mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-04 13:37:41 +03:00
1. There is only one version for maddy and imapsql-ctl utility. This prevents confusion about compatibility. 2. Modified imapsql-ctl understands maddy config format, this allows it to read needed values from it without the need for lengthy commmand line arguments. Closes #148.
302 lines
7.9 KiB
Go
302 lines
7.9 KiB
Go
// Package sql implements SQL-based storage module
|
|
// using go-imap-sql library (github.com/foxcpp/go-imap-sql).
|
|
//
|
|
// Interfaces implemented:
|
|
// - module.StorageBackend
|
|
// - module.AuthProvider
|
|
// - module.DeliveryTarget
|
|
package sql
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"math"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
|
|
specialuse "github.com/emersion/go-imap-specialuse"
|
|
"github.com/emersion/go-imap/backend"
|
|
"github.com/emersion/go-message/textproto"
|
|
"github.com/emersion/go-smtp"
|
|
imapsql "github.com/foxcpp/go-imap-sql"
|
|
"github.com/foxcpp/maddy/address"
|
|
"github.com/foxcpp/maddy/auth"
|
|
"github.com/foxcpp/maddy/buffer"
|
|
"github.com/foxcpp/maddy/config"
|
|
"github.com/foxcpp/maddy/dns"
|
|
"github.com/foxcpp/maddy/log"
|
|
"github.com/foxcpp/maddy/module"
|
|
"github.com/foxcpp/maddy/target"
|
|
|
|
_ "github.com/go-sql-driver/mysql"
|
|
_ "github.com/lib/pq"
|
|
)
|
|
|
|
type Storage struct {
|
|
Back *imapsql.Backend
|
|
instName string
|
|
Log log.Logger
|
|
|
|
storagePerDomain bool
|
|
authPerDomain bool
|
|
authDomains []string
|
|
junkMbox string
|
|
|
|
resolver dns.Resolver
|
|
}
|
|
|
|
type delivery struct {
|
|
store *Storage
|
|
msgMeta *module.MsgMetadata
|
|
d imapsql.Delivery
|
|
mailFrom string
|
|
|
|
addedRcpts map[string]struct{}
|
|
}
|
|
|
|
func (d *delivery) AddRcpt(rcptTo string) error {
|
|
var accountName string
|
|
// Side note: <postmaster> address will be always accepted
|
|
// and delivered to "postmaster" account for both cases.
|
|
if d.store.storagePerDomain {
|
|
accountName = rcptTo
|
|
} else {
|
|
var err error
|
|
accountName, _, err = address.Split(rcptTo)
|
|
if err != nil {
|
|
return &smtp.SMTPError{
|
|
Code: 501,
|
|
EnhancedCode: smtp.EnhancedCode{5, 1, 3},
|
|
Message: "Invalid recipient address: " + err.Error(),
|
|
}
|
|
}
|
|
}
|
|
|
|
accountName = strings.ToLower(accountName)
|
|
if _, ok := d.addedRcpts[accountName]; ok {
|
|
return nil
|
|
}
|
|
|
|
// This header is added to the message only for that recipient.
|
|
// go-imap-sql does certain optimizations to store the message
|
|
// with small amount of per-recipient data in a efficient way.
