mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-04 21:47:40 +03:00
Now it is not tied go-imap-sql details (with the exception of special features), allowing it to be used with other storage backends that will be added in the future. --unsafe flag is removed and now maddyctl explicitly asks for confirmation in cases where transaction may be unsafe for connected clients. --yes flag disables that. In the future, maddy can be extended with IPC interface to push updates so it this restriction can be lifted altogether.
306 lines
7.9 KiB
Go
306 lines
7.9 KiB
Go
// Package sql implements SQL-based storage module
|
|
// using go-imap-sql library (github.com/foxcpp/go-imap-sql).
|
|
//
|
|
// Interfaces implemented:
|
|
// - module.StorageBackend
|
|
// - module.AuthProvider
|
|
// - module.DeliveryTarget
|
|
package sql
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"math"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
|
|
specialuse "github.com/emersion/go-imap-specialuse"
|
|
"github.com/emersion/go-imap/backend"
|
|
"github.com/emersion/go-message/textproto"
|
|
"github.com/emersion/go-smtp"
|
|
imapsql "github.com/foxcpp/go-imap-sql"
|
|
"github.com/foxcpp/maddy/address"
|
|
"github.com/foxcpp/maddy/auth"
|
|
"github.com/foxcpp/maddy/buffer"
|
|
"github.com/foxcpp/maddy/config"
|
|
"github.com/foxcpp/maddy/dns"
|
|
"github.com/foxcpp/maddy/log"
|
|
"github.com/foxcpp/maddy/module"
|
|
"github.com/foxcpp/maddy/target"
|
|
|
|
_ "github.com/go-sql-driver/mysql"
|
|
_ "github.com/lib/pq"
|
|
)
|
|
|
|
type Storage struct {
|
|
Back *imapsql.Backend
|
|
instName string
|
|
Log log.Logger
|
|
|
|
storagePerDomain bool
|
|
authPerDomain bool
|
|
authDomains []string
|
|
junkMbox string
|
|
|
|
resolver dns.Resolver
|
|
}
|
|
|
|
type delivery struct {
|
|
store *Storage
|
|
msgMeta *module.MsgMetadata
|
|
d imapsql.Delivery
|
|
mailFrom string
|
|
|
|
addedRcpts map[string]struct{}
|
|
}
|
|
|
|
func (d *delivery) AddRcpt(rcptTo string) error {
|
|
var accountName string
|
|
// Side note: <postmaster> address will be always accepted
|
|
// and delivered to "postmaster" account for both cases.
|
|
if d.store.storagePerDomain {
|
|
accountName = rcptTo
|
|
} else {
|
|
var err error
|
|
accountName, _, err = address.Split(rcptTo)
|
|
if err != nil {
|
|
return &smtp.SMTPError{
|
|
Code: 501,
|
|
EnhancedCode: smtp.EnhancedCode{5, 1, 3},
|
|
Message: "Invalid recipient address: " + err.Error(),
|
|
}
|
|
}
|
|
}
|
|
|
|
accountName = strings.ToLower(accountName)
|
|
if _, ok := d.addedRcpts[accountName]; ok {
|
|
return nil
|
|
}
|
|
|
|
// This header is added to the message only for that recipient.
|
|
// go-imap-sql does certain optimizations to store the message
|
|
// with small amount of per-recipient data in a efficient way.
