mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-05 14:07:38 +03:00
Drop most of the implicit defaults in favor of explicit configuration (#43)
* Drop most of the implicit defaults in favor of explicit configuration We no longer follow caddy's "zero-configuration" approach. Mail is much more complex than HTTP and we want to be explicit about things, always. * Remove commented out directives from maddy.conf
This commit is contained in:
parent
d10fbd0a9e
commit
7db67acad8
9 changed files with 78 additions and 278 deletions
|
@ -23,14 +23,12 @@ Valid configuration directives and their forms:
|
||||||
Generate a self-signed certificate on startup. Useful only for testing.
|
Generate a self-signed certificate on startup. Useful only for testing.
|
||||||
|
|
||||||
* `auth <instance_name>`
|
* `auth <instance_name>`
|
||||||
Use the specified authentication provider module instead of default-auth or
|
Use the specified authentication provider module. `instance_name` is the name
|
||||||
default. `instance_name` is the name of the corresponding configuration
|
of the corresponding configuration block. **Required.**
|
||||||
block.
|
|
||||||
|
|
||||||
* `storage <instance_name>`
|
* `storage <instance_name>`
|
||||||
Use the specified storage backend module instead of default-storage or
|
Use the specified storage backend module. `instance_name` is the name of the
|
||||||
default. `instance_name` is the name of the corresponding configuration
|
corresponding configuration block. **Required.**
|
||||||
block.
|
|
||||||
|
|
||||||
* `insecure_auth`
|
* `insecure_auth`
|
||||||
Allow plaintext authentication over unprotected (unencrypted) connections.
|
Allow plaintext authentication over unprotected (unencrypted) connections.
|
||||||
|
@ -77,16 +75,16 @@ Valid configuration directives and their forms:
|
||||||
Generate a self-signed certificate on startup. Useful only for testing.
|
Generate a self-signed certificate on startup. Useful only for testing.
|
||||||
|
|
||||||
* `auth <instance_name>`
|
* `auth <instance_name>`
|
||||||
Use the specified authentication provider module instead of default-auth or
|
Use the specified authentication provider module. `instance_name` is the name
|
||||||
default. `instance_name` is the name of the corresponding configuration
|
of the corresponding configuration block. **Required.**
|
||||||
block.
|
|
||||||
|
|
||||||
* `insecure_auth`
|
* `insecure_auth`
|
||||||
Allow plaintext authentication over unprotected (unencrypted)
|
Allow plaintext authentication over unprotected (unencrypted)
|
||||||
connections. Use only for testing!
|
connections. Use only for testing!
|
||||||
|
|
||||||
* `submission`
|
* `submission`
|
||||||
When no pipeline is specified - use submission pipeline instead of relay.
|
Preprocess messages before pushing them to pipeline and require
|
||||||
|
authentication for all operations.
|
||||||
You should use it for Submission protocol endpoints.
|
You should use it for Submission protocol endpoints.
|
||||||
|
|
||||||
* `io_debug`
|
* `io_debug`
|
||||||
|
@ -108,46 +106,26 @@ Valid configuration directives and their forms:
|
||||||
* `max_message_size <value>`
|
* `max_message_size <value>`
|
||||||
Limit size of incoming messages to `value` bytes. Default is 32 MiB.
|
Limit size of incoming messages to `value` bytes. Default is 32 MiB.
|
||||||
|
|
||||||
* `local_delivery <instance_name> [opts]`
|
|
||||||
Replace delivery target for local email without replace the whole pipeline
|
|
||||||
(with DKIM and stuff).
|
|
||||||
|
|
||||||
* `remote_delivery <instance_name> [opts]`
|
|
||||||
Replace delivery target for non-local email without replace the whole pipeline
|
|
||||||
(with DKIM and stuff).
|
|
||||||
|
|
||||||
```
|
```
|
||||||
smtp smtp://0.0.0.0:25 smtps://0.0.0.0:587 {
|
smtp smtp://0.0.0.0:25 smtps://0.0.0.0:587 {
|
||||||
tls /etc/ssl/private/cert.pem /etc/ssl/private/pkey.key
|
tls /etc/ssl/private/cert.pem /etc/ssl/private/pkey.key
|
||||||
auth pam
|
auth pam
|
||||||
hostname emersion.fr
|
hostname emersion.fr
|
||||||
|
|
||||||
|
deliver dummy
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
### 'submission' module
|
### 'submission' module
|
||||||
|
|
||||||
Alias to smtp module with submission pipeline used by default.
