FileSystem) *i18n.I18n {
|
|
i, ok, err := getI18nLang(lang, fs)
|
|
if err != nil {
|
|
if ok {
|
|
lo.Println(err)
|
|
} else {
|
|
lo.Fatal(err)
|
|
}
|
|
}
|
|
return i
|
|
}
|
|
|
|
// initCampaignManager initializes the campaign manager.
|
|
func initCampaignManager(q *models.Queries, cs *constants, app *App) *manager.Manager {
|
|
campNotifCB := func(subject string, data interface{}) error {
|
|
return app.sendNotification(cs.NotifyEmails, subject, notifTplCampaign, data, nil)
|
|
}
|
|
|
|
if ko.Bool("passive") {
|
|
lo.Println("running in passive mode. won't process campaigns.")
|
|
}
|
|
|
|
return manager.New(manager.Config{
|
|
BatchSize: ko.Int("app.batch_size"),
|
|
Concurrency: ko.Int("app.concurrency"),
|
|
MessageRate: ko.Int("app.message_rate"),
|
|
MaxSendErrors: ko.Int("app.max_send_errors"),
|
|
FromEmail: cs.FromEmail,
|
|
IndividualTracking: ko.Bool("privacy.individual_tracking"),
|
|
UnsubURL: cs.UnsubURL,
|
|
OptinURL: cs.OptinURL,
|
|
LinkTrackURL: cs.LinkTrackURL,
|
|
ViewTrackURL: cs.ViewTrackURL,
|
|
MessageURL: cs.MessageURL,
|
|
ArchiveURL: cs.ArchiveURL,
|
|
RootURL: cs.RootURL,
|
|
UnsubHeader: ko.Bool("privacy.unsubscribe_header"),
|
|
SlidingWindow: ko.Bool("app.message_sliding_window"),
|
|
SlidingWindowDuration: ko.Duration("app.message_sliding_window_duration"),
|
|
SlidingWindowRate: ko.Int("app.message_sliding_window_rate"),
|
|
ScanInterval: time.Second * 5,
|
|
ScanCampaigns: !ko.Bool("passive"),
|
|
}, newManagerStore(q, app.core, app.media), campNotifCB, app.i18n, lo)
|
|
}
|
|
|
|
func initTxTemplates(m *manager.Manager, app *App) {
|
|
tpls, err := app.core.GetTemplates(models.TemplateTypeTx, false)
|
|
if err != nil {
|
|
lo.Fatalf("error loading transactional templates: %v", err)
|
|
}
|
|
|
|
for _, t := range tpls {
|
|
tpl := t
|
|
if err := tpl.Compile(app.manager.GenericTemplateFuncs()); err != nil {
|
|
lo.Printf("error compiling transactional template %d: %v", tpl.ID, err)
|
|
continue
|
|
}
|
|
m.CacheTpl(tpl.ID, &tpl)
|
|
}
|
|
}
|
|
|
|
// initImporter initializes the bulk subscriber importer.
|
|
func initImporter(q *models.Queries, db *sqlx.DB, core *core.Core, app *App) *subimporter.Importer {
|
|
return subimporter.New(
|
|
subimporter.Options{
|
|
DomainBlocklist: app.constants.Privacy.DomainBlocklist,
|
|
DomainAllowlist: app.constants.Privacy.DomainAllowlist,
|
|
UpsertStmt: q.UpsertSubscriber.Stmt,
|
|
BlocklistStmt: q.UpsertBlocklistSubscriber.Stmt,
|
|
UpdateListDateStmt: q.UpdateListsDate.Stmt,
|
|
NotifCB: func(subject string, data interface{}) error {
|
|
// Refresh cached subscriber counts and stats.
|
|
core.RefreshMatViews(true)
|
|
|
|
app.sendNotification(app.constants.NotifyEmails, subject, notifTplImport, data, nil)
|
|
return nil
|
|
},
|
|
}, db.DB, app.i18n)
|
|
}
|
|
|
|
// initSMTPMessenger initializes the combined and individual SMTP messengers.
|
|
func initSMTPMessengers() []manager.Messenger {
|
|
var (
|
|
servers = []email.Server{}
|
|
out = []manager.Messenger{}
|
|
)
|
|
|
|
// Load the config for multiple SMTP servers.
|
|
for _, item := range ko.Slices("smtp") {
|
|
if !item.Bool("enabled") {
|
|
continue
|
|
}
|
|
|
|
// Read the SMTP config.