|
|
userHeader := textproto.Header{}
|
|
userHeader.Add("Delivered-To", rcptTo)
|
|
|
|
if err := d.d.AddRcpt(strings.ToLower(accountName), userHeader); err != nil {
|
|
if err == imapsql.ErrUserDoesntExists || err == backend.ErrNoSuchMailbox {
|
|
return &smtp.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: smtp.EnhancedCode{5, 1, 1},
|
|
Message: "User doesn't exist",
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
|
|
d.addedRcpts[accountName] = struct{}{}
|
|
return nil
|
|
}
|
|
|
|
func (d *delivery) Body(header textproto.Header, body buffer.Buffer) error {
|
|
if d.msgMeta.Quarantine {
|
|
if err := d.d.SpecialMailbox(specialuse.Junk, d.store.junkMbox); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
header = header.Copy()
|
|
header.Add("Return-Path", "<"+target.SanitizeForHeader(d.mailFrom)+">")
|
|
return d.d.BodyParsed(header, d.msgMeta.BodyLength, body)
|
|
}
|
|
|
|
func (d *delivery) Abort() error {
|
|
return d.d.Abort()
|
|
}
|
|
|
|
func (d *delivery) Commit() error {
|
|
return d.d.Commit()
|
|
}
|
|
|
|
func (store *Storage) Start(msgMeta *module.MsgMetadata, mailFrom string) (module.Delivery, error) {
|
|
return &delivery{
|
|
store: store,
|
|
msgMeta: msgMeta,
|
|
mailFrom: mailFrom,
|
|
d: store.Back.NewDelivery(),
|
|
addedRcpts: map[string]struct{}{},
|
|
}, nil
|
|
}
|
|
|
|
func (store *Storage) Name() string {
|
|
return "sql"
|
|
}
|
|
|
|
func (store *Storage) InstanceName() string {
|
|
return store.instName
|
|
}
|
|
|
|
func New(_, instName string, _, inlineArgs []string) (module.Module, error) {
|
|
if len(inlineArgs) != 0 {
|
|
return nil, errors.New("sql: no inline args")
|
|
}
|
|
return &Storage{
|
|
instName: instName,
|
|
Log: log.Logger{Name: "sql"},
|
|
resolver: net.DefaultResolver,
|
|
}, nil
|
|
}
|
|
|
|
func (store *Storage) Init(cfg *config.Map) error {
|
|
var (
|
|
driver string
|
|
dsn []string
|
|
fsstoreLocation string
|
|
appendlimitVal = -1
|
|
compression []string
|
|
)
|
|
|
|
opts := imapsql.Opts{
|
|
// Prevent deadlock if nobody is listening for updates (e.g. no IMAP
|
|
// configured).
|
|
LazyUpdatesInit: true,
|
|
}
|
|
cfg.String("driver", false, true, "", &driver)
|
|
cfg.StringList("dsn", false, true, nil, &dsn)
|
|
cfg.Custom("fsstore", false, false, func() (interface{}, error) {
|
|
return "", nil
|
|
}, func(m *config.Map, node *config.Node) (interface{}, error) {
|
|
switch len(node.Args) {
|
|
case 0:
|
|
if store.instName == "" {
|
|
return nil, errors.New("sql: need explicit fsstore location for inline definition")
|
|
}
|
|
return filepath.Join(config.StateDirectory, "sql-"+store.instName+"-fsstore"), nil
|
|
case 1:
|
|
return node.Args[0], nil
|
|
default:
|
|
return nil, m.MatchErr("expected 0 or 1 arguments")
|
|
}
|
|
}, &fsstoreLocation)
|
|
cfg.StringList("compression", false, false, []string{"off"}, &compression)
|
|
cfg.DataSize("appendlimit", false, false, 32*1024*1024, &appendlimitVal)
|
|
cfg.Bool("debug", true, false, &store.Log.Debug)
|
|
cfg.Bool("storage_perdomain", true, false, &store.storagePerDomain)
|
|
cfg.Bool("auth_perdomain", true, false, &store.authPerDomain)
|
|
cfg.StringList("auth_domains", true, false, nil, &store.authDomains)
|
|
cfg.Int("sqlite3_cache_size", false, false, 0, &opts.CacheSize)
|
|
cfg.Int("sqlite3_busy_timeout", false, false, 0, &opts.BusyTimeout)
|
|
cfg.Bool("sqlite3_exclusive_lock", false, false, &opts.ExclusiveLock)
|
|
cfg.String("junk_mailbox", false, false, "Junk", &store.junkMbox)
|
|
|
|
if _, err := cfg.Process(); err != nil {
|
|
return err
|
|
}
|
|
|
|
opts.Log = &store.Log
|
|
|
|
if store.authPerDomain && store.authDomains == nil {
|
|
return errors.New("sql: auth_domains must be set if auth_perdomain is used")
|
|
}
|
|
|
|
if appendlimitVal == -1 {
|
|
opts.MaxMsgBytes = nil
|
|
} else {
|
|
// int is 64-bit on some platforms, so cut off values we can't actually
|
|
// use.
