mirror of
https://github.com/chatmail/relay.git
synced 2026-05-11 16:34:39 +00:00
Compare commits
2 Commits
metadata_r
...
default-pa
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
5a6f036106 | ||
|
|
7d55d98620 |
@@ -1,20 +0,0 @@
|
|||||||
;; Zone file for staging.testrun.org
|
|
||||||
|
|
||||||
$ORIGIN staging.testrun.org.
|
|
||||||
$TTL 300
|
|
||||||
|
|
||||||
@ IN SOA ns.testrun.org. root.nine.testrun.org (
|
|
||||||
2023010101 ; Serial
|
|
||||||
7200 ; Refresh
|
|
||||||
3600 ; Retry
|
|
||||||
1209600 ; Expire
|
|
||||||
3600 ; Negative response caching TTL
|
|
||||||
)
|
|
||||||
|
|
||||||
;; Nameservers.
|
|
||||||
@ IN NS ns.testrun.org.
|
|
||||||
|
|
||||||
;; DNS records.
|
|
||||||
@ IN A 37.27.37.98
|
|
||||||
mta-sts.staging.testrun.org. CNAME staging.testrun.org.
|
|
||||||
www.staging.testrun.org. CNAME staging.testrun.org.
|
|
||||||
72
.github/workflows/test-and-deploy.yaml
vendored
72
.github/workflows/test-and-deploy.yaml
vendored
@@ -1,72 +0,0 @@
|
|||||||
name: deploy on staging.testrun.org, and run tests
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- main
|
|
||||||
- staging-ci
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
deploy:
|
|
||||||
name: deploy on staging.testrun.org, and run tests
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
|
|
||||||
- name: prepare SSH
|
|
||||||
run: |
|
|
||||||
mkdir ~/.ssh
|
|
||||||
echo "${{ secrets.STAGING_SSH_KEY }}" >> ~/.ssh/id_ed25519
|
|
||||||
chmod 600 ~/.ssh/id_ed25519
|
|
||||||
ssh-keyscan staging.testrun.org > ~/.ssh/known_hosts
|
|
||||||
# rsync -avz root@staging.testrun.org:/var/lib/acme . || true
|
|
||||||
# rsync -avz root@staging.testrun.org:/var/lib/rspamd/dkim . || true
|
|
||||||
|
|
||||||
#- name: rebuild staging.testrun.org to have a clean VPS
|
|
||||||
# run: |
|
|
||||||
# curl -X POST \
|
|
||||||
# -H "Authorization: Bearer ${{ secrets.HETZNER_API_TOKEN }}" \
|
|
||||||
# -H "Content-Type: application/json" \
|
|
||||||
# -d '{"image":"debian-12"}' \
|
|
||||||
# "https://api.hetzner.cloud/v1/servers/${{ secrets.STAGING_SERVER_ID }}/actions/rebuild"
|
|
||||||
|
|
||||||
- run: scripts/initenv.sh
|
|
||||||
|
|
||||||
- name: append venv/bin to PATH
|
|
||||||
run: echo venv/bin >>$GITHUB_PATH
|
|
||||||
|
|
||||||
- name: run formatting checks
|
|
||||||
run: cmdeploy fmt -v
|
|
||||||
|
|
||||||
- name: run deploy-chatmail offline tests
|
|
||||||
run: pytest --pyargs cmdeploy
|
|
||||||
|
|
||||||
#- name: upload TLS cert after rebuilding
|
|
||||||
# run: |
|
|
||||||
# echo " --- wait until staging.testrun.org VPS is rebuilt --- "
|
|
||||||
# rm ~/.ssh/known_hosts
|
|
||||||
# while ! ssh -o ConnectTimeout=180 -o StrictHostKeyChecking=accept-new -v root@staging.testrun.org id -u ; do sleep 1 ; done
|
|
||||||
# ssh -o StrictHostKeyChecking=accept-new -v root@staging.testrun.org id -u
|
|
||||||
# rsync -avz acme root@staging.testrun.org:/var/lib/ || true
|
|
||||||
# rsync -avz dkim root@staging.testrun.org:/var/lib/rspamd/ || true
|
|
||||||
|
|
||||||
- run: cmdeploy init staging.testrun.org
|
|
||||||
|
|
||||||
- run: cmdeploy run
|
|
||||||
|
|
||||||
- name: set DNS entries
|
|
||||||
run: |
|
|
||||||
#ssh -o StrictHostKeyChecking=accept-new -v root@staging.testrun.org chown _rspamd:_rspamd -R /var/lib/rspamd/dkim
|
|
||||||
cmdeploy dns --zonefile staging-generated.zone
|
|
||||||
cat staging-generated.zone >> .github/workflows/staging.testrun.org-default.zone
|
|
||||||
cat .github/workflows/staging.testrun.org-default.zone
|
|
||||||
scp -o StrictHostKeyChecking=accept-new .github/workflows/staging.testrun.org-default.zone root@ns.testrun.org:/etc/nsd/staging.testrun.org.zone
|
|
||||||
ssh root@ns.testrun.org nsd-checkzone staging.testrun.org /etc/nsd/staging.testrun.org.zone
|
|
||||||
ssh root@ns.testrun.org systemctl reload nsd
|
|
||||||
|
|
||||||
- name: cmdeploy test
|
|
||||||
run: CHATMAIL_DOMAIN2=nine.testrun.org cmdeploy test --slow
|
|
||||||
|
|
||||||
- name: cmdeploy dns (try 3 times)
|
|
||||||
run: cmdeploy dns || cmdeploy dns || cmdeploy dns
|
|
||||||
|
|
||||||
@@ -157,6 +157,6 @@ While this file is present, account creation will be blocked.
|
|||||||
[acmetool](https://hlandau.github.io/acmetool/) listens on port 80 (http).
|
[acmetool](https://hlandau.github.io/acmetool/) listens on port 80 (http).
|
||||||
|
|
||||||
Delta Chat apps will, however, discover all ports and configurations
|
Delta Chat apps will, however, discover all ports and configurations
|
||||||
automatically by reading the [autoconfig XML file](https://www.ietf.org/archive/id/draft-bucksch-autoconfig-00.html) from the chatmail service.
|
automatically by reading the [autoconfig XML file](https://web.archive.org/web/20210624004729/https://developer.mozilla.org/en-US/docs/Mozilla/Thunderbird/Autoconfiguration) from the chatmail service.
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -10,7 +10,6 @@ dependencies = [
|
|||||||
"iniconfig",
|
"iniconfig",
|
||||||
"deltachat-rpc-server",
|
"deltachat-rpc-server",
|
||||||
"deltachat-rpc-client",
|
"deltachat-rpc-client",
|
||||||
"requests",
|
|
||||||
]
|
]
|
||||||
|
|
||||||
[tool.setuptools]
|
[tool.setuptools]
|
||||||
@@ -21,7 +20,6 @@ where = ['src']
|
|||||||
|
|
||||||
[project.scripts]
|
[project.scripts]
|
||||||
doveauth = "chatmaild.doveauth:main"
|
doveauth = "chatmaild.doveauth:main"
|
||||||
chatmail-metadata = "chatmaild.metadata:main"
|
|
||||||
filtermail = "chatmaild.filtermail:main"
|
filtermail = "chatmaild.filtermail:main"
|
||||||
echobot = "chatmaild.echo:main"
|
echobot = "chatmaild.echo:main"
|
||||||
chatmail-metrics = "chatmaild.metrics:main"
|
chatmail-metrics = "chatmaild.metrics:main"
|
||||||
|
|||||||
@@ -1,10 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Chatmail dict proxy for IMAP METADATA
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart={execpath} /run/dovecot/metadata.socket vmail {config_path}
|
|
||||||
Restart=always
|
|
||||||
RestartSec=30
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -58,18 +58,17 @@ def is_allowed_to_create(config: Config, user, cleartext_password) -> bool:
|
|||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
def get_user_data(db, config: Config, user):
|
def get_user_data(db, user):
|
||||||
with db.read_connection() as conn:
|
with db.read_connection() as conn:
|
||||||
result = conn.get_user(user)
|
result = conn.get_user(user)
|
||||||
if result:
|
if result:
|
||||||
result["home"] = f"/home/vmail/mail/{config.mail_domain}/{user}"
|
|
||||||
result["uid"] = "vmail"
|
result["uid"] = "vmail"
|
||||||
result["gid"] = "vmail"
|
result["gid"] = "vmail"
|
||||||
return result
|
return result
|
||||||
|
|
||||||
|
|
||||||
def lookup_userdb(db, config: Config, user):
|
def lookup_userdb(db, user):
|
||||||
return get_user_data(db, config, user)
|
return get_user_data(db, user)
|
||||||
|
|
||||||
|
|
||||||
def lookup_passdb(db, config: Config, user, cleartext_password):
|
def lookup_passdb(db, config: Config, user, cleartext_password):
|
||||||
@@ -81,7 +80,6 @@ def lookup_passdb(db, config: Config, user, cleartext_password):
|
|||||||
"UPDATE users SET last_login=? WHERE addr=?", (int(time.time()), user)
|
"UPDATE users SET last_login=? WHERE addr=?", (int(time.time()), user)
|
||||||
)
|
)
|
||||||
|
|
||||||
userdata["home"] = f"/home/vmail/mail/{config.mail_domain}/{user}"
|
|
||||||
userdata["uid"] = "vmail"
|
userdata["uid"] = "vmail"
|
||||||
userdata["gid"] = "vmail"
|
userdata["gid"] = "vmail"
|
||||||
return userdata
|
return userdata
|
||||||
@@ -93,7 +91,7 @@ def lookup_passdb(db, config: Config, user, cleartext_password):
|
|||||||
VALUES (?, ?, ?)"""
|
VALUES (?, ?, ?)"""