|
Alias to smtp module with submission directive used by default.
|
||||||
|
|
||||||
##### SMTP pipeline
|
##### SMTP pipeline
|
||||||
|
|
||||||
SMTP module does have a flexible mechanism that allows you to define a custom
|
SMTP module does have a flexible mechanism that allows you to define a custom
|
||||||
sequence of actions to apply on each incoming message.
|
sequence of actions to apply on each incoming message.
|
||||||
|
|
||||||
By default, it just passes emails with recipients with domain same as the
|
You can add any number of steps you want using following directives:
|
||||||
specified hostname to `default_delivery` or `default` delivery target (usually IMAP
|
|
||||||
mailbox). If the message does have non-local recipients it will be passed to
|
|
||||||
message queue for outgoing transfer.
|
|
||||||
|
|
||||||
Here are configuration directives doing the same (almost):
|
|
||||||
```
|
|
||||||
deliver default local_only
|
|
||||||
deliver out_queue remote_only
|
|
||||||
```
|
|
||||||
|
|
||||||
You can add any number of steps you want using following directives (note that
|
|
||||||
if you specify any of them default steps will not be used so you need to
|
|
||||||
specify them explicitly!)
|
|
||||||
|
|
||||||
* `filter <instnace_name> [opts]`
|
* `filter <instnace_name> [opts]`
|
||||||
Apply a "filter" to a message, `instance_name` is the configuration set name.
|
Apply a "filter" to a message, `instance_name` is the configuration set name.
|
||||||
You can pass additional parameters to filter by adding key=value pairs to the
|
You can pass additional parameters to filter by adding key=value pairs to the
|
||||||
|
@ -198,7 +176,6 @@ specify them explicitly!)
|
||||||
|
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
smtp smtp://0.0.0.0:25 smtps://0.0.0.0:587 {
|
smtp smtp://0.0.0.0:25 smtps://0.0.0.0:587 {
|
||||||
tls /etc/ssl/private/cert.pem /etc/ssl/private/pkey.key
|
tls /etc/ssl/private/cert.pem /etc/ssl/private/pkey.key
|
||||||
auth pam
|
auth pam
|
||||||
|
@ -211,7 +188,7 @@ smtp smtp://0.0.0.0:25 smtps://0.0.0.0:587 {
|
||||||
match no rcpt "/@emersion.fr$/" {
|
match no rcpt "/@emersion.fr$/" {
|
||||||
require_auth
|
require_auth
|
||||||
filter dkim sign
|
filter dkim sign
|
||||||
deliver out-queue
|
deliver out_queue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
@ -261,7 +238,7 @@ code is 1 - authentication is failed. If status code is 2 - other unrelated
|
||||||
error happened. Additional information should be written to stderr.
|
error happened. Additional information should be written to stderr.
|
||||||
|
|
||||||
```
|
```
|
||||||
extauth default_auth
|
extauth
|
||||||
```
|
```
|
||||||
|
|
||||||
Valid configuration directives:
|
Valid configuration directives:
|
||||||
|
|
58
README.md
58
README.md
|
@ -23,6 +23,12 @@ Build tags:
|
||||||
|
|
||||||
Read from `/etc/maddy/maddy.conf` by default.
|
Read from `/etc/maddy/maddy.conf` by default.
|
||||||
|
|
||||||
|
Start by copying contents of the [maddy.conf][maddy.conf] in this repository.
|
||||||
|
|
||||||
|
With this configuration, maddy will create an SQLite3 database for messages in
|
||||||
|
/var/lib/maddy and use it to store all messages. You need to ensure that this
|
||||||
|
directory exists and maddy can write to it.
|
||||||
|
|
||||||
### Syntax
|
### Syntax
|
||||||
|
|
||||||
Maddy uses configuration format similar (but not the same!) to Caddy's
|
Maddy uses configuration format similar (but not the same!) to Caddy's
|
||||||
|
@ -70,7 +76,6 @@ are options that can be used like that:
|
||||||
Default TLS certificate to use. See
|
Default TLS certificate to use. See
|
||||||
[CONFIG_REFERENCE.md](CONFIG_REFERENCE.md) for details.
|
[CONFIG_REFERENCE.md](CONFIG_REFERENCE.md) for details.