|
|
if appendlimitVal > math.MaxUint32 {
|
|
return errors.New("sql: appendlimit can't be higher than 4 GiB")
|
|
}
|
|
opts.MaxMsgBytes = new(uint32)
|
|
*opts.MaxMsgBytes = uint32(appendlimitVal)
|
|
}
|
|
var err error
|
|
|
|
dsnStr := strings.Join(dsn, " ")
|
|
|
|
var extStore imapsql.ExternalStore
|
|
if fsstoreLocation != "" {
|
|
if err := os.MkdirAll(fsstoreLocation, os.ModeDir|os.ModePerm); err != nil {
|
|
return err
|
|
}
|
|
extStore = &imapsql.FSStore{Root: fsstoreLocation}
|
|
}
|
|
// Add blocks for other External Store implementations here ^.
|
|
if extStore == nil {
|
|
return errors.New("sql: no body storage is configured (use fsstore)")
|
|
}
|
|
|
|
if len(compression) != 0 {
|
|
switch compression[0] {
|
|
case "zstd", "lz4":
|
|
opts.CompressAlgo = compression[0]
|
|
if len(compression) == 2 {
|
|
opts.CompressAlgoParams = compression[1]
|
|
if _, err := strconv.Atoi(compression[1]); err != nil {
|
|
return errors.New("sql: first argument for lz4 and zstd is compression level")
|
|
}
|
|
}
|
|
if len(compression) > 2 {
|
|
return errors.New("sql: expected at most 2 arguments")
|
|
}
|
|
case "off":
|
|
if len(compression) > 1 {
|
|
return errors.New("sql: expected at most 1 arguments")
|
|
}
|
|
default:
|
|
return errors.New("sql: unknown compression algorithm")
|
|
}
|
|
}
|
|
|
|
store.Back, err = imapsql.New(driver, dsnStr, extStore, opts)
|
|
if err != nil {
|
|
return fmt.Errorf("sql: %s", err)
|
|
}
|
|
|
|
store.Log.Debugln("go-imap-sql version", imapsql.VersionStr)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (store *Storage) IMAPExtensions() []string {
|
|
return []string{"APPENDLIMIT", "MOVE", "CHILDREN", "SPECIAL-USE"}
|
|
}
|
|
|
|
func (store *Storage) Updates() <-chan backend.Update {
|
|
return store.Back.Updates()
|
|
}
|
|
|
|
func (store *Storage) EnableChildrenExt() bool {
|
|
return store.Back.EnableChildrenExt()
|
|
}
|
|
|
|
func (store *Storage) CheckPlain(username, password string) bool {
|
|
accountName, ok := auth.CheckDomainAuth(username, store.authPerDomain, store.authDomains)
|
|
if !ok {
|
|
return false
|
|
}
|
|
|
|
return store.Back.CheckPlain(accountName, password)
|
|
}
|
|
|
|
func (store *Storage) GetOrCreateUser(username string) (backend.User, error) {
|
|
var accountName string
|
|
if store.storagePerDomain {
|
|
if !strings.Contains(username, "@") {
|
|
return nil, errors.New("GetOrCreateUser: username@domain required")
|
|
}
|
|
accountName = username
|
|
} else {
|
|
parts := strings.Split(username, "@")
|
|
accountName = parts[0]
|
|
}
|
|
|
|
return store.Back.GetOrCreateUser(accountName)
|
|
}
|
|
|
|
func (store *Storage) Close() error {
|
|
return store.Back.Close()
|
|
}
|
|
|
|
func init() {
|
|
module.Register("sql", New)
|
|
}
|