|
||||||
conn.execute(q, (user, encrypted_password, int(time.time())))
|
conn.execute(q, (user, encrypted_password, int(time.time())))
|
||||||
return dict(
|
return dict(
|
||||||
home=f"/home/vmail/mail/{config.mail_domain}/{user}",
|
home=f"/home/vmail/{user}",
|
||||||
uid="vmail",
|
uid="vmail",
|
||||||
gid="vmail",
|
gid="vmail",
|
||||||
password=encrypted_password,
|
password=encrypted_password,
|
||||||
@@ -144,7 +142,7 @@ def handle_dovecot_request(msg, db, config: Config):
|
|||||||
if type == "userdb":
|
if type == "userdb":
|
||||||
user = args[0]
|
user = args[0]
|
||||||
if user.endswith(f"@{config.mail_domain}"):
|
if user.endswith(f"@{config.mail_domain}"):
|
||||||
res = lookup_userdb(db, config, user)
|
res = lookup_userdb(db, user)
|
||||||
if res:
|
if res:
|
||||||
reply_command = "O"
|
reply_command = "O"
|
||||||
else:
|
else:
|
||||||
@@ -162,19 +160,6 @@ def handle_dovecot_request(msg, db, config: Config):
|
|||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
def handle_dovecot_protocol(rfile, wfile, db: Database, config: Config):
|
|
||||||
while True:
|
|
||||||
msg = rfile.readline().strip().decode()
|
|
||||||
if not msg:
|
|
||||||
break
|
|
||||||
res = handle_dovecot_request(msg, db, config)
|
|
||||||
if res:
|
|
||||||
wfile.write(res.encode("ascii"))
|
|
||||||
wfile.flush()
|
|
||||||
else:
|
|
||||||
logging.warning("request had no answer: %r", msg)
|
|
||||||
|
|
||||||
|
|
||||||
class ThreadedUnixStreamServer(ThreadingMixIn, UnixStreamServer):
|
class ThreadedUnixStreamServer(ThreadingMixIn, UnixStreamServer):
|
||||||
request_queue_size = 100
|
request_queue_size = 100
|
||||||
|
|
||||||
@@ -188,7 +173,16 @@ def main():
|
|||||||
class Handler(StreamRequestHandler):
|
class Handler(StreamRequestHandler):
|
||||||
def handle(self):
|
def handle(self):
|
||||||
try:
|
try:
|
||||||
handle_dovecot_protocol(self.rfile, self.wfile, db, config)
|
while True:
|
||||||
|
msg = self.rfile.readline().strip().decode()
|
||||||
|
if not msg:
|
||||||
|
break
|
||||||
|
res = handle_dovecot_request(msg, db, config)
|
||||||
|
if res:
|
||||||
|
self.wfile.write(res.encode("ascii"))
|
||||||
|
self.wfile.flush()
|
||||||
|
else:
|
||||||
|
logging.warn("request had no answer: %r", msg)
|
||||||
except Exception:
|
except Exception:
|
||||||
logging.exception("Exception in the handler")
|
logging.exception("Exception in the handler")
|
||||||
raise
|
raise
|
||||||
|
|||||||
@@ -1,149 +0,0 @@
|
|||||||
import pwd
|
|
||||||
|
|
||||||
from queue import Queue
|
|
||||||
from threading import Thread
|
|
||||||
from socketserver import (
|
|
||||||
UnixStreamServer,
|
|
||||||
StreamRequestHandler,
|
|
||||||
ThreadingMixIn,
|
|
||||||
)
|
|
||||||
from .config import read_config
|
|
||||||
import sys
|
|
||||||
import logging
|
|
||||||
import os
|
|
||||||
import requests
|
|
||||||
|
|
||||||
|
|
||||||
DICTPROXY_LOOKUP_CHAR = "L"
|
|
||||||
DICTPROXY_SET_CHAR = "S"
|
|
||||||
DICTPROXY_BEGIN_TRANSACTION_CHAR = "B"
|
|
||||||
DICTPROXY_COMMIT_TRANSACTION_CHAR = "C"
|
|
||||||
DICTPROXY_TRANSACTION_CHARS = "SBC"
|
|
||||||
|
|
||||||
|
|
||||||
class Notifier:
|
|
||||||
def __init__(self):
|
|
||||||
self.guid2token = {}
|
|
||||||
self.to_notify_queue = Queue()
|
|
||||||
|
|
||||||
def set_token(self, guid, token):
|
|
||||||
self.guid2token[guid] = token
|
|
||||||
|
|
||||||
def new_message_for_guid(self, guid):
|
|
||||||
self.to_notify_queue.put(guid)
|
|
||||||
|
|
||||||
def thread_run_loop(self):
|
|
||||||
requests_session = requests.Session()
|
|
||||||
while 1:
|
|
||||||
self.thread_run_one(requests_session)
|
|
||||||
|
|
||||||
def thread_run_one(self, requests_session):
|
|
||||||
guid = self.to_notify_queue.get()
|
|
||||||
token = self.guid2token.get(guid)
|
|
||||||
if token:
|
|
||||||
response = requests_session.post(
|
|
||||||
"https://notifications.delta.chat/notify",
|
|
||||||
data=token,
|
|
||||||
timeout=60,
|
|
||||||
)
|
|
||||||
if response.status_code == 410:
|
|
||||||
# 410 Gone status code
|
|
||||||
# means the token is no longer valid.
|
|
||||||
del self.guid2token[guid]
|
|
||||||
|
|
||||||
|
|
||||||
def handle_dovecot_protocol(rfile, wfile, notifier):
|
|
||||||
# HELLO message, ignored.
|
|
||||||
msg = rfile.readline().strip().decode()
|
|
||||||
|
|
||||||
transactions = {}
|
|
||||||
while True:
|
|
||||||
msg = rfile.readline().strip().decode()
|
|
||||||
if not msg:
|
|
||||||
break
|
|
||||||
|
|
||||||
res = handle_dovecot_request(msg, transactions, notifier)
|
|
||||||
if res:
|
|
||||||
wfile.write(res.encode("ascii"))
|
|
||||||
wfile.flush()
|
|
||||||
|
|
||||||
|
|
||||||
def handle_dovecot_request(msg, transactions, notifier):
|
|
||||||
# see https://doc.dovecot.org/3.0/developer_manual/design/dict_protocol/
|
|
||||||
short_command = msg[0]
|
|
||||||
parts = msg[1:].split("\t")
|
|
||||||
if short_command == DICTPROXY_LOOKUP_CHAR:
|
|
||||||
return "N\n"
|
|
||||||
|
|
||||||
if short_command not in (DICTPROXY_TRANSACTION_CHARS):
|
|
||||||
return
|
|
||||||
|
|
||||||
transaction_id = parts[0]
|
|
||||||
|
|
||||||
if short_command == DICTPROXY_BEGIN_TRANSACTION_CHAR:
|
|
||||||
transactions[transaction_id] = "O\n"
|
|
||||||
elif short_command == DICTPROXY_COMMIT_TRANSACTION_CHAR:
|
|
||||||
# returns whether it failed or succeeded.
|
|
||||||
return transactions.pop(transaction_id, "N\n")
|
|
||||||
elif short_command == DICTPROXY_SET_CHAR:
|
|
||||||
# See header of
|
|
||||||
# <https://github.com/dovecot/core/blob/5e7965632395793d9355eb906b173bf28d2a10ca/src/lib-storage/mailbox-attribute.h>
|
|
||||||
# for the documentation on the structure of the key.
|
|
||||||
|
|
||||||
# Request GETMETADATA "INBOX" /private/chatmail
|
|
||||||
# results in a query for
|
|
||||||
# priv/dd72550f05eadc65542a1200cac67ad7/chatmail
|
|
||||||
#
|
|
||||||
# Request GETMETADATA "" /private/chatmail
|
|
||||||
# results in
|
|
||||||
# priv/dd72550f05eadc65542a1200cac67ad7/vendor/vendor.dovecot/pvt/server/chatmail
|
|
||||||
|
|
||||||
keyname = parts[1].split("/")
|
|
||||||
value = parts[2] if len(parts) > 2 else ""
|
|
||||||
if keyname[0] == "priv" and keyname[2] == "devicetoken":
|
|
||||||
notifier.set_token(keyname[1], value)
|
|
||||||
elif keyname[0] == "priv" and keyname[2] == "messagenew":
|
|
||||||
notifier.new_message_for_guid(keyname[1])
|
|
||||||
else:
|
|
||||||
# Transaction failed.
|
|
||||||
transactions[transaction_id] = "F\n"
|
|
||||||
|
|
||||||
|
|
||||||
class ThreadedUnixStreamServer(ThreadingMixIn, UnixStreamServer):
|
|
||||||
request_queue_size = 100
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
socket, username, config = sys.argv[1:]
|
|
||||||
passwd_entry = pwd.getpwnam(username)
|
|
||||||
|
|
||||||
# XXX config is not currently used
|
|
||||||
config = read_config(config)
|
|
||||||
notifier = Notifier()
|
|
||||||
|
|
||||||
class Handler(StreamRequestHandler):
|
|
||||||
def handle(self):
|
|
||||||
try:
|
|
||||||
handle_dovecot_protocol(self.rfile, self.wfile, notifier)
|
|
||||||
except Exception:
|
|
||||||
logging.exception("Exception in the handler")
|
|
||||||
raise
|
|
||||||
|
|
||||||
try:
|
|
||||||
os.unlink(socket)
|
|
||||||
except FileNotFoundError:
|
|
||||||
pass
|
|
||||||
|
|
||||||
# start notifier thread for signalling new messages to
|
|
||||||
# Delta Chat notification server
|
|
||||||
|
|
||||||
t = Thread(target=notifier.thread_run_loop)
|
|
||||||
t.setDaemon(True)
|
|
||||||
t.start()
|
|
||||||
|
|
||||||
with ThreadedUnixStreamServer(socket, Handler) as server:
|
|
||||||
os.chown(socket, uid=passwd_entry.pw_uid, gid=passwd_entry.pw_gid)
|
|
||||||
try:
|
|
||||||
server.serve_forever()
|
|
||||||
except KeyboardInterrupt:
|
|
||||||
pass
|
|
||||||
@@ -7,7 +7,7 @@ Date: Sun, 15 Oct 2023 16:41:44 +0000
|
|||||||
Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
Chat-Version: 1.0
|
Chat-Version: 1.0
|
||||||
Autocrypt: addr={from_addr}; prefer-encrypt=mutual;
|
Autocrypt: addr=foobar@c2.testrun.org; prefer-encrypt=mutual;
|
||||||
keydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m
|
keydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m
|
||||||
nNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID
|
nNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID
|
||||||
FgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I
|
FgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I
|
||||||
|
|||||||
@@ -1,6 +1,4 @@
|
|||||||
import random
|
import random
|
||||||
from pathlib import Path
|
|
||||||
import os
|
|
||||||
import importlib.resources
|
import importlib.resources
|
||||||
import itertools
|
import itertools
|
||||||
from email.parser import BytesParser
|
from email.parser import BytesParser
|
||||||
@@ -59,12 +57,7 @@ def db(tmpdir):
|
|||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
def maildata(request):
|
def maildata(request):
|
||||||
try:
|
|
||||||
datadir = importlib.resources.files(__package__).joinpath("mail-data")
|
datadir = importlib.resources.files(__package__).joinpath("mail-data")
|
||||||
except TypeError:
|
|
||||||
# in python3.9 or lower, the above doesn't work, so we get datadir this way:
|
|
||||||
datadir = Path(os.getcwd()).joinpath("chatmaild/src/chatmaild/tests/mail-data")
|
|
||||||
|
|
||||||
assert datadir.exists(), datadir
|
assert datadir.exists(), datadir
|
||||||
|
|
||||||
def maildata(name, from_addr, to_addr):
|
def maildata(name, from_addr, to_addr):
|
||||||
|
|||||||
@@ -1,23 +1,17 @@
|
|||||||
import io
|
|
||||||
import json
|
import json
|
||||||
import pytest
|
import pytest
|
||||||
import queue
|
|
||||||
import threading
|
import threading
|
||||||
|
import queue
|
||||||
import traceback
|
import traceback
|
||||||
|
|
||||||
import chatmaild.doveauth
|
import chatmaild.doveauth
|
||||||
from chatmaild.doveauth import (
|
from chatmaild.doveauth import get_user_data, lookup_passdb, handle_dovecot_request
|
||||||
get_user_data,
|
|
||||||
lookup_passdb,
|
|
||||||
handle_dovecot_request,
|
|
||||||
handle_dovecot_protocol,
|
|
||||||
)
|
|
||||||
from chatmaild.database import DBError
|
from chatmaild.database import DBError
|
||||||
|
|
||||||
|
|
||||||
def test_basic(db, example_config):
|
def test_basic(db, example_config):
|
||||||
lookup_passdb(db, example_config, "asdf12345@chat.example.org", "q9mr3faue")
|
lookup_passdb(db, example_config, "asdf12345@chat.example.org", "q9mr3faue")
|
||||||
data = get_user_data(db, example_config, "asdf12345@chat.example.org")
|
data = get_user_data(db, "asdf12345@chat.example.org")
|
||||||
assert data
|
assert data
|
||||||
data2 = lookup_passdb(
|
data2 = lookup_passdb(
|
||||||
db, example_config, "asdf12345@chat.example.org", "q9mr3jewvadsfaue"
|
db, example_config, "asdf12345@chat.example.org", "q9mr3jewvadsfaue"
|
||||||
@@ -43,7 +37,7 @@ def test_nocreate_file(db, monkeypatch, tmpdir, example_config):
|
|||||||
lookup_passdb(
|
lookup_passdb(
|
||||||
db, example_config, "newuser12@chat.example.org", "zequ0Aimuchoodaechik"
|
db, example_config, "newuser12@chat.example.org", "zequ0Aimuchoodaechik"
|
||||||
)
|
)
|
||||||
assert not get_user_data(db, example_config, "newuser12@chat.example.org")
|
assert not get_user_data(db, "newuser12@chat.example.org")
|
||||||
|
|
||||||
|
|
||||||
def test_db_version(db):
|
def test_db_version(db):
|
||||||
@@ -67,23 +61,11 @@ def test_handle_dovecot_request(db, example_config):
|
|||||||
assert res
|
assert res
|
||||||
assert res[0] == "O" and res.endswith("\n")
|
assert res[0] == "O" and res.endswith("\n")
|
||||||
userdata = json.loads(res[1:].strip())
|
userdata = json.loads(res[1:].strip())
|
||||||
assert (
|
assert userdata["home"] == "/home/vmail/some42123@chat.example.org"
|
||||||
userdata["home"]
|
|
||||||
== "/home/vmail/mail/chat.example.org/some42123@chat.example.org"
|
|
||||||
)
|
|
||||||
assert userdata["uid"] == userdata["gid"] == "vmail"
|
assert userdata["uid"] == userdata["gid"] == "vmail"
|
||||||
assert userdata["password"].startswith("{SHA512-CRYPT}")
|
assert userdata["password"].startswith("{SHA512-CRYPT}")
|
||||||
|
|
||||||
|
|
||||||
def test_handle_dovecot_protocol(db, example_config):
|
|
||||||
rfile = io.BytesIO(
|
|
||||||
b"H3\t2\t0\t\tauth\nLshared/userdb/foobar@chat.example.org\tfoobar@chat.example.org\n"
|
|
||||||
)
|
|
||||||
wfile = io.BytesIO()
|
|
||||||
handle_dovecot_protocol(rfile, wfile, db, example_config)
|
|
||||||
assert wfile.getvalue() == b"N\n"
|
|
||||||
|
|
||||||
|
|
||||||
def test_50_concurrent_lookups_different_accounts(db, gencreds, example_config):
|
def test_50_concurrent_lookups_different_accounts(db, gencreds, example_config):
|
||||||
num_threads = 50
|
num_threads = 50
|
||||||
req_per_thread = 5
|
req_per_thread = 5
|
||||||
|
|||||||
@@ -1,132 +0,0 @@
|
|||||||
import io
|
|
||||||
|
|
||||||
from chatmaild.metadata import (
|
|
||||||
handle_dovecot_request,
|
|
||||||
handle_dovecot_protocol,
|
|
||||||
Notifier,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def test_handle_dovecot_request_lookup_fails():
|
|
||||||
notifier = Notifier()
|
|
||||||
res = handle_dovecot_request("Lpriv/123/chatmail", {}, notifier)
|
|
||||||
assert res == "N\n"
|
|
||||||
|
|
||||||
|
|
||||||
def test_handle_dovecot_request_happy_path():
|
|
||||||
notifier = Notifier()
|
|
||||||
transactions = {}
|
|
||||||
|
|
||||||
# lookups return the same NOTFOUND result
|
|
||||||
res = handle_dovecot_request("Lpriv/123/chatmail", transactions, notifier)
|
|
||||||
assert res == "N\n"
|
|
||||||
assert not notifier.guid2token and not transactions
|
|
||||||
|
|
||||||
# set device token in a transaction
|
|
||||||
tx = "1111"
|
|
||||||
msg = f"B{tx}\tuser"
|
|
||||||
res = handle_dovecot_request(msg, transactions, notifier)
|
|
||||||
assert not res and not notifier.guid2token
|
|
||||||
assert transactions == {tx: "O\n"}
|
|
||||||
|
|
||||||
msg = f"S{tx}\tpriv/guid00/devicetoken\t01234"
|
|
||||||
res = handle_dovecot_request(msg, transactions, notifier)
|
|
||||||
assert not res
|
|
||||||
assert len(transactions) == 1
|
|
||||||
assert len(notifier.guid2token) == 1
|
|
||||||
assert notifier.guid2token["guid00"] == "01234"
|
|
||||||
|
|
||||||
msg = f"C{tx}"
|
|
||||||
res = handle_dovecot_request(msg, transactions, notifier)
|
|
||||||
assert res == "O\n"
|
|
||||||
assert len(transactions) == 0
|
|
||||||
assert notifier.guid2token["guid00"] == "01234"
|
|
||||||
|
|
||||||
# trigger notification for incoming message
|
|
||||||
assert handle_dovecot_request(f"B{tx}\tuser", transactions, notifier) is None
|
|
||||||
msg = f"S{tx}\tpriv/guid00/messagenew"
|
|
||||||
assert handle_dovecot_request(msg, transactions, notifier) is None
|
|
||||||
assert notifier.to_notify_queue.get() == "guid00"
|
|
||||||
assert notifier.to_notify_queue.qsize() == 0
|
|
||||||
assert handle_dovecot_request(f"C{tx}\tuser", transactions, notifier) == "O\n"
|
|
||||||
assert not transactions
|
|
||||||
|
|
||||||
|
|
||||||
def test_handle_dovecot_protocol_set_devicetoken():
|
|
||||||
rfile = io.BytesIO(
|
|
||||||
b"\n".join(
|
|
||||||
[
|
|
||||||
b"HELLO",
|
|
||||||
b"Btx00\tuser",
|
|
||||||
b"Stx00\tpriv/guid00/devicetoken\t01234",
|
|
||||||
b"Ctx00",
|
|
||||||
]
|
|
||||||
)
|
|
||||||
)
|
|
||||||
wfile = io.BytesIO()
|
|
||||||
notifier = Notifier()
|
|
||||||
handle_dovecot_protocol(rfile, wfile, notifier)
|
|
||||||
assert notifier.guid2token["guid00"] == "01234"
|
|
||||||
assert wfile.getvalue() == b"O\n"
|
|
||||||
|
|
||||||
|
|
||||||
def test_handle_dovecot_protocol_messagenew():
|
|
||||||
rfile = io.BytesIO(
|
|
||||||
b"\n".join(
|
|
||||||
[
|
|
||||||
b"HELLO",
|
|
||||||
b"Btx01\tuser",
|
|
||||||
b"Stx01\tpriv/guid00/messagenew",
|
|
||||||
b"Ctx01",
|
|
||||||
]
|
|
||||||
)
|
|
||||||
)
|
|
||||||
wfile = io.BytesIO()
|
|
||||||
notifier = Notifier()
|
|
||||||
handle_dovecot_protocol(rfile, wfile, notifier)
|
|
||||||
assert wfile.getvalue() == b"O\n"
|
|
||||||
assert notifier.to_notify_queue.get() == "guid00"
|
|
||||||
assert notifier.to_notify_queue.qsize() == 0
|
|
||||||
|
|
||||||
|
|
||||||
def test_notifier_thread_run():
|
|
||||||
requests = []
|
|
||||||
|
|
||||||
class ReqMock:
|
|
||||||
def post(self, url, data, timeout):
|
|
||||||
requests.append((url, data, timeout))
|
|
||||||
|
|
||||||
class Result:
|
|
||||||
status_code = 200
|
|
||||||
|
|
||||||
return Result()
|
|
||||||
|
|
||||||
notifier = Notifier()
|
|
||||||
notifier.set_token("guid00", "01234")
|
|
||||||
notifier.new_message_for_guid("guid00")
|
|
||||||
notifier.thread_run_one(ReqMock())
|
|
||||||
url, data, timeout = requests[0]
|
|
||||||
assert data == "01234"
|
|
||||||
assert len(notifier.guid2token) == 1
|
|
||||||
|
|
||||||
|
|
||||||
def test_notifier_thread_run_gone_removes_token():
|
|
||||||
requests = []
|
|
||||||
|
|
||||||
class ReqMock:
|
|
||||||
def post(self, url, data, timeout):
|
|
||||||
requests.append((url, data, timeout))
|
|
||||||
|
|
||||||
class Result:
|
|
||||||
status_code = 410
|
|
||||||
|
|
||||||
return Result()
|
|
||||||
|
|
||||||
notifier = Notifier()
|
|
||||||
notifier.set_token("guid00", "01234")
|
|
||||||
notifier.new_message_for_guid("guid00")
|
|
||||||
assert notifier.guid2token["guid00"] == "01234"
|
|
||||||
notifier.thread_run_one(ReqMock())
|
|
||||||
url, data, timeout = requests[0]
|
|
||||||
assert data == "01234"
|
|
||||||
assert len(notifier.guid2token) == 0
|
|
||||||
@@ -1,7 +1,6 @@
|
|||||||
"""
|
"""
|
||||||
Chat Mail pyinfra deploy.
|
Chat Mail pyinfra deploy.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
import importlib.resources
|
import importlib.resources
|
||||||
import subprocess
|
import subprocess
|
||||||
@@ -102,7 +101,6 @@ def _install_remote_venv_with_chatmaild(config) -> None:
|
|||||||
"doveauth",
|
"doveauth",
|
||||||
"filtermail",
|
"filtermail",
|
||||||
"echobot",
|
"echobot",
|
||||||
"chatmail-metadata",
|
|
||||||
):
|
):
|
||||||
params = dict(
|
params = dict(
|
||||||
execpath=f"{remote_venv_dir}/bin/{fn}",
|
execpath=f"{remote_venv_dir}/bin/{fn}",
|
||||||
@@ -132,20 +130,6 @@ def _configure_opendkim(domain: str, dkim_selector: str = "dkim") -> bool:
|
|||||||
"""Configures OpenDKIM"""
|
"""Configures OpenDKIM"""
|
||||||
need_restart = False
|
need_restart = False
|
||||||
|
|
||||||
server.group(name="Create opendkim group", group="opendkim", system=True)
|
|
||||||
server.user(
|
|
||||||
name="Create opendkim user",
|
|
||||||
user="opendkim",
|
|
||||||
groups=["opendkim"],
|
|
||||||
system=True,
|
|
||||||
)
|
|
||||||
server.user(
|
|
||||||
name="Add postfix user to opendkim group for socket access",
|
|
||||||
user="postfix",
|
|
||||||
groups=["opendkim"],
|
|
||||||
system=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
main_config = files.template(
|
main_config = files.template(
|
||||||
src=importlib.resources.files(__package__).joinpath("opendkim/opendkim.conf"),
|
src=importlib.resources.files(__package__).joinpath("opendkim/opendkim.conf"),
|
||||||
dest="/etc/opendkim.conf",
|
dest="/etc/opendkim.conf",
|
||||||
@@ -156,24 +140,6 @@ def _configure_opendkim(domain: str, dkim_selector: str = "dkim") -> bool:
|
|||||||
)
|
)
|
||||||
need_restart |= main_config.changed
|
need_restart |= main_config.changed
|
||||||
|
|
||||||
screen_script = files.put(
|
|
||||||
src=importlib.resources.files(__package__).joinpath("opendkim/screen.lua"),
|
|
||||||
dest="/etc/opendkim/screen.lua",
|
|
||||||
user="root",
|
|
||||||
group="root",
|
|
||||||
mode="644",
|
|
||||||
)
|
|
||||||
need_restart |= screen_script.changed
|
|
||||||
|
|
||||||
final_script = files.put(
|
|
||||||
src=importlib.resources.files(__package__).joinpath("opendkim/final.lua"),
|
|
||||||
dest="/etc/opendkim/final.lua",
|
|
||||||
user="root",
|
|
||||||
group="root",
|
|
||||||
mode="644",
|
|
||||||
)
|
|
||||||
need_restart |= final_script.changed
|
|
||||||
|
|
||||||
files.directory(
|
files.directory(
|
||||||
name="Add opendkim directory to /etc",
|
name="Add opendkim directory to /etc",
|
||||||
path="/etc/opendkim",
|
path="/etc/opendkim",
|
||||||
@@ -202,6 +168,7 @@ def _configure_opendkim(domain: str, dkim_selector: str = "dkim") -> bool:
|
|||||||
config={"domain_name": domain, "opendkim_selector": dkim_selector},
|
config={"domain_name": domain, "opendkim_selector": dkim_selector},
|
||||||
)
|
)
|
||||||
need_restart |= signing_table.changed
|
need_restart |= signing_table.changed
|
||||||
|
|
||||||
files.directory(
|
files.directory(
|
||||||
name="Add opendkim socket directory to /var/spool/postfix",
|
name="Add opendkim socket directory to /var/spool/postfix",
|
||||||
path="/var/spool/postfix/opendkim",
|
path="/var/spool/postfix/opendkim",
|
||||||
@@ -211,11 +178,6 @@ def _configure_opendkim(domain: str, dkim_selector: str = "dkim") -> bool:
|
|||||||
present=True,
|
present=True,
|
||||||
)
|
)
|
||||||
|
|
||||||
apt.packages(
|
|
||||||
name="apt install opendkim opendkim-tools",
|
|
||||||
packages=["opendkim", "opendkim-tools"],
|
|
||||||
)
|
|
||||||
|
|
||||||
if not host.get_fact(File, f"/etc/dkimkeys/{dkim_selector}.private"):
|
if not host.get_fact(File, f"/etc/dkimkeys/{dkim_selector}.private"):
|
||||||
server.shell(
|
server.shell(
|
||||||
name="Generate OpenDKIM domain keys",
|
name="Generate OpenDKIM domain keys",
|
||||||
@@ -292,27 +254,6 @@ def _configure_postfix(config: Config, debug: bool = False) -> bool:
|
|||||||
)
|
)
|
||||||
need_restart |= master_config.changed
|
need_restart |= master_config.changed
|
||||||
|
|
||||||
header_cleanup = files.put(
|
|
||||||
src=importlib.resources.files(__package__).joinpath(
|
|
||||||
"postfix/submission_header_cleanup"
|
|
||||||
),
|
|
||||||
dest="/etc/postfix/submission_header_cleanup",
|
|
||||||
user="root",
|
|
||||||
group="root",
|
|
||||||
mode="644",
|
|
||||||
)
|
|
||||||
need_restart |= header_cleanup.changed
|
|
||||||
|
|
||||||
# Login map that 1:1 maps email address to login.
|
|
||||||
login_map = files.put(
|
|
||||||
src=importlib.resources.files(__package__).joinpath("postfix/login_map"),
|
|
||||||
dest="/etc/postfix/login_map",
|
|
||||||
user="root",
|
|
||||||
group="root",
|
|
||||||
mode="644",
|
|
||||||
)
|
|
||||||
need_restart |= login_map.changed
|
|
||||||
|
|
||||||
return need_restart
|
return need_restart
|
||||||
|
|
||||||
|
|
||||||
@@ -338,27 +279,6 @@ def _configure_dovecot(config: Config, debug: bool = False) -> bool:
|
|||||||
mode="644",
|
mode="644",
|
||||||
)
|
)
|
||||||
need_restart |= auth_config.changed
|
need_restart |= auth_config.changed
|
||||||
lua_push_notification_script = files.put(
|
|
||||||
src=importlib.resources.files(__package__).joinpath(
|
|
||||||
"dovecot/push_notification.lua"
|
|
||||||
),
|
|
||||||
dest="/etc/dovecot/push_notification.lua",
|
|
||||||
user="root",
|
|
||||||
group="root",
|
|
||||||
mode="644",
|
|
||||||
)
|
|
||||||
need_restart |= lua_push_notification_script.changed
|
|
||||||
|
|
||||||
sieve_script = files.put(
|
|
||||||
src=importlib.resources.files(__package__).joinpath(
|
|
||||||
"dovecot/default.sieve"
|
|
||||||
),
|
|
||||||
dest="/etc/dovecot/default.sieve",
|
|
||||||
user="root",
|
|
||||||
group="root",
|
|
||||||
mode="644",
|
|
||||||
)
|
|
||||||
need_restart |= sieve_script.changed
|
|
||||||
|
|
||||||
files.template(
|
files.template(
|
||||||
src=importlib.resources.files(__package__).joinpath("dovecot/expunge.cron.j2"),
|
src=importlib.resources.files(__package__).joinpath("dovecot/expunge.cron.j2"),
|
||||||
@@ -439,18 +359,12 @@ def _configure_nginx(domain: str, debug: bool = False) -> bool:
|
|||||||
return need_restart
|
return need_restart
|
||||||
|
|
||||||
|
|
||||||
def _remove_rspamd() -> None:
|
|
||||||
"""Remove rspamd"""
|
|
||||||
apt.packages(name="Remove rspamd", packages="rspamd", present=False)
|
|
||||||
|
|
||||||
|
|
||||||
def check_config(config):
|
def check_config(config):
|
||||||
mail_domain = config.mail_domain
|
mail_domain = config.mail_domain
|
||||||
if mail_domain != "testrun.org" and not mail_domain.endswith(".testrun.org"):
|
if mail_domain != "testrun.org" and not mail_domain.endswith(".testrun.org"):
|
||||||
blocked_words = "merlinux schmieder testrun.org".split()
|
blocked_words = "merlinux schmieder testrun.org".split()
|
||||||
for key in config.__dict__:
|
for value in config.__dict__.values():
|
||||||
value = config.__dict__[key]
|
if any(x in str(value) for x in blocked_words):
|
||||||
if key.startswith("privacy") and any(x in str(value) for x in blocked_words):
|
|
||||||
raise ValueError(
|
raise ValueError(
|
||||||
f"please set your own privacy contacts/addresses in {config._inipath}"
|
f"please set your own privacy contacts/addresses in {config._inipath}"
|
||||||
)
|
)
|
||||||
@@ -472,6 +386,14 @@ def deploy_chatmail(config_path: Path) -> None:
|
|||||||
server.group(name="Create vmail group", group="vmail", system=True)
|
server.group(name="Create vmail group", group="vmail", system=True)
|
||||||
server.user(name="Create vmail user", user="vmail", group="vmail", system=True)
|
server.user(name="Create vmail user", user="vmail", group="vmail", system=True)
|
||||||
|
|
||||||
|
server.group(name="Create opendkim group", group="opendkim", system=True)
|
||||||
|
server.user(
|
||||||
|
name="Add postfix user to opendkim group for socket access",
|
||||||
|
user="postfix",
|
||||||
|
groups=["opendkim"],
|
||||||
|
system=True,
|
||||||
|
)
|
||||||
|
|
||||||
# Run local DNS resolver `unbound`.
|
# Run local DNS resolver `unbound`.
|
||||||
# `resolvconf` takes care of setting up /etc/resolv.conf
|
# `resolvconf` takes care of setting up /etc/resolv.conf
|
||||||
# to use 127.0.0.1 as the resolver.
|
# to use 127.0.0.1 as the resolver.
|
||||||
@@ -481,10 +403,7 @@ def deploy_chatmail(config_path: Path) -> None:
|
|||||||
)
|
)
|
||||||
server.shell(
|
server.shell(
|
||||||
name="Generate root keys for validating DNSSEC",
|
name="Generate root keys for validating DNSSEC",
|
||||||
commands=[
|
commands=["unbound-anchor -a /var/lib/unbound/root.key || true"],
|
||||||
"unbound-anchor -a /var/lib/unbound/root.key || true",
|
|
||||||
"systemctl reset-failed unbound.service",
|
|
||||||
],
|
|
||||||
)
|
)
|
||||||
systemd.service(
|
systemd.service(
|
||||||
name="Start and enable unbound",
|
name="Start and enable unbound",
|
||||||
@@ -494,10 +413,7 @@ def deploy_chatmail(config_path: Path) -> None:
|
|||||||
)
|
)
|
||||||
|
|
||||||
# Deploy acmetool to have TLS certificates.
|
# Deploy acmetool to have TLS certificates.
|
||||||
deploy_acmetool(
|
deploy_acmetool(nginx_hook=True, domains=[mail_domain, f"mta-sts.{mail_domain}"])
|
||||||
nginx_hook=True,
|
|
||||||
domains=[mail_domain, f"mta-sts.{mail_domain}", f"www.{mail_domain}"],
|
|
||||||
)
|
|
||||||
|
|
||||||
apt.packages(
|
apt.packages(
|
||||||
name="Install Postfix",
|
name="Install Postfix",
|
||||||
@@ -506,7 +422,15 @@ def deploy_chatmail(config_path: Path) -> None:
|
|||||||
|
|
||||||
apt.packages(
|
apt.packages(
|
||||||
name="Install Dovecot",
|
name="Install Dovecot",
|
||||||
packages=["dovecot-imapd", "dovecot-lmtpd", "dovecot-sieve"],
|
packages=["dovecot-imapd", "dovecot-lmtpd"],
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install OpenDKIM",
|
||||||
|
packages=[
|
||||||
|
"opendkim",
|
||||||
|
"opendkim-tools",
|
||||||
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
apt.packages(
|
apt.packages(
|
||||||
@@ -530,12 +454,10 @@ def deploy_chatmail(config_path: Path) -> None:
|
|||||||
debug = False
|
debug = False
|
||||||
dovecot_need_restart = _configure_dovecot(config, debug=debug)
|
dovecot_need_restart = _configure_dovecot(config, debug=debug)
|
||||||
postfix_need_restart = _configure_postfix(config, debug=debug)
|
postfix_need_restart = _configure_postfix(config, debug=debug)
|
||||||
|
opendkim_need_restart = _configure_opendkim(mail_domain)
|
||||||
mta_sts_need_restart = _install_mta_sts_daemon()
|
mta_sts_need_restart = _install_mta_sts_daemon()
|
||||||
nginx_need_restart = _configure_nginx(mail_domain)
|
nginx_need_restart = _configure_nginx(mail_domain)
|
||||||
|
|
||||||
_remove_rspamd()
|
|
||||||
opendkim_need_restart = _configure_opendkim(mail_domain, "opendkim")
|
|
||||||
|
|
||||||
systemd.service(
|
systemd.service(
|
||||||
name="Start and enable OpenDKIM",
|
name="Start and enable OpenDKIM",
|
||||||
service="opendkim.service",
|
service="opendkim.service",
|
||||||
|
|||||||
@@ -7,9 +7,8 @@ _imap._tcp.{chatmail_domain}. SRV 0 1 143 {chatmail_domain}.
|
|||||||
_imaps._tcp.{chatmail_domain}. SRV 0 1 993 {chatmail_domain}.
|
_imaps._tcp.{chatmail_domain}. SRV 0 1 993 {chatmail_domain}.
|
||||||
{chatmail_domain}. CAA 128 issue "letsencrypt.org;accounturi={acme_account_url}"
|
{chatmail_domain}. CAA 128 issue "letsencrypt.org;accounturi={acme_account_url}"
|
||||||
{chatmail_domain}. TXT "v=spf1 a:{chatmail_domain} -all"
|
{chatmail_domain}. TXT "v=spf1 a:{chatmail_domain} -all"
|
||||||
_dmarc.{chatmail_domain}. TXT "v=DMARC1;p=reject;adkim=s;aspf=s"
|
_dmarc.{chatmail_domain}. TXT "v=DMARC1;p=reject;rua=mailto:{email};ruf=mailto:{email};fo=1;adkim=r;aspf=r"
|
||||||
_mta-sts.{chatmail_domain}. TXT "v=STSv1; id={sts_id}"
|
_mta-sts.{chatmail_domain}. TXT "v=STSv1; id={sts_id}"
|
||||||
mta-sts.{chatmail_domain}. CNAME {chatmail_domain}.
|
mta-sts.{chatmail_domain}. CNAME {chatmail_domain}.
|
||||||
www.{chatmail_domain}. CNAME {chatmail_domain}.
|
_smtp._tls.{chatmail_domain}. TXT "v=TLSRPTv1;rua=mailto:{email}"
|
||||||
{dkim_entry}
|
{dkim_entry}
|
||||||
_adsp._domainkey.{chatmail_domain}. TXT "dkim=discardable"
|
|
||||||
|
|||||||
@@ -2,7 +2,6 @@
|
|||||||
Provides the `cmdeploy` entry point function,
|
Provides the `cmdeploy` entry point function,
|
||||||
along with command line option and subcommand parsing.
|
along with command line option and subcommand parsing.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
import argparse
|
import argparse
|
||||||
import shutil
|
import shutil
|
||||||
import subprocess
|
import subprocess
|
||||||
@@ -83,8 +82,7 @@ def dns_cmd_options(parser):
|
|||||||
|
|
||||||
def dns_cmd(args, out):
|
def dns_cmd(args, out):
|
||||||
"""Generate dns zone file."""
|
"""Generate dns zone file."""
|
||||||
exit_code = show_dns(args, out)
|
show_dns(args, out)
|
||||||
exit(exit_code)
|
|
||||||
|
|
||||||
|
|
||||||
def status_cmd(args, out):
|
def status_cmd(args, out):
|
||||||
|
|||||||
@@ -4,8 +4,7 @@ import requests
|
|||||||
import importlib
|
import importlib
|
||||||
import subprocess
|
import subprocess
|
||||||
import datetime
|
import datetime
|
||||||
|
from ipaddress import ip_address
|
||||||
from typing import Optional
|
|
||||||
|
|
||||||
|
|
||||||
class DNS:
|
class DNS:
|
||||||
@@ -36,10 +35,11 @@ class DNS:
|
|||||||
cmd = "ip a | grep inet6 | grep 'scope global' | sed -e 's#/64 scope global##' | sed -e 's#inet6##'"
|
cmd = "ip a | grep inet6 | grep 'scope global' | sed -e 's#/64 scope global##' | sed -e 's#inet6##'"
|
||||||
return self.shell(cmd).strip()
|
return self.shell(cmd).strip()
|
||||||
|
|
||||||
def get(self, typ: str, domain: str) -> str:
|
def get(self, typ: str, domain: str) -> str | None:
|
||||||
"""Get a DNS entry or empty string if there is none."""
|
"""Get a DNS entry"""
|
||||||
dig_result = self.shell(f"dig -r -q {domain} -t {typ} +short")
|
dig_result = self.shell(f"dig -r -q {domain} -t {typ} +short")
|
||||||
line = dig_result.partition("\n")[0]
|
line = dig_result.partition("\n")[0]
|
||||||
|
if line:
|
||||||
return line
|
return line
|
||||||
|
|
||||||
def check_ptr_record(self, ip: str, mail_domain) -> bool:
|
def check_ptr_record(self, ip: str, mail_domain) -> bool:
|
||||||
@@ -48,32 +48,28 @@ class DNS:
|
|||||||
return result == f"{mail_domain}."
|
return result == f"{mail_domain}."
|
||||||
|
|
||||||
|
|
||||||
def show_dns(args, out) -> int:
|
def show_dns(args, out):
|
||||||
"""Check existing DNS records, optionally write them to zone file, return exit code 0 or 1."""
|
|
||||||
template = importlib.resources.files(__package__).joinpath("chatmail.zone.f")
|
template = importlib.resources.files(__package__).joinpath("chatmail.zone.f")
|
||||||
mail_domain = args.config.mail_domain
|
mail_domain = args.config.mail_domain
|
||||||
ssh = f"ssh root@{mail_domain}"
|
ssh = f"ssh root@{mail_domain}"
|
||||||
dns = DNS(out, mail_domain)
|
dns = DNS(out, mail_domain)
|
||||||
|
|
||||||
|
def read_dkim_entries(entry):
|
||||||
|
lines = []
|
||||||
|
for line in entry.split("\n"):
|
||||||
|
if line.startswith(";") or not line.strip():
|
||||||
|
continue
|
||||||
|
line = line.replace("\t", " ")
|
||||||
|
lines.append(line)
|
||||||
|
return "\n".join(lines)
|
||||||
|
|
||||||
print("Checking your DKIM keys and DNS entries...")
|
print("Checking your DKIM keys and DNS entries...")
|
||||||
try:
|
try:
|
||||||
acme_account_url = out.shell_output(f"{ssh} -- acmetool account-url")
|
acme_account_url = out.shell_output(f"{ssh} -- acmetool account-url")
|
||||||
except subprocess.CalledProcessError:
|
except subprocess.CalledProcessError:
|
||||||
print("Please run `cmdeploy run` first.")
|
print("Please run `cmdeploy run` first.")
|
||||||
return 1
|
return
|
||||||
|
dkim_entry = read_dkim_entries(out.shell_output(f"{ssh} -- opendkim-genzone -F"))
|
||||||
dkim_selector = "opendkim"
|
|
||||||
dkim_pubkey = out.shell_output(
|
|
||||||
ssh + f" -- openssl rsa -in /etc/dkimkeys/{dkim_selector}.private"
|
|
||||||
" -pubout 2>/dev/null | awk '/-/{next}{printf(\"%s\",$0)}'"
|
|
||||||
)
|
|
||||||
dkim_entry_value = f"v=DKIM1;k=rsa;p={dkim_pubkey};s=email;t=s"
|
|
||||||
dkim_entry_str = ""
|
|
||||||
while len(dkim_entry_value) >= 255:
|
|
||||||
dkim_entry_str += '"' + dkim_entry_value[:255] + '" '
|
|
||||||
dkim_entry_value = dkim_entry_value[255:]
|
|
||||||
dkim_entry_str += '"' + dkim_entry_value + '"'
|
|
||||||
dkim_entry = f"{dkim_selector}._domainkey.{mail_domain}. TXT {dkim_entry_str}"
|
|
||||||
|
|
||||||
ipv6 = dns.get_ipv6()
|
ipv6 = dns.get_ipv6()
|
||||||
reverse_ipv6 = dns.check_ptr_record(ipv6, mail_domain)
|
reverse_ipv6 = dns.check_ptr_record(ipv6, mail_domain)
|
||||||
@@ -86,6 +82,7 @@ def show_dns(args, out) -> int:
|
|||||||
f.read()
|
f.read()
|
||||||
.format(
|
.format(
|
||||||
acme_account_url=acme_account_url,
|
acme_account_url=acme_account_url,
|
||||||
|
email=f"root@{args.config.mail_domain}",
|
||||||
sts_id=datetime.datetime.now().strftime("%Y%m%d%H%M"),
|
sts_id=datetime.datetime.now().strftime("%Y%m%d%H%M"),
|
||||||
chatmail_domain=args.config.mail_domain,
|
chatmail_domain=args.config.mail_domain,
|
||||||
dkim_entry=dkim_entry,
|
dkim_entry=dkim_entry,
|
||||||
@@ -98,12 +95,14 @@ def show_dns(args, out) -> int:
|
|||||||
with open(args.zonefile, "w+") as zf:
|
with open(args.zonefile, "w+") as zf:
|
||||||
zf.write(zonefile)
|
zf.write(zonefile)
|
||||||
print(f"DNS records successfully written to: {args.zonefile}")
|
print(f"DNS records successfully written to: {args.zonefile}")
|
||||||
return 0
|
return
|
||||||
except TypeError:
|
except TypeError:
|
||||||
pass
|
pass
|
||||||
|
started_dkim_parsing = False
|
||||||
for line in zonefile.splitlines():
|
for line in zonefile.splitlines():
|
||||||
line = line.format(
|
line = line.format(
|
||||||
acme_account_url=acme_account_url,
|
acme_account_url=acme_account_url,
|
||||||
|
email=f"root@{args.config.mail_domain}",
|
||||||
sts_id=datetime.datetime.now().strftime("%Y%m%d%H%M"),
|
sts_id=datetime.datetime.now().strftime("%Y%m%d%H%M"),
|
||||||
chatmail_domain=args.config.mail_domain,
|
chatmail_domain=args.config.mail_domain,
|
||||||
dkim_entry=dkim_entry,
|
dkim_entry=dkim_entry,
|
||||||
@@ -134,18 +133,22 @@ def show_dns(args, out) -> int:
|
|||||||
if current:
|
if current:
|
||||||
if current.split("id=")[0] == value.split("id=")[0]:
|
if current.split("id=")[0] == value.split("id=")[0]:
|
||||||
continue
|
continue
|
||||||
|
if current != value:
|
||||||
# TXT records longer than 255 bytes
|
|
||||||
# are split into multiple <character-string>s.
|
|
||||||
# This typically happens with DKIM record
|
|
||||||
# which contains long RSA key.
|
|
||||||
#
|
|
||||||
# Removing `" "` before comparison
|
|
||||||
# to get back a single string.
|
|
||||||
if current.replace('" "', "") != value.replace('" "', ""):
|
|
||||||
to_print.append(line)
|
to_print.append(line)
|
||||||
|
if " IN TXT ( " in line:
|
||||||
|
started_dkim_parsing = True
|
||||||
|
dkim_lines = [line]
|
||||||
|
if started_dkim_parsing and line.startswith('"'):
|
||||||
|
dkim_lines.append(" " + line)
|
||||||
|
domain, data = "\n".join(dkim_lines).split(" IN TXT ")
|
||||||
|
current = dns.get("TXT", domain.strip()[:-1])
|
||||||
|
if current:
|
||||||
|
current = "( %s )" % (current.replace('" "', '"\n "'))
|
||||||
|
if current.replace(";", "\\;") != data:
|
||||||
|
to_print.append(dkim_entry)
|
||||||
|
else:
|
||||||
|
to_print.append(dkim_entry)
|
||||||
|
|
||||||
exit_code = 0
|
|
||||||
if to_print:
|
if to_print:
|
||||||
to_print.insert(
|
to_print.insert(
|
||||||
0, "You should configure the following DNS entries at your provider:\n"
|
0, "You should configure the following DNS entries at your provider:\n"
|
||||||
@@ -154,7 +157,6 @@ def show_dns(args, out) -> int:
|
|||||||
"\nIf you already configured the DNS entries, wait a bit until the DNS entries propagate to the Internet."
|
"\nIf you already configured the DNS entries, wait a bit until the DNS entries propagate to the Internet."
|
||||||
)
|
)
|
||||||
print("\n".join(to_print))
|
print("\n".join(to_print))
|
||||||
exit_code = 1
|
|
||||||
else:
|
else:
|
||||||
out.green("Great! All your DNS entries are correct.")
|
out.green("Great! All your DNS entries are correct.")
|
||||||
|
|
||||||
@@ -174,8 +176,6 @@ def show_dns(args, out) -> int:
|
|||||||
print(
|
print(
|
||||||
"You can do so at your hosting provider (maybe this isn't your DNS provider)."
|
"You can do so at your hosting provider (maybe this isn't your DNS provider)."
|
||||||
)
|
)
|
||||||
exit_code = 1
|
|
||||||
return exit_code
|
|
||||||
|
|
||||||
|
|
||||||
def check_necessary_dns(out, mail_domain):
|
def check_necessary_dns(out, mail_domain):
|
||||||
@@ -184,14 +184,14 @@ def check_necessary_dns(out, mail_domain):
|
|||||||
ipv4 = dns.get("A", mail_domain)
|
ipv4 = dns.get("A", mail_domain)
|
||||||
ipv6 = dns.get("AAAA", mail_domain)
|
ipv6 = dns.get("AAAA", mail_domain)
|
||||||
mta_entry = dns.get("CNAME", "mta-sts." + mail_domain)
|
mta_entry = dns.get("CNAME", "mta-sts." + mail_domain)
|
||||||
www_entry = dns.get("CNAME", "www." + mail_domain)
|
mta_ip = dns.get("A", mta_entry)
|
||||||
|
if not mta_ip:
|
||||||
|
mta_ip = dns.get("AAAA", mta_entry)
|
||||||
to_print = []
|
to_print = []
|
||||||
if not (ipv4 or ipv6):
|
if not (ipv4 or ipv6):
|
||||||
to_print.append(f"\t{mail_domain}.\t\t\tA<your server's IPv4 address>")
|
to_print.append(f"\t{mail_domain}.\t\t\tA<your server's IPv4 address>")
|
||||||
if mta_entry != mail_domain + ".":
|
if not mta_ip or not (mta_ip == ipv4 or mta_ip == ipv6):
|
||||||
to_print.append(f"\tmta-sts.{mail_domain}.\tCNAME\t{mail_domain}.")
|
to_print.append(f"\tmta-sts.{mail_domain}.\tCNAME\t{mail_domain}.")
|
||||||
if www_entry != mail_domain + ".":
|
|
||||||
to_print.append(f"\twww.{mail_domain}.\tCNAME\t{mail_domain}.")
|
|
||||||
if to_print:
|
if to_print:
|
||||||
to_print.insert(
|
to_print.insert(
|
||||||
0,
|
0,
|
||||||
|
|||||||
@@ -1,5 +0,0 @@
|
|||||||
require ["imap4flags"];
|
|
||||||
|
|
||||||
if header :is ["Auto-Submitted"] ["auto-replied", "auto-generated"] {
|
|
||||||
addflag "$Auto";
|
|
||||||
}
|
|
||||||
@@ -13,15 +13,13 @@ auth_cache_size = 100M
|
|||||||
mail_debug = yes
|
mail_debug = yes
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
mail_server_admin = mailto:root@{{ config.mail_domain }}
|
|
||||||
mail_server_comment = Chatmail server
|
|
||||||
|
|
||||||
mail_plugins = quota
|
mail_plugins = quota
|
||||||
|
|
||||||
# these are the capabilities Delta Chat cares about actually
|
# these are the capabilities Delta Chat cares about actually
|
||||||
# so let's keep the network overhead per login small
|
# so let's keep the network overhead per login small
|
||||||
# https://github.com/deltachat/deltachat-core-rust/blob/master/src/imap/capabilities.rs
|
# https://github.com/deltachat/deltachat-core-rust/blob/master/src/imap/capabilities.rs
|
||||||
imap_capability = IMAP4rev1 IDLE MOVE QUOTA CONDSTORE NOTIFY METADATA XDELTAPUSH
|
imap_capability = IMAP4rev1 IDLE MOVE QUOTA CONDSTORE NOTIFY
|
||||||
|
|
||||||
|
|
||||||
# Authentication for system users.
|
# Authentication for system users.
|
||||||
@@ -71,32 +69,14 @@ mail_privileged_group = vmail
|
|||||||
## Mail processes
|
## Mail processes
|
||||||
##
|
##
|
||||||
|
|
||||||
# Pass all IMAP METADATA requests to the server implementing Dovecot's dict protocol.
|
|
||||||
mail_attribute_dict = proxy:/run/dovecot/metadata.socket:metadata
|
|
||||||
|
|
||||||
# Enable IMAP COMPRESS (RFC 4978).
|
# Enable IMAP COMPRESS (RFC 4978).
|
||||||
# <https://datatracker.ietf.org/doc/html/rfc4978.html>
|
# <https://datatracker.ietf.org/doc/html/rfc4978.html>
|
||||||
protocol imap {
|
protocol imap {
|
||||||
mail_plugins = $mail_plugins imap_zlib imap_quota
|
mail_plugins = $mail_plugins imap_zlib imap_quota
|
||||||
imap_metadata = yes
|
|
||||||
}
|
}
|
||||||
|
|
||||||
protocol lmtp {
|
protocol lmtp {
|
||||||
# quota plugin documentation:
|
mail_plugins = $mail_plugins quota
|
||||||
# <https://doc.dovecot.org/configuration_manual/quota_plugin/>
|
|
||||||
#
|
|
||||||
# notify plugin is a dependency of push_notification plugin:
|
|
||||||
# <https://doc.dovecot.org/settings/plugin/notify-plugin/>
|
|
||||||
#
|
|
||||||
# push_notification plugin documentation:
|
|
||||||
# <https://doc.dovecot.org/configuration_manual/push_notification/>
|
|
||||||
#
|
|
||||||
# mail_lua and push_notification_lua are needed for Lua push notification handler.
|
|
||||||
# <https://doc.dovecot.org/configuration_manual/push_notification/#configuration>
|
|
||||||
#
|
|
||||||
# Sieve to mark messages that should not be notified as \Seen
|
|
||||||
# <https://doc.dovecot.org/configuration_manual/sieve/configuration/>
|
|
||||||
mail_plugins = $mail_plugins quota mail_lua notify push_notification push_notification_lua sieve
|
|
||||||
}
|
}
|
||||||
|
|
||||||
plugin {
|
plugin {
|
||||||
@@ -112,15 +92,7 @@ plugin {
|
|||||||
# quota_over_flag_value = TRUE
|
# quota_over_flag_value = TRUE
|
||||||
}
|
}
|
||||||
|
|
||||||
# push_notification configuration
|
|
||||||
plugin {
|
|
||||||
# <https://doc.dovecot.org/configuration_manual/push_notification/#lua-lua>
|
|
||||||
push_notification_driver = lua:file=/etc/dovecot/push_notification.lua
|
|
||||||
}
|
|
||||||
|
|
||||||
plugin {
|
|
||||||
sieve_default = file:/etc/dovecot/default.sieve
|
|
||||||
}
|
|
||||||
|
|
||||||
service lmtp {
|
service lmtp {
|
||||||
user=vmail
|
user=vmail
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
# delete all mails after {{ config.delete_mails_after }} days, in the Inbox
|
# delete all mails after {{ config.delete_mails_after }} days, in the Inbox
|
||||||
2 0 * * * vmail find /home/vmail/mail/{{ config.mail_domain }} -path '*/cur/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
2 0 * * * dovecot find /home/vmail/mail/{{ config.mail_domain }}/*/cur -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
# or in any IMAP subfolder
|
# or in any IMAP subfolder
|
||||||
2 0 * * * vmail find /home/vmail/mail/{{ config.mail_domain }} -path '*/.*/cur/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
2 0 * * * dovecot find /home/vmail/mail/{{ config.mail_domain }}/*/.*/cur -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
# even if they are unseen
|
# even if they are unseen
|
||||||
2 0 * * * vmail find /home/vmail/mail/{{ config.mail_domain }} -path '*/new/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
2 0 * * * dovecot find /home/vmail/mail/{{ config.mail_domain }}/*/new -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
2 0 * * * vmail find /home/vmail/mail/{{ config.mail_domain }} -path '*/.*/new/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
2 0 * * * dovecot find /home/vmail/mail/{{ config.mail_domain }}/*/.*/new -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
# or only temporary (but then they shouldn't be around after {{ config.delete_mails_after }} days anyway).
|
# or only temporary (but then they shouldn't be around after {{ config.delete_mails_after }} days anyway).
|
||||||
2 0 * * * vmail find /home/vmail/mail/{{ config.mail_domain }} -path '*/tmp/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
2 0 * * * dovecot find /home/vmail/mail/{{ config.mail_domain }}/*/tmp -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
2 0 * * * vmail find /home/vmail/mail/{{ config.mail_domain }} -path '*/.*/tmp/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
2 0 * * * dovecot find /home/vmail/mail/{{ config.mail_domain }}/*/.*/tmp -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
|||||||
@@ -1,32 +0,0 @@
|
|||||||
function dovecot_lua_notify_begin_txn(user)
|
|
||||||
return user
|
|
||||||
end
|
|
||||||
|
|
||||||
function contains(v, needle)
|
|
||||||
for _, keyword in ipairs(v) do
|
|
||||||
if keyword == needle then
|
|
||||||
return true
|
|
||||||
end
|
|
||||||
end
|
|
||||||
return false
|
|
||||||
end
|
|
||||||
|
|
||||||
function dovecot_lua_notify_event_message_new(user, event)
|
|
||||||
local mbox = user:mailbox(event.mailbox)
|
|
||||||
mbox:sync()
|
|
||||||
|
|
||||||
if user.username ~= event.from_address then
|
|
||||||
-- Incoming message
|
|
||||||
if not contains(event.keywords, "$Auto") then
|
|
||||||
-- Not an Auto-Submitted message, notifying.
|
|
||||||
|
|
||||||
-- Notify METADATA server about new message.
|
|
||||||
mbox:metadata_set("/private/messagenew", "")
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
mbox:free()
|
|
||||||
end
|
|
||||||
|
|
||||||
function dovecot_lua_notify_end_txn(ctx, success)
|
|
||||||
end
|
|
||||||
@@ -6,7 +6,7 @@ import io
|
|||||||
|
|
||||||
|
|
||||||
def gen_qr_png_data(maildomain):
|
def gen_qr_png_data(maildomain):
|
||||||
url = f"DCACCOUNT:https://{maildomain}/new"
|
url = f"DCACCOUNT:https://{maildomain}/cgi-bin/newemail.py"
|
||||||
image = gen_qr(maildomain, url)
|
image = gen_qr(maildomain, url)
|
||||||
temp = io.BytesIO()
|
temp = io.BytesIO()
|
||||||
image.save(temp, format="png")
|
image.save(temp, format="png")
|
||||||
|
|||||||
@@ -45,40 +45,7 @@ http {
|
|||||||
default_type text/plain;
|
default_type text/plain;
|
||||||
}
|
}
|
||||||
|
|
||||||
location /new {
|
# add cgi-bin support
|
||||||
if ($request_method = GET) {
|
include /usr/share/doc/fcgiwrap/examples/nginx.conf;
|
||||||
# Redirect to Delta Chat,
|
|
||||||
# which will in turn do a POST request.
|
|
||||||
return 301 dcaccount:https://{{ config.domain_name }}/new;
|
|
||||||
}
|
|
||||||
|
|
||||||
fastcgi_pass unix:/run/fcgiwrap.socket;
|
|
||||||
include /etc/nginx/fastcgi_params;
|
|
||||||
fastcgi_param SCRIPT_FILENAME /usr/lib/cgi-bin/newemail.py;
|
|
||||||
}
|
|
||||||
|
|
||||||
# Old URL for compatibility with e.g. printed QR codes.
|
|
||||||
#
|
|
||||||
# Copy-paste instead of redirect to /new
|
|
||||||
# because Delta Chat core does not follow redirects.
|
|
||||||
#
|
|
||||||
# Redirects are only for browsers.
|
|
||||||
location /cgi-bin/newemail.py {
|
|
||||||
if ($request_method = GET) {
|
|
||||||
return 301 dcaccount:https://{{ config.domain_name }}/new;
|
|
||||||
}
|
|
||||||
|
|
||||||
fastcgi_pass unix:/run/fcgiwrap.socket;
|
|
||||||
include /etc/nginx/fastcgi_params;
|
|
||||||
fastcgi_param SCRIPT_FILENAME /usr/lib/cgi-bin/newemail.py;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Redirect www. to non-www
|
|
||||||
server {
|
|
||||||
listen 443 ssl;
|
|
||||||
listen [::]:443 ssl;
|
|
||||||
server_name www.{{ config.domain_name }};
|
|
||||||
return 301 $scheme://{{ config.domain_name }}$request_uri;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
{{ config.opendkim_selector }}._domainkey.{{ config.domain_name }} {{ config.domain_name }}:{{ config.opendkim_selector }}:/etc/dkimkeys/{{ config.opendkim_selector }}.private
|
dkim._domainkey.{{ config.domain_name }} {{ config.domain_name }}:{{ config.opendkim_selector }}:/etc/dkimkeys/dkim.private
|
||||||
|
|||||||
@@ -1,28 +0,0 @@
|
|||||||
if odkim.internal_ip(ctx) == 1 then
|
|
||||||
-- Outgoing message will be signed,
|
|
||||||
-- no need to look for signatures.
|
|
||||||
return nil
|
|
||||||
end
|
|
||||||
|
|
||||||
nsigs = odkim.get_sigcount(ctx)
|
|
||||||
if nsigs == nil then
|
|
||||||
return nil
|
|
||||||
end
|
|
||||||
|
|
||||||
for i = 1, nsigs do
|
|
||||||
sig = odkim.get_sighandle(ctx, i - 1)
|
|
||||||
sigres = odkim.sig_result(sig)
|
|
||||||
|
|
||||||
-- All signatures that do not correspond to From:
|
|
||||||
-- were ignored in screen.lua and return sigres -1.
|
|
||||||
--
|
|
||||||
-- Any valid signature that was not ignored like this
|
|
||||||
-- means the message is acceptable.
|
|
||||||
if sigres == 0 then
|
|
||||||
return nil
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
odkim.set_reply(ctx, "554", "5.7.1", "No valid DKIM signature found")
|
|
||||||
odkim.set_result(ctx, SMFIS_REJECT)
|
|
||||||
return nil
|
|
||||||
@@ -8,12 +8,10 @@ SyslogSuccess yes
|
|||||||
# oversigned, because it is often the identity key used by reputation systems
|
# oversigned, because it is often the identity key used by reputation systems
|
||||||
# and thus somewhat security sensitive.
|
# and thus somewhat security sensitive.
|
||||||
Canonicalization relaxed/simple
|
Canonicalization relaxed/simple
|
||||||
|
#Mode sv
|
||||||
|
#SubDomains no
|
||||||
OversignHeaders From
|
OversignHeaders From
|
||||||
|
|
||||||
On-BadSignature reject
|
|
||||||
On-KeyNotFound reject
|
|
||||||
On-NoSignature reject
|
|
||||||
|
|
||||||
# Signing domain, selector, and key (required). For example, perform signing
|
# Signing domain, selector, and key (required). For example, perform signing
|
||||||
# for domain "example.com" with selector "2020" (2020._domainkey.example.com),
|
# for domain "example.com" with selector "2020" (2020._domainkey.example.com),
|
||||||
# using the private key stored in /etc/dkimkeys/example.private. More granular
|
# using the private key stored in /etc/dkimkeys/example.private. More granular
|
||||||
@@ -24,15 +22,6 @@ KeyFile /etc/dkimkeys/{{ config.opendkim_selector }}.private
|
|||||||
KeyTable /etc/dkimkeys/KeyTable
|
KeyTable /etc/dkimkeys/KeyTable
|
||||||
SigningTable refile:/etc/dkimkeys/SigningTable
|
SigningTable refile:/etc/dkimkeys/SigningTable
|
||||||
|
|
||||||
# Sign Autocrypt header in addition to the default specified in RFC 6376.
|
|
||||||
SignHeaders *,+autocrypt
|
|
||||||
|
|
||||||
# Script to ignore signatures that do not correspond to the From: domain.
|
|
||||||
ScreenPolicyScript /etc/opendkim/screen.lua
|
|
||||||
|
|
||||||
# Script to reject mails without a valid DKIM signature.
|
|
||||||
FinalPolicyScript /etc/opendkim/final.lua
|
|
||||||
|
|
||||||
# In Debian, opendkim runs as user "opendkim". A umask of 007 is required when
|
# In Debian, opendkim runs as user "opendkim". A umask of 007 is required when
|
||||||
# using a local socket with MTAs that access the socket as a non-privileged
|
# using a local socket with MTAs that access the socket as a non-privileged
|
||||||
# user (for example, Postfix). You may need to add user "postfix" to group
|
# user (for example, Postfix). You may need to add user "postfix" to group
|
||||||
@@ -40,10 +29,22 @@ FinalPolicyScript /etc/opendkim/final.lua
|
|||||||
UserID opendkim
|
UserID opendkim
|
||||||
UMask 007
|
UMask 007
|
||||||
|
|
||||||
|
# Socket for the MTA connection (required). If the MTA is inside a chroot jail,
|
||||||
|
# it must be ensured that the socket is accessible. In Debian, Postfix runs in
|
||||||
|
# a chroot in /var/spool/postfix, therefore a Unix socket would have to be
|
||||||
|
# configured as shown on the last line below.
|
||||||
|
#Socket local:/run/opendkim/opendkim.sock
|
||||||
|
#Socket inet:8891@localhost
|
||||||
|
#Socket inet:8891
|
||||||
Socket local:/var/spool/postfix/opendkim/opendkim.sock
|
Socket local:/var/spool/postfix/opendkim/opendkim.sock
|
||||||
|
|
||||||
PidFile /run/opendkim/opendkim.pid
|
PidFile /run/opendkim/opendkim.pid
|
||||||
|
|
||||||
|
# Hosts for which to sign rather than verify, default is 127.0.0.1. See the
|
||||||
|
# OPERATION section of opendkim(8) for more information.
|
||||||
|
#InternalHosts 192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12
|
||||||
|
|
||||||
# The trust anchor enables DNSSEC. In Debian, the trust anchor file is provided
|
# The trust anchor enables DNSSEC. In Debian, the trust anchor file is provided
|
||||||
# by the package dns-root-data.
|
# by the package dns-root-data.
|
||||||
TrustAnchorFile /usr/share/dns/root.key
|
TrustAnchorFile /usr/share/dns/root.key
|
||||||
|
#Nameservers 127.0.0.1
|
||||||
|
|||||||
@@ -1,21 +0,0 @@
|
|||||||
-- Ignore signatures that do not correspond to the From: domain.
|
|
||||||
|
|
||||||
from_domain = odkim.get_fromdomain(ctx)
|
|
||||||
if from_domain == nil then
|
|
||||||
return nil
|
|
||||||
end
|
|
||||||
|
|
||||||
n = odkim.get_sigcount(ctx)
|
|
||||||
if n == nil then
|
|
||||||
return nil
|
|
||||||
end
|
|
||||||
|
|
||||||
for i = 1, n do
|
|
||||||
sig = odkim.get_sighandle(ctx, i - 1)
|
|
||||||
sig_domain = odkim.sig_getdomain(sig)
|
|
||||||
if from_domain ~= sig_domain then
|
|
||||||
odkim.sig_ignore(sig)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
return nil
|
|
||||||
@@ -1 +0,0 @@
|
|||||||
/^(.*)$/ ${1}
|
|
||||||
@@ -23,31 +23,6 @@ smtp_tls_CApath=/etc/ssl/certs
|
|||||||
smtp_tls_security_level=may
|
smtp_tls_security_level=may
|
||||||
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
||||||
smtp_tls_policy_maps = socketmap:inet:127.0.0.1:8461:postfix
|
smtp_tls_policy_maps = socketmap:inet:127.0.0.1:8461:postfix
|
||||||
smtpd_tls_protocols = >=TLSv1.2
|
|
||||||
|
|
||||||
# Disable anonymous cipher suites
|
|
||||||
# and known insecure algorithms.
|
|
||||||
#
|
|
||||||
# Disabling anonymous ciphers
|
|
||||||
# does not generally improve security
|
|
||||||
# because clients that want to verify certificate
|
|
||||||
# will not select them anyway,
|
|
||||||
# but makes cipher suite list shorter and security scanners happy.
|
|
||||||
# See <https://www.postfix.org/TLS_README.html> for discussion.
|
|
||||||
#
|
|
||||||
# Only ancient insecure ciphers should be disabled here
|
|
||||||
# as MTA clients that do not support more secure cipher
|
|
||||||
# likely do not support MTA-STS either and will
|
|
||||||
# otherwise fall back to using plaintext connection.
|
|
||||||
smtpd_tls_exclude_ciphers = aNULL, RC4, MD5, DES
|
|
||||||
|
|
||||||
# Override client's preference order.
|
|
||||||
# <https://www.postfix.org/postconf.5.html#tls_preempt_cipherlist>
|
|
||||||
#
|
|
||||||
# This is mostly to ensure cipher suites with forward secrecy
|
|
||||||
# are preferred over non cipher suites without forward secrecy.
|
|
||||||
# See <https://www.postfix.org/FORWARD_SECRECY_README.html#server_fs>.
|
|
||||||
tls_preempt_cipherlist = yes
|
|
||||||
|
|
||||||
smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination
|
smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination
|
||||||
myhostname = {{ config.mail_domain }}
|
myhostname = {{ config.mail_domain }}
|
||||||
@@ -71,9 +46,5 @@ inet_protocols = all
|
|||||||
virtual_transport = lmtp:unix:private/dovecot-lmtp
|
virtual_transport = lmtp:unix:private/dovecot-lmtp
|
||||||
virtual_mailbox_domains = {{ config.mail_domain }}
|
virtual_mailbox_domains = {{ config.mail_domain }}
|
||||||
|
|
||||||
mua_client_restrictions = permit_sasl_authenticated, reject
|
smtpd_milters = unix:opendkim/opendkim.sock
|
||||||
mua_sender_restrictions = reject_sender_login_mismatch, permit_sasl_authenticated, reject
|
non_smtpd_milters = $smtpd_milters
|
||||||
mua_helo_restrictions = permit_mynetworks, reject_invalid_helo_hostname, reject_non_fqdn_helo_hostname, permit
|
|
||||||
|
|
||||||
# 1:1 map MAIL FROM to SASL login name.
|
|
||||||
smtpd_sender_login_maps = regexp:/etc/postfix/login_map
|
|
||||||
|
|||||||
@@ -11,10 +11,13 @@
|
|||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
{% if debug == true %}
|
{% if debug == true %}
|
||||||
smtp inet n - y - - smtpd -v
|
smtp inet n - y - - smtpd -v
|
||||||
{%- else %}
|
{% else %}
|
||||||
smtp inet n - y - - smtpd
|
smtp inet n - y - - smtpd
|
||||||
{%- endif %}
|
{% endif %}
|
||||||
-o smtpd_milters=unix:opendkim/opendkim.sock
|
#smtp inet n - y - 1 postscreen
|
||||||
|
#smtpd pass - - y - - smtpd
|
||||||
|
#dnsblog unix - - y - 0 dnsblog
|
||||||
|
#tlsproxy unix - - y - 0 tlsproxy
|
||||||
submission inet n - y - - smtpd
|
submission inet n - y - - smtpd
|
||||||
-o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
-o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
@@ -31,7 +34,6 @@ submission inet n - y - - smtpd
|
|||||||
-o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
-o smtpd_client_connection_count_limit=1000
|
-o smtpd_client_connection_count_limit=1000
|
||||||
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
||||||
-o cleanup_service_name=authclean
|
|
||||||
smtps inet n - y - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
-o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
-o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
@@ -48,7 +50,6 @@ smtps inet n - y - - smtpd
|
|||||||
-o smtpd_client_connection_count_limit=1000
|
-o smtpd_client_connection_count_limit=1000
|
||||||
-o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
||||||
-o cleanup_service_name=authclean
|
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
cleanup unix n - y - 0 cleanup
|
cleanup unix n - y - 0 cleanup
|
||||||
@@ -79,14 +80,3 @@ filter unix - n n - - lmtp
|
|||||||
# Local SMTP server for reinjecting filered mail.
|
# Local SMTP server for reinjecting filered mail.
|
||||||
localhost:{{ config.postfix_reinject_port }} inet n - n - 10 smtpd
|
localhost:{{ config.postfix_reinject_port }} inet n - n - 10 smtpd
|
||||||
-o syslog_name=postfix/reinject
|
-o syslog_name=postfix/reinject
|
||||||
-o smtpd_milters=unix:opendkim/opendkim.sock
|
|
||||||
-o cleanup_service_name=authclean
|
|
||||||
|
|
||||||
# Cleanup `Received` headers for authenticated mail
|
|
||||||
# to avoid leaking client IP.
|
|
||||||
#
|
|
||||||
# We do not do this for received mails
|
|
||||||
# as this will break DKIM signatures
|
|
||||||
# if `Received` header is signed.
|
|
||||||
authclean unix n - - - 0 cleanup
|
|
||||||
-o header_checks=regexp:/etc/postfix/submission_header_cleanup
|
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
/^Received:/ IGNORE
|
|
||||||
/^X-Originating-IP:/ IGNORE
|
|
||||||
/^X-Mailer:/ IGNORE
|
|
||||||
/^User-Agent:/ IGNORE
|
|
||||||
@@ -1,7 +1,6 @@
|
|||||||
import pytest
|
import pytest
|
||||||
import threading
|
import threading
|
||||||
import queue
|
import queue
|
||||||
import socket
|
|
||||||
|
|
||||||
from chatmaild.config import read_config
|
from chatmaild.config import read_config
|
||||||
from cmdeploy.cmdeploy import main
|
from cmdeploy.cmdeploy import main
|
||||||
@@ -79,24 +78,3 @@ def test_concurrent_logins_same_account(
|
|||||||
|
|
||||||
for _ in conns:
|
for _ in conns:
|
||||||
assert login_results.get()
|
assert login_results.get()
|
||||||
|
|
||||||
|
|
||||||
def test_no_vrfy(chatmail_config):
|
|
||||||
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
||||||
sock.connect((chatmail_config.mail_domain, 25))
|
|
||||||
banner = sock.recv(1024)
|
|
||||||
print(banner)
|
|
||||||
sock.send(b"VRFY wrongaddress@%s\r\n" % (chatmail_config.mail_domain.encode(),))
|
|
||||||
result = sock.recv(1024)
|
|
||||||
print(result)
|
|
||||||
sock.send(b"VRFY echo@%s\r\n" % (chatmail_config.mail_domain.encode(),))
|
|
||||||
result2 = sock.recv(1024)
|
|
||||||
print(result2)
|
|
||||||
assert result[0:10] == result2[0:10]
|
|
||||||
sock.send(b"VRFY wrongaddress\r\n")
|
|
||||||
result = sock.recv(1024)
|
|
||||||
print(result)
|
|
||||||
sock.send(b"VRFY echo\r\n")
|
|
||||||
result2 = sock.recv(1024)
|
|
||||||
print(result2)
|
|
||||||
assert result[0:10] == result2[0:10] == b"252 2.0.0 "
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ def test_gen_qr_png_data(maildomain):
|
|||||||
|
|
||||||
|
|
||||||
def test_fastcgi_working(maildomain, chatmail_config):
|
def test_fastcgi_working(maildomain, chatmail_config):
|
||||||
url = f"https://{maildomain}/new"
|
url = f"https://{maildomain}/cgi-bin/newemail.py"
|
||||||
print(url)
|
print(url)
|
||||||
res = requests.post(url)
|
res = requests.post(url)
|
||||||
assert maildomain in res.json().get("email")
|
assert maildomain in res.json().get("email")
|
||||||
@@ -18,7 +18,7 @@ def test_fastcgi_working(maildomain, chatmail_config):
|
|||||||
|
|
||||||
def test_newemail_configure(maildomain, rpc):
|
def test_newemail_configure(maildomain, rpc):
|
||||||
"""Test configuring accounts by scanning a QR code works."""
|
"""Test configuring accounts by scanning a QR code works."""
|
||||||
url = f"DCACCOUNT:https://{maildomain}/new"
|
url = f"DCACCOUNT:https://{maildomain}/cgi-bin/newemail.py"
|
||||||
for i in range(3):
|
for i in range(3):
|
||||||
account_id = rpc.add_account()
|
account_id = rpc.add_account()
|
||||||
rpc.set_config_from_qr(account_id, url)
|
rpc.set_config_from_qr(account_id, url)
|
||||||
|
|||||||
@@ -42,28 +42,6 @@ def test_reject_forged_from(cmsetup, maildata, gencreds, lp, forgeaddr):
|
|||||||
assert "500" in str(e.value)
|
assert "500" in str(e.value)
|
||||||
|
|
||||||
|
|
||||||
def test_authenticated_from(cmsetup, maildata):
|
|
||||||
"""Test that envelope FROM must be the same as login."""
|
|
||||||
user1, user2, user3 = cmsetup.gen_users(3)
|
|
||||||
|
|
||||||
msg = maildata("encrypted.eml", from_addr=user2.addr, to_addr=user3.addr)
|
|
||||||
with pytest.raises(smtplib.SMTPException) as e:
|
|
||||||
user1.smtp.sendmail(
|
|
||||||
from_addr=user2.addr, to_addrs=[user3.addr], msg=msg.as_string()
|
|
||||||
)
|
|
||||||
assert e.value.recipients[user3.addr][0] == 553
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("from_addr", ["fake@example.org", "fake@testrun.org"])
|
|
||||||
def test_reject_missing_dkim(cmsetup, maildata, from_addr):
|
|
||||||
"""Test that emails with missing or wrong DMARC, DKIM, and SPF entries are rejected."""
|
|
||||||
recipient = cmsetup.gen_users(1)[0]
|
|
||||||
msg = maildata("plain.eml", from_addr=from_addr, to_addr=recipient.addr).as_string()
|
|
||||||
with smtplib.SMTP(cmsetup.maildomain, 25) as s:
|
|
||||||
with pytest.raises(smtplib.SMTPDataError, match="No valid DKIM signature"):
|
|
||||||
s.sendmail(from_addr=from_addr, to_addrs=recipient.addr, msg=msg)
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.slow
|
@pytest.mark.slow
|
||||||
def test_exceed_rate_limit(cmsetup, gencreds, maildata, chatmail_config):
|
def test_exceed_rate_limit(cmsetup, gencreds, maildata, chatmail_config):
|
||||||
"""Test that the per-account send-mail limit is exceeded."""
|
"""Test that the per-account send-mail limit is exceeded."""
|
||||||
@@ -83,18 +61,3 @@ def test_exceed_rate_limit(cmsetup, gencreds, maildata, chatmail_config):
|
|||||||
assert b"4.7.1: Too much mail from" in outcome[1]
|
assert b"4.7.1: Too much mail from" in outcome[1]
|
||||||
return
|
return
|
||||||
pytest.fail("Rate limit was not exceeded")
|
pytest.fail("Rate limit was not exceeded")
|
||||||
|
|
||||||
|
|
||||||
def test_expunged(remote, chatmail_config):
|
|
||||||
outdated_days = int(chatmail_config.delete_mails_after) + 1
|
|
||||||
find_cmds = [
|
|
||||||
f"find /home/vmail/mail/{chatmail_config.mail_domain} -path '*/cur/*' -mtime +{outdated_days} -type f",
|
|
||||||
f"find /home/vmail/mail/{chatmail_config.mail_domain} -path '*/.*/cur/*' -mtime +{outdated_days} -type f",
|
|
||||||
f"find /home/vmail/mail/{chatmail_config.mail_domain} -path '*/new/*' -mtime +{outdated_days} -type f",
|
|
||||||
f"find /home/vmail/mail/{chatmail_config.mail_domain} -path '*/.*/new/*' -mtime +{outdated_days} -type f",
|
|
||||||
f"find /home/vmail/mail/{chatmail_config.mail_domain} -path '*/tmp/*' -mtime +{outdated_days} -type f",
|
|
||||||
f"find /home/vmail/mail/{chatmail_config.mail_domain} -path '*/.*/tmp/*' -mtime +{outdated_days} -type f",
|
|
||||||
]
|
|
||||||
for cmd in find_cmds:
|
|
||||||
for line in remote.iter_output(cmd):
|
|
||||||
assert not line
|
|
||||||
|
|||||||
@@ -1,10 +1,7 @@
|
|||||||
import time
|
import time
|
||||||
import re
|
import re
|
||||||
import random
|
import random
|
||||||
|
|
||||||
import pytest
|
import pytest
|
||||||
import requests
|
|
||||||
import ipaddress
|
|
||||||
|
|
||||||
|
|
||||||
class TestEndToEndDeltaChat:
|
class TestEndToEndDeltaChat:
|
||||||
@@ -122,29 +119,3 @@ class TestEndToEndDeltaChat:
|
|||||||
for msg in msgs:
|
for msg in msgs:
|
||||||
assert "error" not in m.get_message_info()
|
assert "error" not in m.get_message_info()
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
|
|
||||||
def test_hide_senders_ip_address(cmfactory):
|
|
||||||
public_ip = requests.get("http://icanhazip.com").content.decode().strip()
|
|
||||||
assert ipaddress.ip_address(public_ip)
|
|
||||||
|
|
||||||
user1, user2 = cmfactory.get_online_accounts(2)
|
|
||||||
chat = cmfactory.get_accepted_chat(user1, user2)
|
|
||||||
|
|
||||||
chat.send_text("testing submission header cleanup")
|
|
||||||
user2.wait_next_incoming_message()
|
|
||||||
user2.direct_imap.select_folder("Inbox")
|
|
||||||
msg = user2.direct_imap.get_all_messages()[0]
|
|
||||||
assert public_ip not in msg.obj.as_string()
|
|
||||||
|
|
||||||
|
|
||||||
def test_echobot(cmfactory, chatmail_config, lp):
|
|
||||||
ac = cmfactory.get_online_accounts(1)[0]
|
|
||||||
|
|
||||||
lp.sec(f"Send message to echo@{chatmail_config.mail_domain}")
|
|
||||||
chat = ac.create_chat(f"echo@{chatmail_config.mail_domain}")
|
|
||||||
text = "hi, I hope you text me back"
|
|
||||||
chat.send_text(text)
|
|
||||||
lp.sec("Wait for reply from echobot")
|
|
||||||
reply = ac.wait_next_incoming_message()
|
|
||||||
assert reply.text == text
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -e
|
set -e
|
||||||
python3 -m venv --upgrade-deps venv
|
python3 -m venv venv
|
||||||
|
|
||||||
venv/bin/pip install -e chatmaild
|
venv/bin/pip install -e chatmaild
|
||||||
venv/bin/pip install -e cmdeploy
|
venv/bin/pip install -e cmdeploy
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ Welcome to instant, interoperable and [privacy-preserving](privacy.html) messagi
|
|||||||
|
|
||||||
👉 **Tap** or scan this QR code to get a random `@{{config.mail_domain}}` e-mail address
|
👉 **Tap** or scan this QR code to get a random `@{{config.mail_domain}}` e-mail address
|
||||||
|
|
||||||
<a href="DCACCOUNT:https://{{ config.mail_domain }}/new">
|
<a href="DCACCOUNT:https://{{ config.mail_domain }}/cgi-bin/newemail.py">
|
||||||
<img width=300 style="float: none;" src="qr-chatmail-invite-{{config.mail_domain}}.png" /></a>
|
<img width=300 style="float: none;" src="qr-chatmail-invite-{{config.mail_domain}}.png" /></a>
|
||||||
|
|
||||||
🐣 **Choose** your Avatar and Name
|
🐣 **Choose** your Avatar and Name
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
## More information
|
## More information
|
||||||
|
|
||||||
{{ config.mail_domain }} provides a low-maintenance, resource efficient and
|
`nine.testrun.org` provides a low-maintenance, resource efficient and
|
||||||
interoperable e-mail service for everyone. What's behind a `chatmail` is
|
interoperable e-mail service for everyone. What's behind a `chatmail` is
|
||||||
effectively a normal e-mail address just like any other but optimized
|
effectively a normal e-mail address just like any other but optimized
|
||||||
for the usage in chats, especially DeltaChat.
|
for the usage in chats, especially DeltaChat.
|
||||||
|
|||||||
Reference in New Issue
Block a user