|
||||||
|
|
||||||
<<<<<<< HEAD
|
|
||||||
* `debug`
|
* `debug`
|
||||||
Write verbose logs describing what exactly is happening and how its going.
|
Write verbose logs describing what exactly is happening and how its going.
|
||||||
Default mode is relatively quiet and still produces useful logs so
|
Default mode is relatively quiet and still produces useful logs so
|
||||||
|
@ -114,57 +119,6 @@ These can be specified only outside of any configuration block.
|
||||||
go build --ldflags '-X github.com/emersion/maddy.defaultLibexecDirectory=/opt/maddy/bin'
|
go build --ldflags '-X github.com/emersion/maddy.defaultLibexecDirectory=/opt/maddy/bin'
|
||||||
```
|
```
|
||||||
|
|
||||||
### Defaults
|
|
||||||
|
|
||||||
Maddy provides reasonable defaults so you can start using it without spending
|
|
||||||
hours writing configuration files. All you need it so define smtp and imap
|
|
||||||
modules in your configuration, configure TLS (see below) and set domain name.
|
|
||||||
|
|
||||||
Here is the minimal example to get you started:
|
|
||||||
```
|
|
||||||
tls cert_file pkey_file
|
|
||||||
hostname emersion.fr
|
|
||||||
|
|
||||||
imap imap://0.0.0.0 imaps://0.0.0.0
|
|
||||||
smtp smtp://0.0.0.0:25
|
|
||||||
submission smtp://0.0.0.0:587 smtps://0.0.0.0:465
|
|
||||||
```
|
|
||||||
Don't forget to use actual values instead of placeholders.
|
|
||||||
|
|
||||||
With this configuration, maddy will create an SQLite3 database for messages in
|
|
||||||
/var/lib/maddy and use it to store all messages. You need to ensure that this
|
|
||||||
directory exists and maddy can write to it.
|
|
||||||
|
|
||||||
### go-imap-sql: Database location
|
|
||||||
|
|
||||||
If you don't like SQLite3 or don't want to have it in /var/lib/maddy,
|
|
||||||
you can override the configuration of the default module.
|
|
||||||
|
|
||||||
See [go-imap-sql repository](https://github.com/foxcpp/go-imap-sql) for
|
|
||||||
information on RDBMS support.
|
|
||||||
|
|
||||||
```
|
|
||||||
sql default {
|
|
||||||
driver sqlite3
|
|
||||||
dsn file_path
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
You can then replace SQL driver and DSN values. Note that maddy needs to be
|
|
||||||
built with a build tag corresponding to the name of the used driver (`mysql`,
|
|
||||||
`postgresql`) for SQL engines other than sqlite3.
|
|
||||||
|
|
||||||
DSN is a driver-specific value that describes the database to use.
|
|
||||||
For SQLite3 this is just a file path.
|
|
||||||
For MySQL: https://github.com/go-sql-driver/mysql#dsn-data-source-name
|
|
||||||
For PostgreSQL: https://godoc.org/github.com/lib/pq#hdr-Connection_String_Parameters
|
|
||||||
|
|
||||||
Note that you can also change default DSN or SQL driver during compilation
|
|
||||||
by building maddy using following command:
|
|
||||||
```shell
|
|
||||||
go build -ldflags "-X github,com/emersion/maddy.defaultDriver=DRIVER -X github.com/emersion/maddy.defaultDsn=DSN"
|
|
||||||
```
|
|
||||||
|
|
||||||
### TLS
|
### TLS
|
||||||
|
|
||||||
Currently, maddy doesn't implement any form of automatic TLS like Caddy. But
|
Currently, maddy doesn't implement any form of automatic TLS like Caddy. But
|
||||||
|
|
22
config.go
22
config.go
|
@ -100,28 +100,6 @@ func deliverDirective(m *config.Map, node *config.Node) (interface{}, error) {
|
||||||
return modObj, nil
|
return modObj, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func defaultAuthProvider() (interface{}, error) {
|
|
||||||
res, err := authProvider("default_auth")
|
|
||||||
if err != nil {
|
|
||||||
res, err = authProvider("default")
