mirror of
https://github.com/stalwartlabs/mail-server.git
synced 2025-10-21 01:45:52 +08:00
379 lines
11 KiB
Rust
379 lines
11 KiB
Rust
/*
|
|
* SPDX-FileCopyrightText: 2020 Stalwart Labs Ltd <hello@stalw.art>
|
|
*
|
|
* SPDX-License-Identifier: AGPL-3.0-only OR LicenseRef-SEL
|
|
*/
|
|
|
|
use std::{borrow::Cow, net::IpAddr, sync::Arc};
|
|
|
|
use arc_swap::ArcSwap;
|
|
use config::{
|
|
imap::ImapConfig,
|
|
jmap::settings::JmapConfig,
|
|
scripts::Scripting,
|
|
smtp::{
|
|
auth::{ArcSealer, DkimSigner},
|
|
queue::RelayHost,
|
|
SmtpConfig,
|
|
},
|
|
storage::Storage,
|
|
telemetry::Metrics,
|
|
};
|
|
use directory::{core::secret::verify_secret_hash, Directory, Principal, QueryBy, Type};
|
|
use expr::if_block::IfBlock;
|
|
use jmap_proto::types::collection::Collection;
|
|
use listener::{
|
|
blocked::{AllowedIps, BlockedIps},
|
|
tls::TlsManager,
|
|
};
|
|
use mail_send::Credentials;
|
|
|
|
use sieve::Sieve;
|
|
use store::{
|
|
write::{DirectoryClass, QueueClass, ValueClass},
|
|
BitmapKey, IterateParams, LookupStore, ValueKey,
|
|
};
|
|
use tokio::sync::{mpsc, oneshot};
|
|
use trc::AddContext;
|
|
use utils::BlobHash;
|
|
|
|
pub mod addresses;
|
|
pub mod config;
|
|
#[cfg(feature = "enterprise")]
|
|
pub mod enterprise;
|
|
pub mod expr;
|
|
pub mod listener;
|
|
pub mod manager;
|
|
pub mod scripts;
|
|
pub mod telemetry;
|
|
|
|
pub static USER_AGENT: &str = concat!("Stalwart/", env!("CARGO_PKG_VERSION"),);
|
|
pub static DAEMON_NAME: &str = concat!("Stalwart Mail Server v", env!("CARGO_PKG_VERSION"),);
|
|
|
|
pub const IPC_CHANNEL_BUFFER: usize = 1024;
|
|
|
|
pub type SharedCore = Arc<ArcSwap<Core>>;
|
|
|
|
#[derive(Clone, Default)]
|
|
pub struct Core {
|
|
pub storage: Storage,
|
|
pub sieve: Scripting,
|
|
pub network: Network,
|
|
pub tls: TlsManager,
|
|
pub smtp: SmtpConfig,
|
|
pub jmap: JmapConfig,
|
|
pub imap: ImapConfig,
|
|
pub metrics: Metrics,
|
|
#[cfg(feature = "enterprise")]
|
|
pub enterprise: Option<enterprise::Enterprise>,
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
pub struct Network {
|
|
pub node_id: u64,
|
|
pub blocked_ips: BlockedIps,
|
|
pub allowed_ips: AllowedIps,
|
|
pub http_response_url: IfBlock,
|
|
pub http_allowed_endpoint: IfBlock,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub enum DeliveryEvent {
|
|
Ingest {
|
|
message: IngestMessage,
|
|
result_tx: oneshot::Sender<Vec<DeliveryResult>>,
|
|
},
|
|
Stop,
|
|
}
|
|
|
|
pub struct Ipc {
|
|
pub delivery_tx: mpsc::Sender<DeliveryEvent>,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub struct IngestMessage {
|
|
pub sender_address: String,
|
|
pub recipients: Vec<String>,
|
|
pub message_blob: BlobHash,
|
|
pub message_size: usize,
|
|
pub session_id: u64,
|
|
}
|
|
|
|
#[derive(Debug, Clone)]
|
|
pub enum DeliveryResult {
|
|
Success,
|
|
TemporaryFailure {
|
|
reason: Cow<'static, str>,
|
|
},
|
|
PermanentFailure {
|
|
code: [u8; 3],
|
|
reason: Cow<'static, str>,
|
|
},
|
|
}
|
|
|
|
pub trait IntoString: Sized {
|
|
fn into_string(self) -> String;
|
|
}
|
|
|
|
impl IntoString for Vec<u8> {
|
|
fn into_string(self) -> String {
|
|
String::from_utf8(self)
|
|
.unwrap_or_else(|err| String::from_utf8_lossy(err.as_bytes()).into_owned())
|
|
}
|
|
}
|
|
|
|
impl Core {
|
|
pub fn get_directory(&self, name: &str) -> Option<&Arc<Directory>> {
|
|
self.storage.directories.get(name)
|
|
}
|
|
|
|
pub fn get_directory_or_default(&self, name: &str, session_id: u64) -> &Arc<Directory> {
|
|
self.storage.directories.get(name).unwrap_or_else(|| {
|
|
trc::event!(
|
|