|
|
userHeader := textproto.Header{}
|
|
userHeader.Add("Delivered-To", rcptTo)
|
|
|
|
if err := d.d.AddRcpt(strings.ToLower(accountName), userHeader); err != nil {
|
|
if err == imapsql.ErrUserDoesntExists || err == backend.ErrNoSuchMailbox {
|
|
return &smtp.SMTPError{
|
|
Code: 550,
|
|
EnhancedCode: smtp.EnhancedCode{5, 1, 1},
|
|
Message: "User doesn't exist",
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
|
|
d.addedRcpts[accountName] = struct{}{}
|
|
return nil
|
|
}
|
|
|
|
func (d *delivery) Body(header textproto.Header, body buffer.Buffer) error {
|
|
if d.msgMeta.Quarantine {
|
|
if err := d.d.SpecialMailbox(specialuse.Junk, d.store.junkMbox); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
header = header.Copy()
|
|
header.Add("Return-Path", "<"+target.SanitizeForHeader(d.mailFrom)+">")
|
|
return d.d.BodyParsed(header, d.msgMeta.BodyLength, body)
|
|
}
|
|
|
|
func (d *delivery) Abort() error {
|
|
return d.d.Abort()
|
|
}
|
|
|
|
func (d *delivery) Commit() error {
|
|
return d.d.Commit()
|
|
}
|
|
|
|
func (store *Storage) Start(msgMeta *module.MsgMetadata, mailFrom string) (module.Delivery, error) {
|
|
return &delivery{
|
|
store: store,
|
|
msgMeta: msgMeta,
|
|
mailFrom: mailFrom,
|
|
d: store.Back.NewDelivery(),
|
|
addedRcpts: map[string]struct{}{},
|
|
}, nil
|
|
}
|
|
|
|
func (store *Storage) Name() string {
|
|
return "sql"
|
|
}
|
|
|
|
func (store *Storage) InstanceName() string {
|
|
return store.instName
|
|
}
|
|
|
|
func New(_, instName string, _, inlineArgs []string) (module.Module, error) {
|
|
if len(inlineArgs) != 0 {
|
|
return nil, errors.New("sql: no inline args")
|
|
}
|
|
return &Storage{
|
|
instName: instName,
|
|
Log: log.Logger{Name: "sql"},
|
|
resolver: net.DefaultResolver,
|
|
}, nil
|
|
}
|
|
|
|
func (store *Storage) Init(cfg *config.Map) error {
|
|
var (
|
|
driver string
|
|
dsn []string
|
|
fsstoreLocation string
|
|
appendlimitVal = -1
|
|
compression []string
|
|
)
|
|
|
|
opts := imapsql.Opts{
|
|
// Prevent deadlock if nobody is listening for updates (e.g. no IMAP
|
|
// configured).
|
|
LazyUpdatesInit: true,
|
|
}
|
|
cfg.String("driver", false, true, "", &driver)
|
|
cfg.StringList("dsn", false, true, nil, &dsn)
|
|
cfg.Custom("fsstore", false, false, func() (interface{}, error) {
|
|
return "", nil
|
|
}, func(m *config.Map, node *config.Node) (interface{}, error) {
|
|
switch len(node.Args) {
|
|
case 0:
|
|
if store.instName == "" {
|
|
return nil, errors.New("sql: need explicit fsstore location for inline definition")
|
|
}
|
|
return filepath.Join(config.StateDirectory, "sql-"+store.instName+"-fsstore"), nil
|
|
case 1:
|
|
return node.Args[0], nil
|
|
default:
|
|
return nil, m.MatchErr("expected 0 or 1 arguments")
|
|
}
|
|
}, &fsstoreLocation)
|
|
cfg.StringList("compression", false, false, []string{"off"}, &compression)
|
|
cfg.DataSize("appendlimit", false, false, 32*1024*1024, &appendlimitVal)
|
|
cfg.Bool("debug", true, false, &store.Log.Debug)
|
|
cfg.Bool("storage_perdomain", true, false, &store.storagePerDomain)
|
|
cfg.Bool("auth_perdomain", true, false, &store.authPerDomain)
|
|
cfg.StringList("auth_domains", true, false, nil, &store.authDomains)
|
|
cfg.Int("sqlite3_cache_size", false, false, 0, &opts.CacheSize)
|
|
cfg.Int("sqlite3_busy_timeout", false, false, 0, &opts.BusyTimeout)
|
|
cfg.Bool("sqlite3_exclusive_lock", false, false, &opts.ExclusiveLock)
|
|
cfg.String("junk_mailbox", false, false, "Junk", &store.junkMbox)
|
|
|
|
if _, err := cfg.Process(); err != nil {
|
|
return err
|
|
}
|
|
|
|
opts.Log = &store.Log
|
|
|
|
if store.authPerDomain && store.authDomains == nil {
|
|
return errors.New("sql: auth_domains must be set if auth_perdomain is used")
|
|
}
|
|
|
|
if appendlimitVal == -1 {
|
|
opts.MaxMsgBytes = nil
|
|
} else {
|
|
// int is 64-bit on some platforms, so cut off values we can't actually
|
|
// use.