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.New("missing default auth. provider, must set custom")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func defaultStorage() (interface{}, error) {
|
|
||||||
res, err := storageBackend("default_storage")
|
|
||||||
if err != nil {
|
|
||||||
res, err = storageBackend("default")
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.New("missing default storage backend, must set custom")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func logOutput(m *config.Map, node *config.Node) (interface{}, error) {
|
func logOutput(m *config.Map, node *config.Node) (interface{}, error) {
|
||||||
if len(node.Args) == 0 {
|
if len(node.Args) == 0 {
|
||||||
return nil, m.MatchErr("expected at least 1 argument")
|
return nil, m.MatchErr("expected at least 1 argument")
|
||||||
|
|
|
@ -376,7 +376,7 @@ func (m *Map) ProcessWith(globalCfg map[string]interface{}, block []Node) (unmat
|
||||||
}
|
}
|
||||||
matched[subnode.Name] = true
|
matched[subnode.Name] = true
|
||||||
}
|
}
|
||||||
m.curNode = nil
|
m.curNode = m.Block
|
||||||
|
|
||||||
for _, matcher := range m.entries {
|
for _, matcher := range m.entries {
|
||||||
if matched[matcher.name] {
|
if matched[matcher.name] {
|
||||||
|
|
49
default.go
49
default.go
|
@ -1,49 +0,0 @@
|
||||||
package maddy
|
|
||||||
|
|
||||||
import (
|
|
||||||
"database/sql"
|
|
||||||
"fmt"
|
|
||||||
"path/filepath"
|
|
||||||
|
|
||||||
"github.com/emersion/maddy/config"
|
|
||||||
"github.com/emersion/maddy/module"
|
|
||||||
)
|
|
||||||
|
|
||||||
var defaultDriver = "sqlite3"
|
|
||||||
var defaultDsn string
|
|
||||||
|
|
||||||
func createDefaultStorage(globals *config.Map, _ string) (module.Module, error) {
|
|
||||||
driverSupported := false
|
|
||||||
for _, driver := range sql.Drivers() {
|
|
||||||
if driver == defaultDriver {
|
|
||||||
driverSupported = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if !driverSupported {
|
|
||||||
return nil, fmt.Errorf("maddy is not compiled with %s support", defaultDriver)
|
|
||||||
}
|
|
||||||
|
|
||||||
return NewSQLStorage("sql", "default")
|
|
||||||
}
|
|
||||||
|
|
||||||
func defaultStorageConfig(globals *config.Map, name string) config.Node {
|
|
||||||
return config.Node{
|
|
||||||
Name: "sql",
|
|
||||||
Args: []string{name},
|
|
||||||
Children: []config.Node{
|
|
||||||
{
|
|
||||||
Name: "driver",
|
|
||||||
Args: []string{defaultDriver},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Name: "dsn",
|
|
||||||
Args: []string{filepath.Join(StateDirectory(globals.Values), "maddy.db")},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func createDefaultRemoteDelivery(_ *config.Map, name string) (module.Module, error) {
|
|
||||||
return Dummy{instName: name}, nil
|
|
||||||
}
|
|
4
imap.go
4
imap.go
|
@ -52,8 +52,8 @@ func (endp *IMAPEndpoint) Init(cfg *config.Map) error {
|
||||||
ioDebug bool
|
ioDebug bool
|
||||||
)
|
)
|
||||||
|
|
||||||
cfg.Custom("auth", false, false, defaultAuthProvider, authDirective, &endp.Auth)
|
cfg.Custom("auth", false, true, nil, authDirective, &endp.Auth)
|
||||||
cfg.Custom("storage", false, false, defaultStorage, storageDirective, &endp.Store)
|
cfg.Custom("storage", false, true, nil, storageDirective, &endp.Store)
|
||||||
cfg.Custom("tls", true, true, nil, tlsDirective, &endp.tlsConfig)
|
cfg.Custom("tls", true, true, nil, tlsDirective, &endp.tlsConfig)
|
||||||
cfg.Bool("insecure_auth", false, &insecureAuth)
|
cfg.Bool("insecure_auth", false, &insecureAuth)
|
||||||
cfg.Bool("io_debug", false, &ioDebug)
|
cfg.Bool("io_debug", false, &ioDebug)