Eval(trc::EvalEvent::DirectoryNotFound),
|
|
Id = name.to_string(),
|
|
SpanId = session_id,
|
|
);
|
|
|
|
&self.storage.directory
|
|
})
|
|
}
|
|
|
|
pub fn get_lookup_store(&self, name: &str, session_id: u64) -> &LookupStore {
|
|
self.storage.lookups.get(name).unwrap_or_else(|| {
|
|
trc::event!(
|
|
Eval(trc::EvalEvent::StoreNotFound),
|
|
Id = name.to_string(),
|
|
SpanId = session_id,
|
|
);
|
|
|
|
&self.storage.lookup
|
|
})
|
|
}
|
|
|
|
pub fn get_arc_sealer(&self, name: &str, session_id: u64) -> Option<&ArcSealer> {
|
|
self.smtp
|
|
.mail_auth
|
|
.sealers
|
|
.get(name)
|
|
.map(|s| s.as_ref())
|
|
.or_else(|| {
|
|
trc::event!(
|
|
Arc(trc::ArcEvent::SealerNotFound),
|
|
Id = name.to_string(),
|
|
SpanId = session_id,
|
|
);
|
|
|
|
None
|
|
})
|
|
}
|
|
|
|
pub fn get_dkim_signer(&self, name: &str, session_id: u64) -> Option<&DkimSigner> {
|
|
self.smtp
|
|
.mail_auth
|
|
.signers
|
|
.get(name)
|
|
.map(|s| s.as_ref())
|
|
.or_else(|| {
|
|
trc::event!(
|
|
Dkim(trc::DkimEvent::SignerNotFound),
|
|
Id = name.to_string(),
|
|
SpanId = session_id,
|
|
);
|
|
|
|
None
|
|
})
|
|
}
|
|
|
|
pub fn get_sieve_script(&self, name: &str, session_id: u64) -> Option<&Arc<Sieve>> {
|
|
self.sieve.scripts.get(name).or_else(|| {
|
|
trc::event!(
|
|
Sieve(trc::SieveEvent::ScriptNotFound),
|
|
Id = name.to_string(),
|
|
SpanId = session_id,
|
|
);
|
|
|
|
None
|
|
})
|
|
}
|
|
|
|
pub fn get_relay_host(&self, name: &str, session_id: u64) -> Option<&RelayHost> {
|
|
self.smtp.queue.relay_hosts.get(name).or_else(|| {
|
|
trc::event!(
|
|
Smtp(trc::SmtpEvent::RemoteIdNotFound),
|
|
Id = name.to_string(),
|
|
SpanId = session_id,
|
|
);
|
|
|
|
None
|
|
})
|
|
}
|
|
|
|
pub async fn authenticate(
|
|
&self,
|
|
directory: &Directory,
|
|
session_id: u64,
|
|
credentials: &Credentials<String>,
|
|
remote_ip: IpAddr,
|
|
return_member_of: bool,
|
|
) -> trc::Result<Principal<u32>> {
|
|
// First try to authenticate the user against the default directory
|
|
let result = match directory
|
|
.query(QueryBy::Credentials(credentials), return_member_of)
|
|
.await
|
|
{
|
|
Ok(Some(principal)) => {
|
|
trc::event!(
|
|
Auth(trc::AuthEvent::Success),
|
|
AccountName = credentials.login().to_string(),
|
|
AccountId = principal.id,
|
|
SpanId = session_id,
|
|
Type = principal.typ.as_str(),
|
|
);
|
|
|
|
return Ok(principal);
|
|
}
|
|
Ok(None) => Ok(()),
|
|
Err(err) => {
|
|
if err.matches(trc::EventType::Auth(trc::AuthEvent::MissingTotp)) {
|
|
return Err(err);
|
|
} else {
|
|
Err(err)
|
|
}
|
|
}
|
|
};
|
|
|
|
// Then check if the credentials match the fallback admin or master user
|
|
match (
|
|
&self.jmap.fallback_admin,
|
|
&self.jmap.master_user,
|
|
credentials,
|
|
) {
|
|
(Some((fallback_admin, fallback_pass)), _, Credentials::Plain { username, secret })
|
|
if username == fallback_admin =>
|
|
{
|
|
if verify_secret_hash(fallback_pass, secret).await? {
|
|
trc::event!(
|
|
Auth(trc::AuthEvent::Success),
|
|
AccountName = username.clone(),
|
|
SpanId = session_id,
|
|
Type = Type::Superuser.as_str(),
|
|
);
|
|
|
|
return Ok(Principal::fallback_admin(fallback_pass));
|
|
}
|
|
}
|
|
(_, Some((master_user, master_pass)), Credentials::Plain { username, secret })
|
|
if username.ends_with(master_user) =>
|
|
{
|
|
if verify_secret_hash(master_pass, secret).await? {
|
|
let username = username.strip_suffix(master_user).unwrap();
|
|
let username = username.strip_suffix('%').unwrap_or(username);
|
|
|
|
if let Some(principal) = directory
|
|
.query(QueryBy::Name(username), return_member_of)
|
|
.await?