|
|
if appendlimitVal > math.MaxUint32 {
|
|
return errors.New("sql: appendlimit can't be higher than 4 GiB")
|
|
}
|
|
opts.MaxMsgBytes = new(uint32)
|
|
*opts.MaxMsgBytes = uint32(appendlimitVal)
|
|
}
|
|
var err error
|
|
|
|
dsnStr := strings.Join(dsn, " ")
|
|
|
|
var extStore imapsql.ExternalStore
|
|
if fsstoreLocation != "" {
|
|
if err := os.MkdirAll(fsstoreLocation, os.ModeDir|os.ModePerm); err != nil {
|
|
return err
|
|
}
|
|
extStore = &imapsql.FSStore{Root: fsstoreLocation}
|
|
}
|
|
// Add blocks for other External Store implementations here ^.
|
|
if extStore == nil {
|
|
return errors.New("sql: no body storage is configured (use fsstore)")
|
|
}
|
|
|
|
if len(compression) != 0 {
|
|
switch compression[0] {
|
|
case "zstd", "lz4":
|
|
opts.CompressAlgo = compression[0]
|
|
if len(compression) == 2 {
|
|
opts.CompressAlgoParams = compression[1]
|
|
if _, err := strconv.Atoi(compression[1]); err != nil {
|
|
return errors.New("sql: first argument for lz4 and zstd is compression level")
|
|
}
|
|
}
|
|
if len(compression) > 2 {
|
|
return errors.New("sql: expected at most 2 arguments")
|
|
}
|
|
case "off":
|
|
if len(compression) > 1 {
|
|
return errors.New("sql: expected at most 1 arguments")
|
|
}
|
|
default:
|
|
return errors.New("sql: unknown compression algorithm")
|
|
}
|
|
}
|
|
|
|
store.Back, err = imapsql.New(driver, dsnStr, extStore, opts)
|
|
if err != nil {
|
|
return fmt.Errorf("sql: %s", err)
|
|
}
|
|
|
|
store.Log.Debugln("go-imap-sql version", imapsql.VersionStr)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (store *Storage) IMAPExtensions() []string {
|
|
return []string{"APPENDLIMIT", "MOVE", "CHILDREN", "SPECIAL-USE"}
|
|
}
|
|
|
|
func (store *Storage) Updates() <-chan backend.Update {
|
|
return store.Back.Updates()
|
|
}
|
|
|
|
func (store *Storage) EnableChildrenExt() bool {
|
|
return store.Back.EnableChildrenExt()
|
|
}
|
|
|
|
func (store *Storage) CheckPlain(username, password string) bool {
|
|
accountName, ok := auth.CheckDomainAuth(username, store.authPerDomain, store.authDomains)
|
|
if !ok {
|
|
return false
|
|
}
|
|
|
|
return store.Back.CheckPlain(accountName, password)
|
|
}
|
|
|
|
func (store *Storage) GetOrCreateUser(username string) (backend.User, error) {
|
|
var accountName string
|
|
if store.storagePerDomain {
|
|
if !strings.Contains(username, "@") {
|
|
return nil, errors.New("GetOrCreateUser: username@domain required")
|
|
}
|
|
accountName = username
|
|
} else {
|
|
parts := strings.Split(username, "@")
|
|
accountName = parts[0]
|
|
}
|
|
|
|
return store.Back.GetOrCreateUser(accountName)
|
|
}
|
|
|
|
func init() {
|
|
module.Register("sql", New)
|
|
}
|