|
||||||
|
|
40
maddy.conf
Normal file
40
maddy.conf
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
# Location of TLS certificate and private key. Global directive is used for all
|
||||||
|
# endpoints.
|
||||||
|
tls cert_file_path pkey_file
|
||||||
|
|
||||||
|
# hostname is used in several places, mainly in gretting for IMAP and SMTP.
|
||||||
|
# For now and is asummed to be equal to
|
||||||
|
# local domain and used to distishguish local and non-local recipients.
|
||||||
|
hostname example.org
|
||||||
|
|
||||||
|
# Create and initialize sql module, it provides simple authentication and
|
||||||
|
# storage backend using one database for everything.
|
||||||
|
sql {
|
||||||
|
driver sqlite3
|
||||||
|
dsn /var/lib/maddy/all.db
|
||||||
|
}
|
||||||
|
|
||||||
|
smtp smtp://0.0.0.0:25 {
|
||||||
|
# Deliver all mail for @example.org into sql module storage.
|
||||||
|
delivery sql local_only
|
||||||
|
}
|
||||||
|
|
||||||
|
submission smtps://0.0.0.0:465 smtp://0.0.0.0:587 {
|
||||||
|
# Use sql module for authentication.
|
||||||
|
auth sql
|
||||||
|
match rcpt_domain example.org {
|
||||||
|
# Deliver all mail for @example.org into sql module storage.
|
||||||
|
delivery sql local_only
|
||||||
|
}
|
||||||
|
match no rcpt_domain example.org {
|
||||||
|
# No remote delivery is implemented now, just deliver it to /dev/null for now.
|
||||||
|
delivery dummy
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
imap imaps://0.0.0.0:993 imap://0.0.0.0:143 {
|
||||||
|
# Use sql module for authentication.
|
||||||
|
auth sql
|
||||||
|
# And also for storage.
|
||||||
|
storage sql
|
||||||
|
}
|
21
maddy.go
21
maddy.go
|
@ -62,9 +62,6 @@ func Start(cfg []config.Node) error {
|
||||||
instances[instName] = modInfo{instance: inst, cfg: block}
|
instances[instName] = modInfo{instance: inst, cfg: block}
|
||||||
}
|
}
|
||||||
|
|
||||||
addDefaultModule(instances, globals, "default", createDefaultStorage, defaultStorageConfig)
|
|
||||||
addDefaultModule(instances, globals, "default_remote_delivery", createDefaultRemoteDelivery, nil)
|
|
||||||
|
|
||||||
for _, inst := range instances {
|
for _, inst := range instances {
|
||||||
if module.Initialized[inst.instance.InstanceName()] {
|
if module.Initialized[inst.instance.InstanceName()] {
|
||||||
log.Debugln("module init", inst.instance.Name(), inst.instance.InstanceName(), "skipped because it was lazily initialized before")
|
log.Debugln("module init", inst.instance.Name(), inst.instance.InstanceName(), "skipped because it was lazily initialized before")
|
||||||
|
@ -98,21 +95,3 @@ func Start(cfg []config.Node) error {
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func addDefaultModule(insts map[string]modInfo, globals *config.Map, name string, factory func(*config.Map, string) (module.Module, error), cfgFactory func(*config.Map, string) config.Node) {
|
|
||||||
if _, ok := insts[name]; !ok {
|
|
||||||
if mod, err := factory(globals, name); err != nil {
|
|
||||||
log.Printf("failed to register %s: %v", name, err)
|
|
||||||
} else {
|
|
||||||
log.Debugf("module create %s %s (built-in)", mod.Name(), name)
|
|
||||||
info := modInfo{instance: mod}
|
|
||||||
if cfgFactory != nil {
|
|
||||||
info.cfg = cfgFactory(globals, name)
|
|
||||||
}
|
|
||||||
module.RegisterInstance(mod, config.NewMap(globals.Values, &info.cfg))
|
|
||||||
insts[name] = info
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
log.Debugf("module create %s (built-in) skipped because user-defined exists", name)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
103
smtp.go
103
smtp.go
|
@ -119,7 +119,9 @@ func (endp *SMTPEndpoint) Init(cfg *config.Map) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if endp.Auth != nil {
|
||||||
endp.Log.Debugf("authentication provider: %s %s", endp.Auth.(module.Module).Name(), endp.Auth.(module.Module).InstanceName())
|
endp.Log.Debugf("authentication provider: %s %s", endp.Auth.(module.Module).Name(), endp.Auth.(module.Module).InstanceName())
|
||||||
|
}
|
||||||
endp.Log.Debugf("pipeline: %#v", endp.pipeline)
|
endp.Log.Debugf("pipeline: %#v", endp.pipeline)
|
||||||
|
|
||||||
addresses := make([]Address, 0, len(cfg.Block.Args))
|
addresses := make([]Address, 0, len(cfg.Block.Args))
|
||||||
|
@ -154,18 +156,12 @@ func (endp *SMTPEndpoint) setConfig(cfg *config.Map) error {
|
||||||
var (
|
var (
|
||||||
err error
|
err error
|
||||||
ioDebug bool
|
ioDebug bool
|
||||||
submission bool
|
|
||||||
|
|
||||||
writeTimeoutSecs uint
|
writeTimeoutSecs uint
|
||||||
readTimeoutSecs uint
|
readTimeoutSecs uint
|
||||||
|
|
||||||
localDeliveryDefault string
|
|
||||||
localDeliveryOpts map[string]string
|
|
||||||
remoteDeliveryDefault string
|
|
||||||
remoteDeliveryOpts map[string]string
|
|
||||||
)
|
)
|
||||||
|
|
||||||
cfg.Custom("auth", false, false, defaultAuthProvider, authDirective, &endp.Auth)
|
cfg.Custom("auth", false, false, nil, authDirective, &endp.Auth)
|
||||||
cfg.String("hostname", true, false, "", &endp.serv.Domain)
|
cfg.String("hostname", true, false, "", &endp.serv.Domain)
|
||||||
// TODO: Parse human-readable duration values.