|
|
var s email.Server
|
|
if err := item.UnmarshalWithConf("", &s, koanf.UnmarshalConf{Tag: "json"}); err != nil {
|
|
lo.Fatalf("error reading SMTP config: %v", err)
|
|
}
|
|
|
|
servers = append(servers, s)
|
|
lo.Printf("initialized email (SMTP) messenger: %s@%s", item.String("username"), item.String("host"))
|
|
|
|
// If the server has a name, initialize it as a standalone e-mail messenger
|
|
// allowing campaigns to select individual SMTPs. In the UI and config, it'll appear as `email / $name`.
|
|
if s.Name != "" {
|
|
msgr, err := email.New(s.Name, s)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing e-mail messenger: %v", err)
|
|
}
|
|
out = append(out, msgr)
|
|
}
|
|
}
|
|
|
|
// Initialize the 'email' messenger with all SMTP servers.
|
|
msgr, err := email.New(email.MessengerName, servers...)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing e-mail messenger: %v", err)
|
|
}
|
|
|
|
// If it's just one server, return the default "email" messenger.
|
|
if len(servers) == 1 {
|
|
return []manager.Messenger{msgr}
|
|
}
|
|
|
|
// If there are multiple servers, prepend the group "email" to be the first one.
|
|
out = append([]manager.Messenger{msgr}, out...)
|
|
|
|
return out
|
|
}
|
|
|
|
// initPostbackMessengers initializes and returns all the enabled
|
|
// HTTP postback messenger backends.
|
|
func initPostbackMessengers() []manager.Messenger {
|
|
items := ko.Slices("messengers")
|
|
if len(items) == 0 {
|
|
return nil
|
|
}
|
|
|
|
var out []manager.Messenger
|
|
for _, item := range items {
|
|
if !item.Bool("enabled") {
|
|
continue
|
|
}
|
|
|
|
// Read the Postback server config.
|
|
var (
|
|
name = item.String("name")
|
|
o postback.Options
|
|
)
|
|
if err := item.UnmarshalWithConf("", &o, koanf.UnmarshalConf{Tag: "json"}); err != nil {
|
|
lo.Fatalf("error reading Postback config: %v", err)
|
|
}
|
|
|
|
// Initialize the Messenger.
|
|
p, err := postback.New(o)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing Postback messenger %s: %v", name, err)
|
|
}
|
|
out = append(out, p)
|
|
|
|
lo.Printf("loaded Postback messenger: %s", name)
|
|
}
|
|
|
|
return out
|
|
}
|
|
|
|
// initMediaStore initializes Upload manager with a custom backend.
|
|
func initMediaStore() media.Store {
|
|
switch provider := ko.String("upload.provider"); provider {
|
|
case "s3":
|
|
var o s3.Opt
|
|
ko.Unmarshal("upload.s3", &o)
|
|
|
|
up, err := s3.NewS3Store(o)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing s3 upload provider %s", err)
|
|
}
|
|
lo.Println("media upload provider: s3")
|
|
return up
|
|
|
|
case "filesystem":
|
|
var o filesystem.Opts
|
|
|
|
ko.Unmarshal("upload.filesystem", &o)
|
|
o.RootURL = ko.String("app.root_url")
|
|
o.UploadPath = filepath.Clean(o.UploadPath)
|
|
o.UploadURI = filepath.Clean(o.UploadURI)
|
|
up, err := filesystem.New(o)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing filesystem upload provider %s", err)
|
|
}
|
|
lo.Println("media upload provider: filesystem")
|
|
return up
|
|
|
|
default:
|
|
lo.Fatalf("unknown provider. select filesystem or s3")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// initNotifTemplates compiles and returns e-mail notification templates that are
|
|
// used for sending ad-hoc notifications to admins and subscribers.
|
|
func initNotifTemplates(fs stuffbin.FileSystem, i *i18n.I18n, cs *constants) *notifTpls {
|
|
tpls, err := stuffbin.ParseTemplatesGlob(initTplFuncs(i, cs), fs, "/static/email-templates/*.html")
|
|
if err != nil {
|
|
lo.Fatalf("error parsing e-mail notif templates: %v", err)
|
|
}
|
|
|
|
html, err := fs.Read("/static/email-templates/base.html")
|
|
if err != nil {
|
|
lo.Fatalf("error reading static/email-templates/base.html: %v", err)
|
|
}
|
|
|
|
out := ¬ifTpls{
|
|
tpls: tpls,
|
|
contentType: models.CampaignContentTypeHTML,
|
|
}
|
|
|
|
// Determine whether the notification templates are HTML or plaintext.
