mirror of
https://github.com/nodemailer/wildduck.git
synced 2024-11-10 17:47:07 +08:00
99 lines
3.5 KiB
JavaScript
99 lines
3.5 KiB
JavaScript
'use strict';
|
|
|
|
module.exports = {
|
|
SCHEMA_VERSION: '1.0',
|
|
|
|
// how many modifications to cache before writing
|
|
BULK_BATCH_SIZE: 150,
|
|
|
|
// how often to clear expired messages
|
|
GC_INTERVAL: 15 * 60 * 1000,
|
|
|
|
// artificail delay between deleting next expired message in ms
|
|
// set to 0 to disable
|
|
GC_DELAY_DELETE: 0,
|
|
|
|
// default
|
|
MAX_STORAGE: 1 * (1024 * 1024 * 1024),
|
|
MAX_RECIPIENTS: 2000,
|
|
MAX_FORWARDS: 2000,
|
|
|
|
JUNK_RETENTION: 30 * 24 * 3600 * 1000,
|
|
|
|
// how long to keep messages of deleted users before deleting
|
|
DELETED_USER_MESSAGE_RETENTION: 14 * 24 * 3600 * 1000,
|
|
|
|
MAILBOX_COUNTER_TTL: 24 * 3600,
|
|
|
|
// how much plaintext to store in a full text indexed field
|
|
MAX_PLAINTEXT_INDEXED: 1 * 1024,
|
|
|
|
// how much plaintext to store before truncating
|
|
MAX_PLAINTEXT_CONTENT: 100 * 1024,
|
|
|
|
// how much HTML content to store before truncating. not indexed
|
|
MAX_HTML_CONTENT: 300 * 1024,
|
|
|
|
MAX_AUTOREPLY_INTERVAL: 4 * 3600 * 1000,
|
|
|
|
MAX_AUTOREPLIES: 2000,
|
|
|
|
DEFAULT_HASH_ALGO: 'pbkdf2', //either 'pbkdf2' or 'bcrypt'
|
|
|
|
BCRYPT_ROUNDS: 11, // bcrypt.js benchmark async in a VPS: 261.192ms, do not want to take it too long
|
|
PDKDF2_ITERATIONS: 25000,
|
|
PDKDF2_SALT_SIZE: 16,
|
|
PDKDF2_DIGEST: 'sha256', // 'sha512', 'sha256' or 'sha1'
|
|
|
|
// how many authentication failures per user to allow before blocking until the end of the auth window
|
|
USER_AUTH_FAILURES: 12,
|
|
// authentication window in seconds, starts counting from first invalid authentication
|
|
USER_AUTH_WINDOW: 120,
|
|
|
|
// how many authentication failures per ip to allow before blocking until the end of the auth window
|
|
//IP_AUTH_FAILURES: 10,
|
|
IP_AUTH_FAILURES: 0, // disable IP rate limiting for now as too many false positives occurred while scanners use unique IPs
|
|
// authentication window in seconds, starts counting from first invalid authentication
|
|
IP_AUTH_WINDOW: 300,
|
|
|
|
// how many TOTP failures per user to allow before blocking until the end of the auth window
|
|
TOTP_FAILURES: 6,
|
|
// TOTP authentication window in seconds, starts counting from first invalid authentication
|
|
TOTP_WINDOW: 180,
|
|
|
|
SCOPES: ['imap', 'pop3', 'smtp'],
|
|
|
|
// Refuse to process messages larger than 64 MB. Allowing larger messages might cause jumbo chunks in MongoDB
|
|
MAX_ALLOWED_MESSAGE_SIZE: 64 * 1024 * 1024,
|
|
|
|
// Refuse to process attachments larger than 64 MB
|
|
MAX_ALLOWED_ATACHMENT_SIZE: 25 * 1024 * 1024,
|
|
|
|
// how long to keep deleted messages around before purgeing
|
|
ARCHIVE_TIME: 25 * 24 * 3600 * 1000,
|
|
|
|
// merge similar authlog events into 6 hour buckets instead of storing each separately
|
|
// this is mostly needed for IMAP clients that make crazy amout of connections and thus logins
|
|
AUTHLOG_BUCKET: 6 * 3600 * 1000,
|
|
|
|
// start processing tasks 5 minues after startup
|
|
TASK_STARTUP_INTERVAL: 1 * 60 * 1000,
|
|
|
|
// if no tasks were found, wait 1 minute
|
|
TASK_IDLE_INTERVAL: 1 * 60 * 1000,
|
|
|
|
TASK_LOCK_INTERVAL: 1 * 60 * 60 * 1000,
|
|
TASK_UPDATE_INTERVAL: 10 * 60 * 1000,
|
|
|
|
TEMP_PASS_WINDOW: 24 * 3600 * 1000,
|
|
|
|
// mongdb query TTL limits
|
|
DB_MAX_TIME_USERS: 1 * 1000,
|
|
DB_MAX_TIME_MAILBOXES: 800,
|
|
DB_MAX_TIME_MESSAGES: 10 * 1000,
|
|
|
|
// access token default ttl in seconds (token ttl time is extended every time token is used by this value)
|
|
ACCESS_TOKEN_DEFAULT_TTL: 14 * 24 * 3600,
|
|
// access token can be extended until max lifetime value is reached in seconds
|
|
ACCESS_TOKEN_MAX_LIFETIME: 180 * 24 * 3600
|
|
};
|