|
// TODO: Parse human-readable duration values.
|
||||||
cfg.UInt("write_timeout", false, false, 60, &writeTimeoutSecs)
|
cfg.UInt("write_timeout", false, false, 60, &writeTimeoutSecs)
|
||||||
|
@ -176,7 +172,7 @@ func (endp *SMTPEndpoint) setConfig(cfg *config.Map) error {
|
||||||
cfg.Bool("insecure_auth", false, &endp.serv.AllowInsecureAuth)
|
cfg.Bool("insecure_auth", false, &endp.serv.AllowInsecureAuth)
|
||||||
cfg.Bool("io_debug", false, &ioDebug)
|
cfg.Bool("io_debug", false, &ioDebug)
|
||||||
cfg.Bool("debug", true, &endp.Log.Debug)
|
cfg.Bool("debug", true, &endp.Log.Debug)
|
||||||
cfg.Bool("submission", false, &submission)
|
cfg.Bool("submission", false, &endp.submission)
|
||||||
cfg.AllowUnknown()
|
cfg.AllowUnknown()
|
||||||
|
|
||||||
remainingDirs, err := cfg.Process()
|
remainingDirs, err := cfg.Process()
|
||||||
|
@ -187,41 +183,9 @@ func (endp *SMTPEndpoint) setConfig(cfg *config.Map) error {
|
||||||
endp.serv.WriteTimeout = time.Duration(writeTimeoutSecs) * time.Second
|
endp.serv.WriteTimeout = time.Duration(writeTimeoutSecs) * time.Second
|
||||||
endp.serv.ReadTimeout = time.Duration(readTimeoutSecs) * time.Second
|
endp.serv.ReadTimeout = time.Duration(readTimeoutSecs) * time.Second
|
||||||
|
|
||||||
// If endp.submission is set by NewSMTPEndpoint because module name is "submission"
|
|
||||||
// - don't use value from configuration.