|
|
// Copy the first few (arbitrary) bytes of the template and check if has the <!doctype html> tag.
|
|
ln := 256
|
|
if len(html) < ln {
|
|
ln = len(html)
|
|
}
|
|
h := make([]byte, ln)
|
|
copy(h, html[0:ln])
|
|
|
|
if !bytes.Contains(bytes.ToLower(h), []byte("<!doctype html")) {
|
|
out.contentType = models.CampaignContentTypePlain
|
|
lo.Println("system e-mail templates are plaintext")
|
|
}
|
|
|
|
return out
|
|
}
|
|
|
|
// initBounceManager initializes the bounce manager that scans mailboxes and listens to webhooks
|
|
// for incoming bounce events.
|
|
func initBounceManager(app *App) *bounce.Manager {
|
|
opt := bounce.Opt{
|
|
WebhooksEnabled: ko.Bool("bounce.webhooks_enabled"),
|
|
SESEnabled: ko.Bool("bounce.ses_enabled"),
|
|
SendgridEnabled: ko.Bool("bounce.sendgrid_enabled"),
|
|
SendgridKey: ko.String("bounce.sendgrid_key"),
|
|
Postmark: struct {
|
|
Enabled bool
|
|
Username string
|
|
Password string
|
|
}{
|
|
ko.Bool("bounce.postmark.enabled"),
|
|
ko.String("bounce.postmark.username"),
|
|
ko.String("bounce.postmark.password"),
|
|
},
|
|
ForwardEmail: struct {
|
|
Enabled bool
|
|
Key string
|
|
}{
|
|
ko.Bool("bounce.forwardemail.enabled"),
|
|
ko.String("bounce.forwardemail.key"),
|
|
},
|
|
RecordBounceCB: app.core.RecordBounce,
|
|
}
|
|
|
|
// For now, only one mailbox is supported.
|
|
for _, b := range ko.Slices("bounce.mailboxes") {
|
|
if !b.Bool("enabled") {
|
|
continue
|
|
}
|
|
|
|
var boxOpt mailbox.Opt
|
|
if err := b.UnmarshalWithConf("", &boxOpt, koanf.UnmarshalConf{Tag: "json"}); err != nil {
|
|
lo.Fatalf("error reading bounce mailbox config: %v", err)
|
|
}
|
|
|
|
opt.MailboxType = b.String("type")
|
|
opt.MailboxEnabled = true
|
|
opt.Mailbox = boxOpt
|
|
break
|
|
}
|
|
|
|
b, err := bounce.New(opt, &bounce.Queries{
|
|
RecordQuery: app.queries.RecordBounce,
|
|
}, app.log)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing bounce manager: %v", err)
|
|
}
|
|
|
|
return b
|
|
}
|
|
|
|
func initAbout(q *models.Queries, db *sqlx.DB) about {
|
|
var (
|
|
mem runtime.MemStats
|
|
)
|
|
|
|
// Memory / alloc stats.
|
|
runtime.ReadMemStats(&mem)
|
|
|
|
info := types.JSONText(`{}`)
|
|
if err := db.QueryRow(q.GetDBInfo).Scan(&info); err != nil {
|
|
lo.Printf("WARNING: error getting database version: %v", err)
|
|
}
|
|
|
|
hostname, err := os.Hostname()
|
|
if err != nil {
|
|
lo.Printf("WARNING: error getting hostname: %v", err)
|
|
}
|
|
|
|
return about{
|
|
Version: versionString,
|
|
Build: buildString,
|
|
GoArch: runtime.GOARCH,
|
|
GoVersion: runtime.Version(),
|
|
Database: info,
|
|
System: aboutSystem{
|
|
NumCPU: runtime.NumCPU(),
|
|
},
|
|
Host: aboutHost{
|
|
OS: runtime.GOOS,
|
|
Machine: runtime.GOARCH,
|
|
Hostname: hostname,
|
|
},
|
|
}
|
|
|
|
}
|
|
|
|
// initHTTPServer sets up and runs the app's main HTTP server and blocks forever.
|
|
func initHTTPServer(app *App) *echo.Echo {
|
|
// Initialize the HTTP server.
|
|
var srv = echo.New()
|
|
srv.HideBanner = true
|
|
|
|
// Register app (*App) to be injected into all HTTP handlers.
|
|
srv.Use(func(next echo.HandlerFunc) echo.HandlerFunc {
|
|
return func(c echo.Context) error {
|
|
c.Set("app", app)
|
|
return next(c)
|
|
}
|
|
})
|
|
|
|
tpl, err := stuffbin.ParseTemplatesGlob(initTplFuncs(app.i18n, app.constants), app.fs, "/public/templates/*.html")
|
|
if err != nil {
|
|
lo.Fatalf("error parsing public templates: %v", err)
|
|
}
|
|
srv.Renderer = &tplRenderer{
|
|
templates: tpl,
|
|
SiteName: app.constants.SiteName,
|
|
RootURL: app.constants.RootURL,
|
|
LogoURL: app.constants.LogoURL,
|
|
FaviconURL: app.constants.FaviconURL,
|
|
AssetVersion: app.constants.AssetVersion,
|
|
EnablePublicSubPage: app.constants.EnablePublicSubPage,
|
|
EnablePublicArchive: app.constants.EnablePublicArchive,
|
|
IndividualTracking: app.constants.Privacy.IndividualTracking,
|
|
}
|
|
|
|
// Initialize the static file server.
|
|
fSrv := app.fs.FileServer()
|
|
|
|
// Public (subscriber) facing static files.
|
|
srv.GET("/public/static/*", echo.WrapHandler(fSrv))
|
|
|
|
// Admin (frontend) facing static files.
|
|
srv.GET("/admin/static/*", echo.WrapHandler(fSrv))
|
|
|
|
// Public (subscriber) facing media upload files.
|
|
if ko.String("upload.provider") == "filesystem" && ko.String("upload.filesystem.upload_uri") != "" {
|
|
srv.Static(ko.String("upload.filesystem.upload_uri"), ko.String("upload.filesystem.upload_path"))
|
|
}
|
|
|
|
// Register all HTTP handlers.
|
|
initHTTPHandlers(srv, app)
|
|
|
|
// Start the server.
|
|
go func() {
|
|
if err := srv.Start(ko.String("app.address")); err != nil {
|
|
if errors.Is(err, http.ErrServerClosed) {
|
|
lo.Println("HTTP server shut down")
|
|
} else {
|
|
lo.Fatalf("error starting HTTP server: %v", err)
|
|
}
|
|
}
|
|
}()
|
|
|
|
return srv
|
|
}
|
|
|
|
func initCaptcha() *captcha.Captcha {
|
|
return captcha.New(captcha.Opt{
|
|
CaptchaSecret: ko.String("security.captcha_secret"),
|
|
})
|
|
}
|
|
|
|
func initCron(core *core.Core) {
|
|
c := cron.New()
|
|
_, err := c.Add(ko.MustString("app.cache_slow_queries_interval"), func() {
|
|
lo.Println("refreshing slow query cache")
|
|
_ = core.RefreshMatViews(true)
|
|
lo.Println("done refreshing slow query cache")
|
|
})
|
|
if err != nil {
|
|
lo.Printf("error initializing slow cache query cron: %v", err)
|
|
return
|
|
}
|
|
|
|
c.Start()
|
|
lo.Printf("IMPORTANT: database slow query caching is enabled. Aggregate numbers and stats will not be realtime. Next refresh at: %v", c.Entries()[0].Next)
|
|
}
|
|
|
|
func awaitReload(sigChan chan os.Signal, closerWait chan bool, closer func()) chan bool {
|
|
// The blocking signal handler that main() waits on.
|
|
out := make(chan bool)
|
|
|
|
// Respawn a new process and exit the running one.
|
|
respawn := func() {
|
|
if err := syscall.Exec(os.Args[0], os.Args, os.Environ()); err != nil {
|
|
lo.Fatalf("error spawning process: %v", err)
|
|
}
|
|
os.Exit(0)
|
|
}
|
|
|
|
// Listen for reload signal.
|
|
go func() {
|
|
for range sigChan {
|
|
lo.Println("reloading on signal ...")
|
|
|
|
go closer()
|
|
select {
|
|
case <-closerWait:
|
|
// Wait for the closer to finish.
|
|
respawn()
|
|
case <-time.After(time.Second * 3):
|
|
// Or timeout and force close.
|
|
respawn()
|
|
}
|
|
}
|
|
}()
|
|
|
|
return out
|
|
}
|
|
|
|
func joinFSPaths(root string, paths []string) []string {
|
|
out := make([]string, 0, len(paths))
|
|
for _, p := range paths {
|
|
// real_path:stuffbin_alias
|
|
f := strings.Split(p, ":")
|
|
|
|
out = append(out, path.Join(root, f[0])+":"+f[1])
|
|
}
|
|
|
|
return out
|
|
}
|
|
|
|
func initTplFuncs(i *i18n.I18n, cs *constants) template.FuncMap {
|
|
funcs := template.FuncMap{
|
|
"RootURL": func() string {
|
|
return cs.RootURL
|
|
},
|
|
"LogoURL": func() string {
|
|
return cs.LogoURL
|
|
},
|
|
"Date": func(layout string) string {
|
|
if layout == "" {
|
|
layout = time.ANSIC
|
|
}
|
|
return time.Now().Format(layout)
|
|
},
|
|
"L": func() *i18n.I18n {
|
|
return i
|
|
},
|
|
"Safe": func(safeHTML string) template.HTML {
|
|
return template.HTML(safeHTML)
|
|
},
|
|
}
|
|
|
|
for k, v := range sprig.GenericFuncMap() {
|
|
funcs[k] = v
|
|
}
|
|
|
|
return funcs
|
|
}
|
|
|
|
func initAuth(db *sql.DB, ko *koanf.Koanf, co *core.Core) (bool, *auth.Auth) {
|
|
var oidcCfg auth.OIDCConfig
|
|
|
|
if ko.Bool("security.oidc.enabled") {
|
|
oidcCfg = auth.OIDCConfig{
|
|
Enabled: true,
|
|
ProviderURL: ko.String("security.oidc.provider_url"),
|
|
ClientID: ko.String("security.oidc.client_id"),
|
|
ClientSecret: ko.String("security.oidc.client_secret"),
|
|
RedirectURL: fmt.Sprintf("%s/auth/oidc", strings.TrimRight(ko.String("app.root_url"), "/")),
|
|
}
|
|
}
|
|
|
|
// Session manager callbacks for getting and setting cookies.
|
|
cb := &auth.Callbacks{
|
|
GetCookie: func(name string, r interface{}) (*http.Cookie, error) {
|
|
c := r.(echo.Context)
|
|
cookie, err := c.Cookie(name)
|
|
return cookie, err
|
|
},
|
|
SetCookie: func(cookie *http.Cookie, w interface{}) error {
|
|
c := w.(echo.Context)
|
|
c.SetCookie(cookie)
|
|
return nil
|
|
},
|
|
GetUser: func(id int) (models.User, error) {
|
|
return co.GetUser(id, "", "")
|
|
},
|
|
}
|
|
|
|
a, err := auth.New(auth.Config{
|
|
OIDC: oidcCfg,
|
|
}, db, cb, lo)
|
|
if err != nil {
|
|
lo.Fatalf("error initializing auth: %v", err)
|
|
}
|
|
|
|
// Cache all API users in-memory for token auth.
|
|
hasUsers, err := cacheUsers(co, a)
|
|
if err != nil {
|
|
lo.Fatalf("error loading API users to cache: %v", err)
|
|
}
|
|
|
|
// If the legacy username+password is set in the TOML file, use that as an API
|
|
// access token in the auth module to preserve backwards compatibility for existing
|
|
// API integrations. The presence of these values show a red banner on the admin UI
|
|
// prompting the creation of new API credentials and the removal of values from
|
|
// the TOML config.
|
|
var (
|
|
username = ko.String("app.admin_username")
|
|
password = ko.String("app.admin_password")
|
|
)
|
|
if len(username) > 2 && len(password) > 6 {
|
|
u := models.User{
|
|
Username: username,
|
|
Password: null.String{Valid: true, String: password},
|
|
PasswordLogin: true,
|
|
HasPassword: true,
|
|
Status: models.UserStatusEnabled,
|
|
Type: models.UserTypeAPI,
|
|
}
|
|
u.UserRole.ID = models.SuperAdminRoleID
|
|
a.CacheAPIUser(u)
|
|
|
|
lo.Println(`WARNING: Remove the admin_username and admin_password fields from the TOML configuration file. If you are using APIs, create and use new credentials. Users are now managed via the Admin -> Settings -> Users dashboard.`)
|
|
}
|
|
|
|
return hasUsers, a
|
|
}
|