|
|
{
|
|
trc::event!(
|
|
Auth(trc::AuthEvent::Success),
|
|
AccountName = username.to_string(),
|
|
SpanId = session_id,
|
|
AccountId = principal.id,
|
|
Type = principal.typ.as_str(),
|
|
);
|
|
|
|
return Ok(principal);
|
|
}
|
|
}
|
|
}
|
|
_ => {}
|
|
}
|
|
|
|
if let Err(err) = result {
|
|
Err(err)
|
|
} else if self.has_auth_fail2ban() {
|
|
let login = credentials.login();
|
|
if self.is_auth_fail2banned(remote_ip, login).await? {
|
|
Err(trc::SecurityEvent::AuthenticationBan
|
|
.into_err()
|
|
.ctx(trc::Key::RemoteIp, remote_ip)
|
|
.ctx(trc::Key::AccountName, login.to_string()))
|
|
} else {
|
|
Err(trc::AuthEvent::Failed
|
|
.ctx(trc::Key::RemoteIp, remote_ip)
|
|
.ctx(trc::Key::AccountName, login.to_string()))
|
|
}
|
|
} else {
|
|
Err(trc::AuthEvent::Failed
|
|
.ctx(trc::Key::RemoteIp, remote_ip)
|
|
.ctx(trc::Key::AccountName, credentials.login().to_string()))
|
|
}
|
|
}
|
|
|
|
pub async fn total_queued_messages(&self) -> trc::Result<u64> {
|
|
let mut total = 0;
|
|
self.storage
|
|
.data
|
|
.iterate(
|
|
IterateParams::new(
|
|
ValueKey::from(ValueClass::Queue(QueueClass::Message(0))),
|
|
ValueKey::from(ValueClass::Queue(QueueClass::Message(u64::MAX))),
|
|
)
|
|
.no_values(),
|
|
|_, _| {
|
|
total += 1;
|
|
|
|
Ok(true)
|
|
},
|
|
)
|
|
.await
|
|
.map(|_| total)
|
|
}
|
|
|
|
pub async fn total_accounts(&self) -> trc::Result<u64> {
|
|
self.storage
|
|
.data
|
|
.get_bitmap(BitmapKey::document_ids(u32::MAX, Collection::Principal))
|
|
.await
|
|
.caused_by(trc::location!())
|
|
.map(|bitmap| bitmap.map_or(0, |b| b.len()))
|
|
}
|
|
|
|
pub async fn total_domains(&self) -> trc::Result<u64> {
|
|
let mut total = 0;
|
|
self.storage
|
|
.data
|
|
.iterate(
|
|
IterateParams::new(
|
|
ValueKey::from(ValueClass::Directory(DirectoryClass::Domain(vec![]))),
|
|
ValueKey::from(ValueClass::Directory(DirectoryClass::Domain(vec![
|
|
u8::MAX;
|
|
10
|
|
]))),
|
|
)
|
|
.no_values()
|
|
.ascending(),
|
|
|_, _| {
|
|
total += 1;
|
|
Ok(true)
|
|
},
|
|
)
|
|
.await
|
|
.caused_by(trc::location!())
|
|
.map(|_| total)
|
|
}
|
|
}
|
|
|
|
trait CredentialsUsername {
|
|
fn login(&self) -> &str;
|
|
}
|
|
|
|
impl CredentialsUsername for Credentials<String> {
|
|
fn login(&self) -> &str {
|
|
match self {
|
|
Credentials::Plain { username, .. }
|
|
| Credentials::XOauth2 { username, .. }
|
|
| Credentials::OAuthBearer { token: username } => username,
|
|
}
|
|
}
|
|
}
|