mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-06 06:27:38 +03:00
The intention is to keep to repo root clean while the list of packages is slowly growing. Additionally, a bunch of small (~30 LoC) files in the repo root is merged into a single maddy.go file, for the same reason. Most of the internal code is moved into the internal/ directory. Go toolchain will make it impossible to import these packages from external applications. Some packages are renamed and moved into the pkg/ directory in the root. According to https://github.com/golang-standards/project-layout this is the de-facto standard to place "library code that's ok to use by external applications" in. To clearly define the purpose of top-level directories, README.md files are added to each.
157 lines
4.1 KiB
Go
157 lines
4.1 KiB
Go
package check
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/foxcpp/maddy/internal/config"
|
|
"github.com/foxcpp/maddy/internal/exterrors"
|
|
"github.com/foxcpp/maddy/internal/module"
|
|
)
|
|
|
|
// FailAction specifies actions that messages pipeline should take based on the
|
|
// result of the check.
|
|
//
|
|
// Its check module responsibility to apply FailAction on the CheckResult it
|
|
// returns. It is intended to be used as follows:
|
|
//
|
|
// Add the configuration directive to allow user to specify the action:
|
|
// cfg.Custom("SOME_action", false, false,
|
|
// func() (interface{}, error) {
|
|
// return check.FailAction{Quarantine: true}, nil
|
|
// }, check.FailActionDirective, &yourModule.SOMEAction)
|
|
// return in func literal is the default value, you might want to adjust it.
|
|
//
|
|
// Call yourModule.SOMEAction.Apply on CheckResult containing only the
|
|
// Reason field:
|
|
// func (yourModule YourModule) CheckConnection() module.CheckResult {
|
|
// return yourModule.SOMEAction.Apply(module.CheckResult{
|
|
// Reason: ...,
|
|
// })
|
|
// }
|
|
type FailAction struct {
|
|
Quarantine bool
|
|
Reject bool
|
|
|
|
ReasonOverride *exterrors.SMTPError
|
|
}
|
|
|
|
func FailActionDirective(m *config.Map, node *config.Node) (interface{}, error) {
|
|
if len(node.Children) != 0 {
|
|
return nil, m.MatchErr("can't declare block here")
|
|
}
|
|
|
|
val, err := ParseActionDirective(node.Args)
|
|
if err != nil {
|
|
return nil, m.MatchErr("%v", err)
|
|
}
|
|
return val, nil
|
|
}
|
|
|
|
func ParseActionDirective(args []string) (FailAction, error) {
|
|
if len(args) == 0 {
|
|
return FailAction{}, errors.New("expected at least 1 argument")
|
|
}
|
|
|
|
res := FailAction{}
|
|
|
|
switch args[0] {
|
|
case "reject", "quarantine":
|
|
if len(args) > 1 {
|
|
var err error
|
|
res.ReasonOverride, err = ParseRejectDirective(args[1:])
|
|
if err != nil {
|
|
return FailAction{}, err
|
|
}
|
|
}
|
|
case "ignore":
|
|
default:
|
|
return FailAction{}, errors.New("invalid action")
|
|
}
|
|
|
|
res.Reject = args[0] == "reject"
|
|
res.Quarantine = args[0] == "quarantine"
|
|
return res, nil
|
|
}
|
|
|
|
// Apply merges the result of check execution with action configuration specified
|
|
// in the check configuration.
|
|
func (cfa FailAction) Apply(originalRes module.CheckResult) module.CheckResult {
|
|
if originalRes.Reason == nil {
|
|
return originalRes
|
|
}
|
|
|
|
if cfa.ReasonOverride != nil {
|
|
// Wrap instead of replace to preserve other fields.
|
|
originalRes.Reason = &exterrors.SMTPError{
|
|
Code: cfa.ReasonOverride.Code,
|
|
EnhancedCode: cfa.ReasonOverride.EnhancedCode,
|
|
Message: cfa.ReasonOverride.Message,
|
|
Err: originalRes.Reason,
|
|
}
|
|
}
|
|
|
|
originalRes.Quarantine = cfa.Quarantine || originalRes.Quarantine
|
|
originalRes.Reject = cfa.Reject || originalRes.Reject
|
|
return originalRes
|
|
}
|
|
|
|
func ParseRejectDirective(args []string) (*exterrors.SMTPError, error) {
|
|
code := 554
|
|
enchCode := exterrors.EnhancedCode{5, 7, 0}
|
|
msg := "Message rejected due to a local policy"
|
|
var err error
|
|
switch len(args) {
|
|
case 3:
|
|
msg = args[2]
|
|
if msg == "" {
|
|
return nil, fmt.Errorf("message can't be empty")
|
|
}
|
|
fallthrough
|
|
case 2:
|
|
enchCode, err = parseEnhancedCode(args[1])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if enchCode[0] != 4 && enchCode[0] != 5 {
|
|
return nil, fmt.Errorf("enhanced code should use either 4 or 5 as a first number")
|
|
}
|
|
fallthrough
|
|
case 1:
|
|
code, err = strconv.Atoi(args[0])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("invalid error code integer: %v", err)
|
|
}
|
|
if (code/100) != 4 && (code/100) != 5 {
|
|
return nil, fmt.Errorf("error code should start with either 4 or 5")
|
|
}
|
|
case 0:
|
|
default:
|
|
return nil, fmt.Errorf("invalid count of arguments")
|
|
}
|
|
return &exterrors.SMTPError{
|
|
Code: code,
|
|
EnhancedCode: enchCode,
|
|
Message: msg,
|
|
Reason: "reject directive used",
|
|
}, nil
|
|
}
|
|
|
|
func parseEnhancedCode(s string) (exterrors.EnhancedCode, error) {
|
|
parts := strings.Split(s, ".")
|
|
if len(parts) != 3 {
|
|
return exterrors.EnhancedCode{}, fmt.Errorf("wrong amount of enhanced code parts")
|
|
}
|
|
|
|
code := exterrors.EnhancedCode{}
|
|
for i, part := range parts {
|
|
num, err := strconv.Atoi(part)
|
|
if err != nil {
|
|
return code, err
|
|
}
|
|
code[i] = num
|
|
}
|
|
return code, nil
|
|
}
|