|
|
||||||
if !endp.submission {
|
|
||||||
endp.submission = submission
|
|
||||||
} else if submission {
|
|
||||||
endp.Log.Println("redundant submission statement")
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, entry := range remainingDirs {
|
for _, entry := range remainingDirs {
|
||||||
switch entry.Name {
|
switch entry.Name {
|
||||||
case "local_delivery":
|
|
||||||
if len(entry.Args) == 0 {
|
|
||||||
return errors.New("smtp: local_delivery: expected at least 1 argument")
|
|
||||||
}
|
|
||||||
if len(endp.pipeline) != 0 {
|
|
||||||
return errors.New("smtp: can't use custom pipeline with local_delivery or remote_delivery")
|
|
||||||
}
|
|
||||||
|
|
||||||
localDeliveryDefault = entry.Args[0]
|
|
||||||
localDeliveryOpts = readOpts(entry.Args[1:])
|
|
||||||
case "remote_delivery":
|
|
||||||
if len(entry.Args) == 0 {
|
|
||||||
return errors.New("smtp: remote_delivery: expected at least 1 argument")
|
|
||||||
}
|
|
||||||
if len(endp.pipeline) != 0 {
|
|
||||||
return errors.New("smtp: can't use custom pipeline with local_delivery or remote_delivery")
|
|
||||||
}
|
|
||||||
|
|
||||||
remoteDeliveryDefault = entry.Args[0]
|
|
||||||
remoteDeliveryOpts = readOpts(entry.Args[1:])
|
|
||||||
case "filter", "deliver", "match", "stop", "require_auth":
|
case "filter", "deliver", "match", "stop", "require_auth":
|
||||||
if localDeliveryDefault != "" || remoteDeliveryDefault != "" {
|
|
||||||
return errors.New("smtp: can't use custom pipeline with local_delivery or remote_delivery")
|
|
||||||
}
|
|
||||||
|
|
||||||
step, err := StepFromCfg(entry)
|
step, err := StepFromCfg(entry)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -238,15 +202,13 @@ func (endp *SMTPEndpoint) setConfig(cfg *config.Map) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(endp.pipeline) == 0 {
|
|
||||||
err := endp.setDefaultPipeline(localDeliveryDefault, remoteDeliveryDefault, localDeliveryOpts, remoteDeliveryOpts)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if endp.submission {
|
if endp.submission {
|
||||||
endp.pipeline = append([]SMTPPipelineStep{submissionPrepareStep{}, requireAuthStep{}}, endp.pipeline...)
|
endp.pipeline = append([]SMTPPipelineStep{submissionPrepareStep{}, requireAuthStep{}}, endp.pipeline...)
|
||||||
endp.authAlwaysRequired = true
|
endp.authAlwaysRequired = true
|
||||||
|
|
||||||
|
if endp.Auth == nil {
|
||||||
|
return fmt.Errorf("smtp: auth. provider must be set for submission endpoint")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if ioDebug {
|
if ioDebug {
|
||||||
|
@ -307,52 +269,11 @@ func (endp *SMTPEndpoint) setupListeners(addresses []Address) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (endp *SMTPEndpoint) setDefaultPipeline(localDeliveryName, remoteDeliveryName string, localOpts, remoteOpts map[string]string) error {
|
|
||||||
var err error
|
|
||||||
var localDelivery module.DeliveryTarget
|
|
||||||
if localDeliveryName == "" {
|
|
||||||
localDelivery, err = deliveryTarget("default_local_delivery")
|
|
||||||
if err != nil {
|
|
||||||
localDelivery, err = deliveryTarget("default")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
localOpts = map[string]string{"local_only": ""}
|
|
||||||
} else {
|
|
||||||
localDelivery, err = deliveryTarget(localDeliveryName)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if endp.submission {
|
|
||||||
if remoteDeliveryName == "" {
|
|
||||||
remoteDeliveryName = "default_remote_delivery"
|
|
||||||
remoteOpts = map[string]string{"remote_only": ""}
|
|
||||||
}
|
|
||||||
remoteDelivery, err := deliveryTarget(remoteDeliveryName)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
endp.pipeline = append(endp.pipeline,
|
|
||||||
// require_auth and submission_check are always prepended to pipeline
|
|
||||||
//TODO: DKIM sign
|
|
||||||
deliverStep{t: localDelivery, opts: localOpts},
|
|
||||||
deliverStep{t: remoteDelivery, opts: remoteOpts},
|
|
||||||
)
|
|
||||||
} else {
|
|
||||||
endp.pipeline = append(endp.pipeline,
|
|
||||||
//TODO: DKIM verify
|
|
||||||
deliverStep{t: localDelivery, opts: localOpts},
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (endp *SMTPEndpoint) Login(state *smtp.ConnectionState, username, password string) (smtp.Session, error) {
|
func (endp *SMTPEndpoint) Login(state *smtp.ConnectionState, username, password string) (smtp.Session, error) {
|
||||||
|
if endp.Auth == nil {
|
||||||
|
return nil, smtp.ErrAuthUnsupported
|
||||||
|
}
|
||||||
|
|
||||||
if !endp.Auth.CheckPlain(username, password) {
|
if !endp.Auth.CheckPlain(username, password) {
|
||||||
endp.Log.Printf("authentication failed for %s (from %v)", username, state.RemoteAddr)
|
endp.Log.Printf("authentication failed for %s (from %v)", username, state.RemoteAddr)
|
||||||
return nil, errors.New("Invalid credentials")
|
return nil, errors.New("Invalid credentials")
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue