mirror of
https://github.com/chatmail/relay.git
synced 2026-05-10 16:04:37 +00:00
Compare commits
797 Commits
remotelog
...
postfix-lo
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
0d301f9807 | ||
|
|
a5dffdf2e6 | ||
|
|
9c381e1fbf | ||
|
|
3cc9bc3ceb | ||
|
|
2a89be8209 | ||
|
|
c848b61346 | ||
|
|
49787044ff | ||
|
|
04ae0b86fb | ||
|
|
b0434dc927 | ||
|
|
7578c5f1d3 | ||
|
|
5ba99dc782 | ||
|
|
6d898d5431 | ||
|
|
fc3fb93432 | ||
|
|
c4f0146e16 | ||
|
|
194030a456 | ||
|
|
ce240083c4 | ||
|
|
0722876603 | ||
|
|
724020ec2a | ||
|
|
b01348d313 | ||
|
|
46e31bbce3 | ||
|
|
a4f4627a75 | ||
|
|
8d34e036ec | ||
|
|
e004a5e2f6 | ||
|
|
acf6e862d0 | ||
|
|
31faf2c78e | ||
|
|
f8c28d8b9f | ||
|
|
f69a2355f6 | ||
|
|
388c01105c | ||
|
|
f8996e1d7d | ||
|
|
6b3d5025d9 | ||
|
|
ed271189d2 | ||
|
|
65f8a9a652 | ||
|
|
6c5b9fde1f | ||
|
|
258436442f | ||
|
|
05a32efa50 | ||
|
|
1142d06fdb | ||
|
|
35fe189be7 | ||
|
|
a78e8e10d2 | ||
|
|
9af37ccfbf | ||
|
|
803f3e6181 | ||
|
|
f188aef11e | ||
|
|
76d7e60018 | ||
|
|
fe749159e4 | ||
|
|
3c3532a292 | ||
|
|
710ca0070f | ||
|
|
4038fefefd | ||
|
|
cdcdc0b724 | ||
|
|
2313093b55 | ||
|
|
3f2ec54725 | ||
|
|
e928a33f95 | ||
|
|
2780f53d3b | ||
|
|
c3f1bdca52 | ||
|
|
f4e371676b | ||
|
|
8ec6e6e985 | ||
|
|
f4fc1a3f93 | ||
|
|
42bfb9f22f | ||
|
|
1a35cdc7a9 | ||
|
|
2daac76574 | ||
|
|
5633582d31 | ||
|
|
667a987dfc | ||
|
|
49907c78a3 | ||
|
|
5cfdb0698f | ||
|
|
7e6f8ddfba | ||
|
|
4d915f9800 | ||
|
|
9e6ba1a164 | ||
|
|
20f76c83f8 | ||
|
|
b2995551a2 | ||
|
|
c8f46147e0 | ||
|
|
9f6ea8121c | ||
|
|
9c08cbfbec | ||
|
|
c3190dd51a | ||
|
|
5b8de76c22 | ||
|
|
d6205d9a04 | ||
|
|
6a32192e50 | ||
|
|
5c78619750 | ||
|
|
a7b808ebaf | ||
|
|
d11038b7b3 | ||
|
|
88a8dc905b | ||
|
|
a2fbb5dc37 | ||
|
|
97c31e3820 | ||
|
|
08c88caa46 | ||
|
|
8e5174ae44 | ||
|
|
69fe5eac2b | ||
|
|
46f6a07239 | ||
|
|
b268efbc6e | ||
|
|
95f8c4b269 | ||
|
|
12217437e3 | ||
|
|
35a254fc1c | ||
|
|
2c0b659893 | ||
|
|
fe51dbd844 | ||
|
|
99fbe1d4c4 | ||
|
|
d3e71aa394 | ||
|
|
72df078d02 | ||
|
|
8ea96e505e | ||
|
|
a5fd5cfb55 | ||
|
|
3098afb342 | ||
|
|
dfc1042a3f | ||
|
|
af17b459ba | ||
|
|
aae05ac832 | ||
|
|
5048bde6d0 | ||
|
|
b92d9c889b | ||
|
|
c35c44ad8d | ||
|
|
a9779d7e7c | ||
|
|
70f77a93ea | ||
|
|
ebed7ebf5e | ||
|
|
648bf53e83 | ||
|
|
75f11e68de | ||
|
|
579e6fd1cd | ||
|
|
30392df901 | ||
|
|
7f3f69fa72 | ||
|
|
3e646efee9 | ||
|
|
8fe173439d | ||
|
|
48fdff6700 | ||
|
|
5055434e48 | ||
|
|
bbf508d95e | ||
|
|
80cbdda772 | ||
|
|
babdff361c | ||
|
|
15f30d8841 | ||
|
|
737ab54bf2 | ||
|
|
20fa5d9656 | ||
|
|
a2f2e04ff9 | ||
|
|
7573ef928f | ||
|
|
46297d4839 | ||
|
|
5515607b63 | ||
|
|
d0ed8830f7 | ||
|
|
a6bdbb748b | ||
|
|
ba811c2e1c | ||
|
|
3ef45c2ffd | ||
|
|
8d72d770a3 | ||
|
|
e32d81520a | ||
|
|
e973bc1f41 | ||
|
|
cdfce25494 | ||
|
|
a1e80fdca1 | ||
|
|
7aa876a0bb | ||
|
|
dee36638cf | ||
|
|
effd5bc6e9 | ||
|
|
29eabba5a0 | ||
|
|
e7a9bf2a6c | ||
|
|
93423ee1d1 | ||
|
|
888f7e669a | ||
|
|
1f1d1fdf59 | ||
|
|
dcab097e00 | ||
|
|
a9bdc3d1d0 | ||
|
|
a7101be284 | ||
|
|
3ee0b7e288 | ||
|
|
e3f0bb195d | ||
|
|
fae0863633 | ||
|
|
7a64333c25 | ||
|
|
1331e7e77a | ||
|
|
ac1f2dadad | ||
|
|
4858a67be1 | ||
|
|
1238ed95da | ||
|
|
b32a57105d | ||
|
|
87d6d2d5cb | ||
|
|
5b05e0194f | ||
|
|
24843abed3 | ||
|
|
1f96334f8e | ||
|
|
4db953b22b | ||
|
|
8e847093da | ||
|
|
023253ad9c | ||
|
|
89c65d30d3 | ||
|
|
c4499d6c85 | ||
|
|
29888c2f03 | ||
|
|
eaff92cebc | ||
|
|
4f4fd6a90c | ||
|
|
da3eb89b67 | ||
|
|
765f081f6f | ||
|
|
5c87d69d46 | ||
|
|
686f32d6b3 | ||
|
|
68a62537e1 | ||
|
|
e3ff82544a | ||
|
|
eddfadaf7f | ||
|
|
1b3e2b32f2 | ||
|
|
353d3bfb3f | ||
|
|
4a8fc84c82 | ||
|
|
641a6f8d2e | ||
|
|
7f3996ef58 | ||
|
|
dd770f7e10 | ||
|
|
4dbb19db46 | ||
|
|
ad151c2cc1 | ||
|
|
28f357b598 | ||
|
|
bf0f6e2303 | ||
|
|
35a0f07887 | ||
|
|
52aa7cad06 | ||
|
|
22d77f4680 | ||
|
|
46c34bfbea | ||
|
|
052fb64a3d | ||
|
|
e8bf051cd0 | ||
|
|
d3c29b2f6e | ||
|
|
ef7f4965d4 | ||
|
|
c593906c26 | ||
|
|
27eea671dc | ||
|
|
79a9d2345b | ||
|
|
c3caddcec9 | ||
|
|
6d90182d2e | ||
|
|
ea503a6075 | ||
|
|
ffe313528e | ||
|
|
9b5b4c3787 | ||
|
|
c5bf3188a4 | ||
|
|
c4f46dc499 | ||
|
|
c1fd573de2 | ||
|
|
c6b083472f | ||
|
|
254fe95394 | ||
|
|
ac61ac082e | ||
|
|
02df395dab | ||
|
|
39584c7b7d | ||
|
|
4ebc4f3069 | ||
|
|
1eca8aa143 | ||
|
|
9c09d50e8f | ||
|
|
d73e896e66 | ||
|
|
283045dc4a | ||
|
|
180cfb3951 | ||
|
|
610637da80 | ||
|
|
73e6f5e6da | ||
|
|
b7e6926880 | ||
|
|
a7ef6ee35b | ||
|
|
920e062293 | ||
|
|
794a0608a1 | ||
|
|
fc09653de3 | ||
|
|
c8661fd135 | ||
|
|
4b0600a453 | ||
|
|
f1c10cac2b | ||
|
|
af83ca0235 | ||
|
|
8f6870ebb7 | ||
|
|
0e8bdbd3e3 | ||
|
|
0d593c22d1 | ||
|
|
a1f0a3e23b | ||
|
|
9b15d8de24 | ||
|
|
aaa51cf234 | ||
|
|
66c7115cfc | ||
|
|
823386d824 | ||
|
|
433cb71211 | ||
|
|
62c60d3070 | ||
|
|
698d328620 | ||
|
|
4292355310 | ||
|
|
85bb301255 | ||
|
|
0d61c13c58 | ||
|
|
15f79e0826 | ||
|
|
3d96f0fdfa | ||
|
|
733b9604ba | ||
|
|
969fdd7995 | ||
|
|
b1d11d7747 | ||
|
|
e948bdaea8 | ||
|
|
17389b8667 | ||
|
|
635b5de304 | ||
|
|
67be981176 | ||
|
|
0b8402c187 | ||
|
|
7c98c1f8c9 | ||
|
|
0483603d4a | ||
|
|
6b59b8be44 | ||
|
|
07ffc003e4 | ||
|
|
4cb62df33f | ||
|
|
ef58f011fb | ||
|
|
f7ef236ac8 | ||
|
|
dbe906a331 | ||
|
|
3899f41c61 | ||
|
|
57c29c14a4 | ||
|
|
2b5d903cc5 | ||
|
|
c8d270a853 | ||
|
|
72f4e9edbf | ||
|
|
1ce0a2b0ba | ||
|
|
044ebfb9a2 | ||
|
|
a41b034aa2 | ||
|
|
e00f0b852d | ||
|
|
501b12564c | ||
|
|
229ad15a28 | ||
|
|
e4f35d8dae | ||
|
|
4271573e15 | ||
|
|
b651a9046b | ||
|
|
6b84eaf8af | ||
|
|
1b076bcd22 | ||
|
|
30437f6c46 | ||
|
|
3171e40a26 | ||
|
|
61c915995b | ||
|
|
073bd86344 | ||
|
|
777a7addd2 | ||
|
|
4f28476c47 | ||
|
|
b05aec72c2 | ||
|
|
610675452e | ||
|
|
83387f5d08 | ||
|
|
142206529c | ||
|
|
c0f200b1a9 | ||
|
|
6d55f75bee | ||
|
|
c68cbf1806 | ||
|
|
9677617c7f | ||
|
|
d8cf282953 | ||
|
|
b959f57058 | ||
|
|
8768e6fd0b | ||
|
|
acbf370383 | ||
|
|
80dfdaee06 | ||
|
|
4d15ae9452 | ||
|
|
9a68d42ee8 | ||
|
|
d732d099ac | ||
|
|
582a2af799 | ||
|
|
fba3963d47 | ||
|
|
e80d33e2e0 | ||
|
|
6a3001bf22 | ||
|
|
368c41ba27 | ||
|
|
fa0d8432bc | ||
|
|
2811e08563 | ||
|
|
846a4066d8 | ||
|
|
6e1477666e | ||
|
|
013def94f9 | ||
|
|
468bb04149 | ||
|
|
30a23dad17 | ||
|
|
17af249f90 | ||
|
|
4e65291304 | ||
|
|
505ad36b36 | ||
|
|
dcb614911a | ||
|
|
e06c3631b2 | ||
|
|
da236e6e1b | ||
|
|
2796730a87 | ||
|
|
f32e18c32a | ||
|
|
1a5fd331b6 | ||
|
|
772b86a4b5 | ||
|
|
e0013b9bee | ||
|
|
127d9d6460 | ||
|
|
cb7de8019b | ||
|
|
2b5b06316d | ||
|
|
76b56d7b78 | ||
|
|
c1163228f6 | ||
|
|
8af825d7ea | ||
|
|
0a968aae93 | ||
|
|
879cffc056 | ||
|
|
462e92cca0 | ||
|
|
e1b1a945b1 | ||
|
|
0493e27312 | ||
|
|
e4f8c78efe | ||
|
|
e2cbf4e3e4 | ||
|
|
f35d98bb40 | ||
|
|
7ce1a5e841 | ||
|
|
0a72c2fba7 | ||
|
|
824f70f463 | ||
|
|
39f5f64998 | ||
|
|
1752803199 | ||
|
|
e372599ce7 | ||
|
|
ce9fb02a75 | ||
|
|
4526f5e772 | ||
|
|
616a42c8f3 | ||
|
|
ecb5ef8a10 | ||
|
|
824c3dc1d7 | ||
|
|
9b76d46558 | ||
|
|
cc4920ddc7 | ||
|
|
2af10175fa | ||
|
|
ae455fa9e1 | ||
|
|
60d7e516dd | ||
|
|
bf18905e02 | ||
|
|
4d6f520f18 | ||
|
|
9da626dfc8 | ||
|
|
1cca9aa441 | ||
|
|
3d054847a0 | ||
|
|
a31d998e67 | ||
|
|
d313bea97f | ||
|
|
da04226594 | ||
|
|
eb2de26638 | ||
|
|
f5652cdbc4 | ||
|
|
13172c92f3 | ||
|
|
09df636183 | ||
|
|
2b45ace3ba | ||
|
|
9e05a7d1eb | ||
|
|
21e7c09c43 | ||
|
|
14d96e0a9b | ||
|
|
459ffcabd6 | ||
|
|
75cc3fdab0 | ||
|
|
2d26a40c2b | ||
|
|
a78d4e6198 | ||
|
|
2a1e004962 | ||
|
|
5e55cc205d | ||
|
|
476c732373 | ||
|
|
71c50b7936 | ||
|
|
79cb390f16 | ||
|
|
c1452c9c6f | ||
|
|
6e903d7498 | ||
|
|
221f4a2b0c | ||
|
|
080ae058d8 | ||
|
|
edb84c0b3b | ||
|
|
04ef477d51 | ||
|
|
5696788d3a | ||
|
|
1c2bf919ed | ||
|
|
d15c22c1e8 | ||
|
|
9c6e90ae27 | ||
|
|
481791c277 | ||
|
|
a25c7981f9 | ||
|
|
53519f2865 | ||
|
|
3a50d82657 | ||
|
|
c640087498 | ||
|
|
2089f3ab58 | ||
|
|
cbaa6924c1 | ||
|
|
6ab3e9657d | ||
|
|
16f237dc60 | ||
|
|
554c33423f | ||
|
|
5d5e2b199c | ||
|
|
989ce70f97 | ||
|
|
f5dc4cb71e | ||
|
|
76512dfa2d | ||
|
|
850112502f | ||
|
|
888fa88aa3 | ||
|
|
15e7458666 | ||
|
|
0a93c76e66 | ||
|
|
312f86223c | ||
|
|
27a60418ad | ||
|
|
46d31a91da | ||
|
|
a8765d8847 | ||
|
|
8ee6ca1b80 | ||
|
|
1a2b73a862 | ||
|
|
c44f4efced | ||
|
|
9fdf4fd2af | ||
|
|
33353ccaf6 | ||
|
|
5fe3a269be | ||
|
|
0b4770018d | ||
|
|
75fcbd03ce | ||
|
|
377121bdee | ||
|
|
e5e58f4e38 | ||
|
|
04517f284c | ||
|
|
e32fb37b5d | ||
|
|
8d9019b1c5 | ||
|
|
63d3e05674 | ||
|
|
e466a03055 | ||
|
|
1819a276cb | ||
|
|
9ec6430b71 | ||
|
|
2097233fd6 | ||
|
|
4bca7891a2 | ||
|
|
2e23e743fd | ||
|
|
edc593586b | ||
|
|
1e229ad2de | ||
|
|
8baee557ee | ||
|
|
42e50b089f | ||
|
|
e6a3fab6aa | ||
|
|
ccd6e3e99c | ||
|
|
21778fa4f3 | ||
|
|
14342383cf | ||
|
|
926de76010 | ||
|
|
ee25d35db1 | ||
|
|
ee2115584b | ||
|
|
1c9c088657 | ||
|
|
b5afac2f1a | ||
|
|
c8d9f20a48 | ||
|
|
6a30db7ce0 | ||
|
|
9e9ab80422 | ||
|
|
5b9debfbdf | ||
|
|
788309b85a | ||
|
|
5bbb3d9b21 | ||
|
|
6bc2186912 | ||
|
|
8d5f91bf98 | ||
|
|
9ddf60d0fc | ||
|
|
05bdf65996 | ||
|
|
6d6217812d | ||
|
|
ea36e73b8e | ||
|
|
da268b57d4 | ||
|
|
5588e13e54 | ||
|
|
7c7f1cad7f | ||
|
|
a6b333672d | ||
|
|
29857143c9 | ||
|
|
d1460e7a1a | ||
|
|
87ab7e83d5 | ||
|
|
9f31357a9c | ||
|
|
c94ef0379a | ||
|
|
bc66325d71 | ||
|
|
27f44ae911 | ||
|
|
3940b9256d | ||
|
|
4886ff9b86 | ||
|
|
38a9fc3d6e | ||
|
|
e676545f7a | ||
|
|
ef95627138 | ||
|
|
bfaedb5cf1 | ||
|
|
ea8d53aa9b | ||
|
|
be7a000de6 | ||
|
|
ad3cf9ecaa | ||
|
|
691324a3e8 | ||
|
|
23a9f893b4 | ||
|
|
3ea826aecb | ||
|
|
532d094a08 | ||
|
|
0cea5840df | ||
|
|
45686778ea | ||
|
|
45108d9c93 | ||
|
|
3665d957a7 | ||
|
|
86940b2ee1 | ||
|
|
24fb9eb65b | ||
|
|
700256c273 | ||
|
|
d575d62b18 | ||
|
|
8cdf8ce376 | ||
|
|
7c9abfbde3 | ||
|
|
95de87a325 | ||
|
|
5366df8dc6 | ||
|
|
0a6db5161d | ||
|
|
62e25e44fd | ||
|
|
ce9fe920dc | ||
|
|
c171866faf | ||
|
|
7758c94e31 | ||
|
|
66debb9245 | ||
|
|
3542232393 | ||
|
|
536c12d989 | ||
|
|
265403e110 | ||
|
|
fd679af577 | ||
|
|
ecbf135549 | ||
|
|
7b90b936dd | ||
|
|
17a919ee53 | ||
|
|
1b15ec0eae | ||
|
|
bf863f05b6 | ||
|
|
a2316beab1 | ||
|
|
28fc91f5f3 | ||
|
|
67062677b0 | ||
|
|
faf8ffe678 | ||
|
|
5821098699 | ||
|
|
542d63888a | ||
|
|
449f8a014c | ||
|
|
57764d0cf5 | ||
|
|
c39a79e26a | ||
|
|
b6622fc68e | ||
|
|
75b41641f0 | ||
|
|
30a61972fb | ||
|
|
bcc54602ee | ||
|
|
f9998d5721 | ||
|
|
8605ceba5e | ||
|
|
30bcf9ff77 | ||
|
|
70b0e9d5e5 | ||
|
|
fdd533aa3b | ||
|
|
a44ed0aeb3 | ||
|
|
f5bfa6bd56 | ||
|
|
81a6f8808b | ||
|
|
be3685519f | ||
|
|
2cf950e901 | ||
|
|
46d5dbb07d | ||
|
|
d2e0d1fecc | ||
|
|
d333cfdd5a | ||
|
|
32238e99ab | ||
|
|
40a3a2cc86 | ||
|
|
fe978a1971 | ||
|
|
b426c2e7ff | ||
|
|
b626464453 | ||
|
|
76c3316f02 | ||
|
|
a6a9406228 | ||
|
|
7921f5dd0b | ||
|
|
39fc9d628f | ||
|
|
85a9183b61 | ||
|
|
36a4381484 | ||
|
|
5ff98a571c | ||
|
|
0a91aeb4a3 | ||
|
|
c38f1d7e54 | ||
|
|
42bba52f66 | ||
|
|
03aab4043c | ||
|
|
146def2f06 | ||
|
|
d642224a73 | ||
|
|
0238437ce7 | ||
|
|
7ed59ea8bc | ||
|
|
49d0a0bbb0 | ||
|
|
330a034329 | ||
|
|
aee18215fc | ||
|
|
336f87770d | ||
|
|
4199e04ab3 | ||
|
|
50922fb1d2 | ||
|
|
d2fe417715 | ||
|
|
2b731bf909 | ||
|
|
2669babb53 | ||
|
|
fe675a9a72 | ||
|
|
79f766b28e | ||
|
|
0eeb692c4b | ||
|
|
6c401173db | ||
|
|
b474b86e7b | ||
|
|
6a9beb8ff7 | ||
|
|
d0f5d08443 | ||
|
|
49848ec01e | ||
|
|
0ffe4d4996 | ||
|
|
7a2a889585 | ||
|
|
1e4b776de5 | ||
|
|
3d00ca1672 | ||
|
|
485bbb9cbd | ||
|
|
359c195419 | ||
|
|
1b9e822ff6 | ||
|
|
9f6c00d62c | ||
|
|
a1355c10ca | ||
|
|
92ca3283fd | ||
|
|
cea1f3f5f7 | ||
|
|
39550d3096 | ||
|
|
070003b983 | ||
|
|
049ed79e59 | ||
|
|
a9e55e3b25 | ||
|
|
5a178ed235 | ||
|
|
8a338f1320 | ||
|
|
d437b8a943 | ||
|
|
a4d520a9ad | ||
|
|
9c7dfdf2ff | ||
|
|
ffd15e4a9f | ||
|
|
7f8e0620ca | ||
|
|
dc9aebcb55 | ||
|
|
648b3e0ec3 | ||
|
|
2adfed2714 | ||
|
|
12542f7bed | ||
|
|
4aca88acf8 | ||
|
|
b1ac2b78c2 | ||
|
|
4a2b37f740 | ||
|
|
bb3a0a9945 | ||
|
|
3cde5be3b4 | ||
|
|
b055736439 | ||
|
|
2817ffd411 | ||
|
|
db45dc071b | ||
|
|
1c0543cb46 | ||
|
|
dde879c7fc | ||
|
|
cf95dfd49d | ||
|
|
4a96f19faf | ||
|
|
a2a78c0aff | ||
|
|
4b3a214276 | ||
|
|
bbf0e91761 | ||
|
|
f4b8ec6e10 | ||
|
|
3b45e82c76 | ||
|
|
4551f36b85 | ||
|
|
f2d32324e3 | ||
|
|
5d4b6eec69 | ||
|
|
98fd4b61c9 | ||
|
|
74f9e7536b | ||
|
|
849b9d430c | ||
|
|
0d0cc908c2 | ||
|
|
156434b952 | ||
|
|
02d07912dd | ||
|
|
4a7e36618f | ||
|
|
e272294e07 | ||
|
|
401f215dc9 | ||
|
|
3cd4265c94 | ||
|
|
8e6869d8e3 | ||
|
|
d6df0f0604 | ||
|
|
cad1d32682 | ||
|
|
fd10652f48 | ||
|
|
02918de6c1 | ||
|
|
e27dd84501 | ||
|
|
cdbda291c5 | ||
|
|
d70eb78a76 | ||
|
|
a5e4562505 | ||
|
|
3f2eb84323 | ||
|
|
613d3e14ea | ||
|
|
453c401ac6 | ||
|
|
8b756f2e0c | ||
|
|
9e9d5b7698 | ||
|
|
02adb758ff | ||
|
|
ffade66d97 | ||
|
|
988333d5fd | ||
|
|
db41e952e3 | ||
|
|
bb1b11df15 | ||
|
|
b3fdebf8df | ||
|
|
4615df2e3b | ||
|
|
73d8e01452 | ||
|
|
bf8a99d844 | ||
|
|
cb19ac34e3 | ||
|
|
15e5573ab4 | ||
|
|
74f5b2847f | ||
|
|
e417e43c54 | ||
|
|
158ebe1089 | ||
|
|
5fb7833677 | ||
|
|
587d8142d2 | ||
|
|
a6d24b3af7 | ||
|
|
d730af2e69 | ||
|
|
99b1e18b0a | ||
|
|
6012039c56 | ||
|
|
f388e86287 | ||
|
|
d3ca037ebf | ||
|
|
00a203c9aa | ||
|
|
6bffb5470d | ||
|
|
81c4a6170f | ||
|
|
6285283b02 | ||
|
|
b71e24d6a1 | ||
|
|
a4e48c9919 | ||
|
|
bc27eb58bf | ||
|
|
1b1f9365c9 | ||
|
|
d8c8040f07 | ||
|
|
652b9688d3 | ||
|
|
59c3730d84 | ||
|
|
84db074686 | ||
|
|
7eec0ab301 | ||
|
|
7cb8f90340 | ||
|
|
32360061b4 | ||
|
|
2055e9f5b8 | ||
|
|
8cb77d3b98 | ||
|
|
c67fb69af2 | ||
|
|
960bc1599b | ||
|
|
0f05216ea0 | ||
|
|
75551224b3 | ||
|
|
0b8de41da2 | ||
|
|
f9b5783296 | ||
|
|
d3281cc746 | ||
|
|
4c7e39c10c | ||
|
|
7b3c1d5ab9 | ||
|
|
2d5eb86776 | ||
|
|
5c9d9a98b3 | ||
|
|
5eb5c09052 | ||
|
|
a86e135967 | ||
|
|
776bd87888 | ||
|
|
d7683ed3f7 | ||
|
|
0cc9f18468 | ||
|
|
889e18f803 | ||
|
|
773b8d1e00 | ||
|
|
dca6d35a6f | ||
|
|
d29d2d147b | ||
|
|
347dae1f84 | ||
|
|
63cbb83344 | ||
|
|
27d135fee7 | ||
|
|
ccd7c789f0 | ||
|
|
c7625fad81 | ||
|
|
5305dfab12 | ||
|
|
4478270fc9 | ||
|
|
e7c9992fdc | ||
|
|
a9d43c42f4 | ||
|
|
bbf2f0dd36 | ||
|
|
43c02377ef | ||
|
|
70f330b0e4 | ||
|
|
02eaa55441 | ||
|
|
6c3ec903c2 | ||
|
|
7d9b81863f | ||
|
|
af90d0a7de | ||
|
|
322bc9a3aa | ||
|
|
e4009854dc | ||
|
|
9e14a741c3 | ||
|
|
01fcb9ae0e | ||
|
|
064f6d36ad | ||
|
|
6b3590e7c8 | ||
|
|
251aac18fb | ||
|
|
f46bf2f670 | ||
|
|
40a88c7fc6 | ||
|
|
8791e7735d | ||
|
|
248f67dcf6 | ||
|
|
a24df735d4 | ||
|
|
7d0797c510 | ||
|
|
3a9db729f8 | ||
|
|
7eb86cba34 | ||
|
|
5633c0612e | ||
|
|
d5912b909c | ||
|
|
f75eb0658c | ||
|
|
7c5ec1e0df | ||
|
|
11ebc4623c | ||
|
|
cf29053389 | ||
|
|
1e7d0d10f5 | ||
|
|
3dd94cbe69 | ||
|
|
ed1b2f9da1 | ||
|
|
7ee84b44df | ||
|
|
02205246dd | ||
|
|
fcd3194eb1 | ||
|
|
bdef189ce1 | ||
|
|
3058ddc542 | ||
|
|
bada933fef | ||
|
|
1d74b94162 | ||
|
|
eee6d0c871 | ||
|
|
ed5e37f1fa | ||
|
|
364300274e | ||
|
|
848b25c790 | ||
|
|
107d10ace4 | ||
|
|
83e6a42252 | ||
|
|
eb69dd58f7 | ||
|
|
31c45f951d | ||
|
|
3012bfb79d | ||
|
|
03442bc115 | ||
|
|
1ae6291d06 | ||
|
|
1b347f97a0 | ||
|
|
902f98c9ba | ||
|
|
89311063f8 | ||
|
|
1cdc5d1351 | ||
|
|
30680cb170 | ||
|
|
c514fb00a3 | ||
|
|
c7995356b9 | ||
|
|
fb2ea27477 | ||
|
|
7cf6cc2c91 | ||
|
|
4358d5fe61 | ||
|
|
10cb099c0e | ||
|
|
329b845c79 | ||
|
|
bbd2773506 | ||
|
|
410bc50a8b | ||
|
|
015269fa7b | ||
|
|
b8673d8625 | ||
|
|
31c71fa6e9 | ||
|
|
8fcd423015 | ||
|
|
df39d05263 | ||
|
|
05ce4f769b | ||
|
|
8dc05ba7ec | ||
|
|
6701c9749c | ||
|
|
c6d8f7e759 | ||
|
|
76765164dc | ||
|
|
1ea25eb28c | ||
|
|
f333226abe | ||
|
|
45fe8a668b | ||
|
|
beac91159d | ||
|
|
75e7c85e61 | ||
|
|
040b7a74a6 | ||
|
|
0138e59355 | ||
|
|
fffbdc10c3 | ||
|
|
3419e359c8 | ||
|
|
0b051f8154 | ||
|
|
5936f7a3be | ||
|
|
983ffa6236 | ||
|
|
b74fde2a9f | ||
|
|
e176595f1f | ||
|
|
179c79a052 | ||
|
|
408da296f1 | ||
|
|
192238567b | ||
|
|
c35e485510 | ||
|
|
1bac4b5b46 | ||
|
|
63a7ad82ff | ||
|
|
37ef3f13b4 | ||
|
|
9dfd0ceb5a | ||
|
|
55c58e3c7a | ||
|
|
c2692c7e92 |
4
.github/CODE_OF_CONDUCT.md
vendored
Normal file
4
.github/CODE_OF_CONDUCT.md
vendored
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
|
||||||
|
Please refer to
|
||||||
|
[Delta Chat community standards and practices](https://delta.chat/en/community-standards)
|
||||||
|
which also apply for all chatmail developments.
|
||||||
32
.github/ISSUE_TEMPLATE/bug_report.md
vendored
Normal file
32
.github/ISSUE_TEMPLATE/bug_report.md
vendored
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
---
|
||||||
|
name: Bug report
|
||||||
|
about: Report something that isn't working.
|
||||||
|
title: ''
|
||||||
|
assignees: ''
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
<!--
|
||||||
|
Please fill out as much of this form as you can (leaving out stuff that is not applicable is ok).
|
||||||
|
-->
|
||||||
|
|
||||||
|
- Server OS (Operating System) - preferably Debian 12:
|
||||||
|
- On which OS you run cmdeploy:
|
||||||
|
|
||||||
|
## Expected behavior
|
||||||
|
|
||||||
|
*What did you try to achieve?*
|
||||||
|
|
||||||
|
## Actual behavior
|
||||||
|
|
||||||
|
*What happened instead?*
|
||||||
|
|
||||||
|
### Steps to reproduce the problem:
|
||||||
|
|
||||||
|
1.
|
||||||
|
2.
|
||||||
|
|
||||||
|
### Screenshots
|
||||||
|
|
||||||
|
### Logs
|
||||||
|
|
||||||
5
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
5
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
blank_issues_enabled: true
|
||||||
|
contact_links:
|
||||||
|
- name: Mutual Help Chat Group
|
||||||
|
url: https://i.delta.chat/#C2846EB4C1CB8DF84B1818F5E3A638FC3FBDC981&a=stalebot1%40nine.testrun.org&g=Chatmail%20Mutual%20Help&x=7sFF7Ik50pWv6J1z7RVC5527&i=d7s1HvOsk5UrSf9AoqRZggg4&s=XmX_9BAW6-g5Ao5E8PyaeKNB
|
||||||
|
about: If you have troubles setting up the relay server, feel free to ask here.
|
||||||
37
.github/workflows/ci.yaml
vendored
Normal file
37
.github/workflows/ci.yaml
vendored
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
name: CI
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
push:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
tox:
|
||||||
|
name: isolated chatmaild tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: run chatmaild tests
|
||||||
|
working-directory: chatmaild
|
||||||
|
run: pipx run tox
|
||||||
|
|
||||||
|
scripts:
|
||||||
|
name: deploy-chatmail tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: initenv
|
||||||
|
run: scripts/initenv.sh
|
||||||
|
|
||||||
|
- name: append venv/bin to PATH
|
||||||
|
run: echo venv/bin >>$GITHUB_PATH
|
||||||
|
|
||||||
|
- name: run formatting checks
|
||||||
|
run: cmdeploy fmt -v
|
||||||
|
|
||||||
|
- name: run deploy-chatmail offline tests
|
||||||
|
run: pytest --pyargs cmdeploy
|
||||||
|
|
||||||
|
# all other cmdeploy commands require a staging server
|
||||||
|
# see https://github.com/deltachat/chatmail/issues/100
|
||||||
20
.github/workflows/staging-ipv4.testrun.org-default.zone
vendored
Normal file
20
.github/workflows/staging-ipv4.testrun.org-default.zone
vendored
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
;; Zone file for staging-ipv4.testrun.org
|
||||||
|
|
||||||
|
$ORIGIN staging-ipv4.testrun.org.
|
||||||
|
$TTL 300
|
||||||
|
|
||||||
|
@ IN SOA ns.testrun.org. root.nine.testrun.org (
|
||||||
|
2023010101 ; Serial
|
||||||
|
7200 ; Refresh
|
||||||
|
3600 ; Retry
|
||||||
|
1209600 ; Expire
|
||||||
|
3600 ; Negative response caching TTL
|
||||||
|
)
|
||||||
|
|
||||||
|
;; Nameservers.
|
||||||
|
@ IN NS ns.testrun.org.
|
||||||
|
|
||||||
|
;; DNS records.
|
||||||
|
@ IN A 37.27.95.249
|
||||||
|
mta-sts.staging-ipv4.testrun.org. CNAME staging-ipv4.testrun.org.
|
||||||
|
www.staging-ipv4.testrun.org. CNAME staging-ipv4.testrun.org.
|
||||||
21
.github/workflows/staging.testrun.org-default.zone
vendored
Normal file
21
.github/workflows/staging.testrun.org-default.zone
vendored
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
;; Zone file for staging2.testrun.org
|
||||||
|
|
||||||
|
$ORIGIN staging2.testrun.org.
|
||||||
|
$TTL 300
|
||||||
|
|
||||||
|
@ IN SOA ns.testrun.org. root.nine.testrun.org (
|
||||||
|
2023010101 ; Serial
|
||||||
|
7200 ; Refresh
|
||||||
|
3600 ; Retry
|
||||||
|
1209600 ; Expire
|
||||||
|
3600 ; Negative response caching TTL
|
||||||
|
)
|
||||||
|
|
||||||
|
;; Nameservers.
|
||||||
|
@ IN NS ns.testrun.org.
|
||||||
|
|
||||||
|
;; DNS records.
|
||||||
|
@ IN A 37.27.24.139
|
||||||
|
mta-sts.staging2.testrun.org. CNAME staging2.testrun.org.
|
||||||
|
www.staging2.testrun.org. CNAME staging2.testrun.org.
|
||||||
|
|
||||||
100
.github/workflows/test-and-deploy-ipv4only.yaml
vendored
Normal file
100
.github/workflows/test-and-deploy-ipv4only.yaml
vendored
Normal file
@@ -0,0 +1,100 @@
|
|||||||
|
name: deploy on staging-ipv4.testrun.org, and run tests
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
pull_request:
|
||||||
|
paths-ignore:
|
||||||
|
- 'scripts/**'
|
||||||
|
- '**/README.md'
|
||||||
|
- 'CHANGELOG.md'
|
||||||
|
- 'LICENSE'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
deploy:
|
||||||
|
name: deploy on staging-ipv4.testrun.org, and run tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 30
|
||||||
|
concurrency:
|
||||||
|
group: ci-ipv4-${{ github.workflow }}-${{ github.ref }}
|
||||||
|
cancel-in-progress: ${{ !contains(github.ref, '$GITHUB_REF') }}
|
||||||
|
steps:
|
||||||
|
- uses: jsok/serialize-workflow-action@v1
|
||||||
|
with:
|
||||||
|
github-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: prepare SSH
|
||||||
|
run: |
|
||||||
|
mkdir ~/.ssh
|
||||||
|
echo "${{ secrets.STAGING_SSH_KEY }}" >> ~/.ssh/id_ed25519
|
||||||
|
chmod 600 ~/.ssh/id_ed25519
|
||||||
|
ssh-keyscan staging-ipv4.testrun.org > ~/.ssh/known_hosts
|
||||||
|
# save previous acme & dkim state
|
||||||
|
rsync -avz root@staging-ipv4.testrun.org:/var/lib/acme acme-ipv4 || true
|
||||||
|
rsync -avz root@staging-ipv4.testrun.org:/etc/dkimkeys dkimkeys-ipv4 || true
|
||||||
|
# store previous acme & dkim state on ns.testrun.org, if it contains useful certs
|
||||||
|
if [ -f dkimkeys-ipv4/dkimkeys/opendkim.private ]; then rsync -avz -e "ssh -o StrictHostKeyChecking=accept-new" dkimkeys-ipv4 root@ns.testrun.org:/tmp/ || true; fi
|
||||||
|
if [ "$(ls -A acme-ipv4/acme/certs)" ]; then rsync -avz -e "ssh -o StrictHostKeyChecking=accept-new" acme-ipv4 root@ns.testrun.org:/tmp/ || true; fi
|
||||||
|
# make sure CAA record isn't set
|
||||||
|
scp -o StrictHostKeyChecking=accept-new .github/workflows/staging-ipv4.testrun.org-default.zone root@ns.testrun.org:/etc/nsd/staging-ipv4.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org sed -i '/CAA/d' /etc/nsd/staging-ipv4.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org nsd-checkzone staging-ipv4.testrun.org /etc/nsd/staging-ipv4.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org systemctl reload nsd
|
||||||
|
|
||||||
|
- name: rebuild staging-ipv4.testrun.org to have a clean VPS
|
||||||
|
run: |
|
||||||
|
curl -X POST \
|
||||||
|
-H "Authorization: Bearer ${{ secrets.HETZNER_API_TOKEN }}" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
-d '{"image":"debian-12"}' \
|
||||||
|
"https://api.hetzner.cloud/v1/servers/${{ secrets.STAGING_IPV4_SERVER_ID }}/actions/rebuild"
|
||||||
|
|
||||||
|
- run: scripts/initenv.sh
|
||||||
|
|
||||||
|
- name: append venv/bin to PATH
|
||||||
|
run: echo venv/bin >>$GITHUB_PATH
|
||||||
|
|
||||||
|
- name: upload TLS cert after rebuilding
|
||||||
|
run: |
|
||||||
|
echo " --- wait until staging-ipv4.testrun.org VPS is rebuilt --- "
|
||||||
|
rm ~/.ssh/known_hosts
|
||||||
|
while ! ssh -o ConnectTimeout=180 -o StrictHostKeyChecking=accept-new -v root@staging-ipv4.testrun.org id -u ; do sleep 1 ; done
|
||||||
|
ssh -o StrictHostKeyChecking=accept-new -v root@staging-ipv4.testrun.org id -u
|
||||||
|
# download acme & dkim state from ns.testrun.org
|
||||||
|
rsync -e "ssh -o StrictHostKeyChecking=accept-new" -avz root@ns.testrun.org:/tmp/acme-ipv4/acme acme-restore || true
|
||||||
|
rsync -avz root@ns.testrun.org:/tmp/dkimkeys-ipv4/dkimkeys dkimkeys-restore || true
|
||||||
|
# restore acme & dkim state to staging2.testrun.org
|
||||||
|
rsync -avz acme-restore/acme root@staging-ipv4.testrun.org:/var/lib/ || true
|
||||||
|
rsync -avz dkimkeys-restore/dkimkeys root@staging-ipv4.testrun.org:/etc/ || true
|
||||||
|
ssh -o StrictHostKeyChecking=accept-new -v root@staging-ipv4.testrun.org chown root:root -R /var/lib/acme || true
|
||||||
|
|
||||||
|
- name: run formatting checks
|
||||||
|
run: cmdeploy fmt -v
|
||||||
|
|
||||||
|
- name: run deploy-chatmail offline tests
|
||||||
|
run: pytest --pyargs cmdeploy
|
||||||
|
|
||||||
|
- run: |
|
||||||
|
cmdeploy init staging-ipv4.testrun.org
|
||||||
|
sed -i 's#disable_ipv6 = False#disable_ipv6 = True#' chatmail.ini
|
||||||
|
|
||||||
|
- run: cmdeploy run
|
||||||
|
|
||||||
|
- name: set DNS entries
|
||||||
|
run: |
|
||||||
|
ssh -o StrictHostKeyChecking=accept-new -v root@staging-ipv4.testrun.org chown opendkim:opendkim -R /etc/dkimkeys
|
||||||
|
cmdeploy dns --zonefile staging-generated.zone
|
||||||
|
cat staging-generated.zone >> .github/workflows/staging-ipv4.testrun.org-default.zone
|
||||||
|
cat .github/workflows/staging-ipv4.testrun.org-default.zone
|
||||||
|
scp .github/workflows/staging-ipv4.testrun.org-default.zone root@ns.testrun.org:/etc/nsd/staging-ipv4.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org nsd-checkzone staging-ipv4.testrun.org /etc/nsd/staging-ipv4.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org systemctl reload nsd
|
||||||
|
|
||||||
|
- name: cmdeploy test
|
||||||
|
run: CHATMAIL_DOMAIN2=nine.testrun.org cmdeploy test --slow
|
||||||
|
|
||||||
|
- name: cmdeploy dns
|
||||||
|
run: cmdeploy dns -v
|
||||||
|
|
||||||
98
.github/workflows/test-and-deploy.yaml
vendored
Normal file
98
.github/workflows/test-and-deploy.yaml
vendored
Normal file
@@ -0,0 +1,98 @@
|
|||||||
|
name: deploy on staging2.testrun.org, and run tests
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
pull_request:
|
||||||
|
paths-ignore:
|
||||||
|
- 'scripts/**'
|
||||||
|
- '**/README.md'
|
||||||
|
- 'CHANGELOG.md'
|
||||||
|
- 'LICENSE'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
deploy:
|
||||||
|
name: deploy on staging2.testrun.org, and run tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 30
|
||||||
|
concurrency:
|
||||||
|
group: ci-${{ github.workflow }}-${{ github.ref }}
|
||||||
|
cancel-in-progress: ${{ !contains(github.ref, '$GITHUB_REF') }}
|
||||||
|
steps:
|
||||||
|
- uses: jsok/serialize-workflow-action@v1
|
||||||
|
with:
|
||||||
|
github-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: prepare SSH
|
||||||
|
run: |
|
||||||
|
mkdir ~/.ssh
|
||||||
|
echo "${{ secrets.STAGING_SSH_KEY }}" >> ~/.ssh/id_ed25519
|
||||||
|
chmod 600 ~/.ssh/id_ed25519
|
||||||
|
ssh-keyscan staging2.testrun.org > ~/.ssh/known_hosts
|
||||||
|
# save previous acme & dkim state
|
||||||
|
rsync -avz root@staging2.testrun.org:/var/lib/acme . || true
|
||||||
|
rsync -avz root@staging2.testrun.org:/etc/dkimkeys . || true
|
||||||
|
# store previous acme & dkim state on ns.testrun.org, if it contains useful certs
|
||||||
|
if [ -f dkimkeys/opendkim.private ]; then rsync -avz -e "ssh -o StrictHostKeyChecking=accept-new" dkimkeys root@ns.testrun.org:/tmp/ || true; fi
|
||||||
|
if [ "$(ls -A acme/certs)" ]; then rsync -avz -e "ssh -o StrictHostKeyChecking=accept-new" acme root@ns.testrun.org:/tmp/ || true; fi
|
||||||
|
# make sure CAA record isn't set
|
||||||
|
scp -o StrictHostKeyChecking=accept-new .github/workflows/staging.testrun.org-default.zone root@ns.testrun.org:/etc/nsd/staging2.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org sed -i '/CAA/d' /etc/nsd/staging2.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org nsd-checkzone staging2.testrun.org /etc/nsd/staging2.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org systemctl reload nsd
|
||||||
|
|
||||||
|
- name: rebuild staging2.testrun.org to have a clean VPS
|
||||||
|
run: |
|
||||||
|
curl -X POST \
|
||||||
|
-H "Authorization: Bearer ${{ secrets.HETZNER_API_TOKEN }}" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
-d '{"image":"debian-12"}' \
|
||||||
|
"https://api.hetzner.cloud/v1/servers/${{ secrets.STAGING_SERVER_ID }}/actions/rebuild"
|
||||||
|
|
||||||
|
- run: scripts/initenv.sh
|
||||||
|
|
||||||
|
- name: append venv/bin to PATH
|
||||||
|
run: echo venv/bin >>$GITHUB_PATH
|
||||||
|
|
||||||
|
- name: upload TLS cert after rebuilding
|
||||||
|
run: |
|
||||||
|
echo " --- wait until staging2.testrun.org VPS is rebuilt --- "
|
||||||
|
rm ~/.ssh/known_hosts
|
||||||
|
while ! ssh -o ConnectTimeout=180 -o StrictHostKeyChecking=accept-new -v root@staging2.testrun.org id -u ; do sleep 1 ; done
|
||||||
|
ssh -o StrictHostKeyChecking=accept-new -v root@staging2.testrun.org id -u
|
||||||
|
# download acme & dkim state from ns.testrun.org
|
||||||
|
rsync -e "ssh -o StrictHostKeyChecking=accept-new" -avz root@ns.testrun.org:/tmp/acme acme-restore || true
|
||||||
|
rsync -avz root@ns.testrun.org:/tmp/dkimkeys dkimkeys-restore || true
|
||||||
|
# restore acme & dkim state to staging2.testrun.org
|
||||||
|
rsync -avz acme-restore/acme root@staging2.testrun.org:/var/lib/ || true
|
||||||
|
rsync -avz dkimkeys-restore/dkimkeys root@staging2.testrun.org:/etc/ || true
|
||||||
|
ssh -o StrictHostKeyChecking=accept-new -v root@staging2.testrun.org chown root:root -R /var/lib/acme || true
|
||||||
|
|
||||||
|
- name: run formatting checks
|
||||||
|
run: cmdeploy fmt -v
|
||||||
|
|
||||||
|
- name: run deploy-chatmail offline tests
|
||||||
|
run: pytest --pyargs cmdeploy
|
||||||
|
|
||||||
|
- run: cmdeploy init staging2.testrun.org
|
||||||
|
|
||||||
|
- run: cmdeploy run --verbose
|
||||||
|
|
||||||
|
- name: set DNS entries
|
||||||
|
run: |
|
||||||
|
ssh -o StrictHostKeyChecking=accept-new root@staging2.testrun.org chown opendkim:opendkim -R /etc/dkimkeys
|
||||||
|
cmdeploy dns --zonefile staging-generated.zone --verbose
|
||||||
|
cat staging-generated.zone >> .github/workflows/staging.testrun.org-default.zone
|
||||||
|
cat .github/workflows/staging.testrun.org-default.zone
|
||||||
|
scp .github/workflows/staging.testrun.org-default.zone root@ns.testrun.org:/etc/nsd/staging2.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org nsd-checkzone staging2.testrun.org /etc/nsd/staging2.testrun.org.zone
|
||||||
|
ssh root@ns.testrun.org systemctl reload nsd
|
||||||
|
|
||||||
|
- name: cmdeploy test
|
||||||
|
run: CHATMAIL_DOMAIN2=nine.testrun.org cmdeploy test --slow
|
||||||
|
|
||||||
|
- name: cmdeploy dns
|
||||||
|
run: cmdeploy dns -v
|
||||||
|
|
||||||
5
.gitignore
vendored
5
.gitignore
vendored
@@ -3,6 +3,9 @@ __pycache__/
|
|||||||
*.py[cod]
|
*.py[cod]
|
||||||
*$py.class
|
*$py.class
|
||||||
*.swp
|
*.swp
|
||||||
|
*qr-*.png
|
||||||
|
chatmail.ini
|
||||||
|
|
||||||
|
|
||||||
# C extensions
|
# C extensions
|
||||||
*.so
|
*.so
|
||||||
@@ -159,3 +162,5 @@ cython_debug/
|
|||||||
# and can be added to the global gitignore or merged into this file. For a more nuclear
|
# and can be added to the global gitignore or merged into this file. For a more nuclear
|
||||||
# option (not recommended) you can uncomment the following to ignore the entire idea folder.
|
# option (not recommended) you can uncomment the following to ignore the entire idea folder.
|
||||||
#.idea/
|
#.idea/
|
||||||
|
|
||||||
|
chatmail.zone
|
||||||
|
|||||||
336
CHANGELOG.md
Normal file
336
CHANGELOG.md
Normal file
@@ -0,0 +1,336 @@
|
|||||||
|
# Changelog for chatmail deployment
|
||||||
|
|
||||||
|
## untagged
|
||||||
|
|
||||||
|
- Avoid "acmetool not found" during initial run
|
||||||
|
([#550](https://github.com/chatmail/relay/pull/550))
|
||||||
|
|
||||||
|
- Enforce end-to-end encryption for incoming messages.
|
||||||
|
New user address mailboxes now get a `enforceE2EEincoming` file
|
||||||
|
which prohibits incoming cleartext messages from other domains.
|
||||||
|
An outside MTA trying to submit a cleartext message will
|
||||||
|
get a "523 Encryption Needed" response, see RFC5248.
|
||||||
|
If the file does not exist (as it the case for all existing accounts)
|
||||||
|
incoming cleartext messages are accepted.
|
||||||
|
([#538](https://github.com/chatmail/server/pull/538))
|
||||||
|
|
||||||
|
- Enforce end-to-end encryption between local addresses
|
||||||
|
([#535](https://github.com/chatmail/server/pull/535))
|
||||||
|
|
||||||
|
- Limit the bind for the HTTPS server on 8443 to 127.0.0.1
|
||||||
|
([#522](https://github.com/chatmail/server/pull/522))
|
||||||
|
([#532](https://github.com/chatmail/server/pull/532))
|
||||||
|
|
||||||
|
- Send SNI when connecting to outside servers
|
||||||
|
([#524](https://github.com/chatmail/server/pull/524))
|
||||||
|
|
||||||
|
- postfix master.cf: use 127.0.0.1 for consistency
|
||||||
|
([#544](https://github.com/chatmail/relay/pull/544))
|
||||||
|
|
||||||
|
- Pass through `original_content` instead of `content` in filtermail
|
||||||
|
([#509](https://github.com/chatmail/server/pull/509))
|
||||||
|
|
||||||
|
- Document TLS requirements in the readme
|
||||||
|
([#514](https://github.com/chatmail/server/pull/514))
|
||||||
|
|
||||||
|
- Remove cleanup service from submission ports
|
||||||
|
([#512](https://github.com/chatmail/server/pull/512))
|
||||||
|
|
||||||
|
- cmdeploy dovecot: delete big messages after 7 days
|
||||||
|
([#504](https://github.com/chatmail/server/pull/504))
|
||||||
|
|
||||||
|
- mtail: fix getting logs from STDIN
|
||||||
|
([#502](https://github.com/chatmail/server/pull/502))
|
||||||
|
|
||||||
|
- filtermail: don't require exactly 2 lines after openPGP payload
|
||||||
|
([#497](https://github.com/chatmail/server/pull/497))
|
||||||
|
|
||||||
|
- cmdeploy dns: offer alternative DKIM record format for some web interfaces
|
||||||
|
([#470](https://github.com/chatmail/server/pull/470))
|
||||||
|
|
||||||
|
- journald: remove old logs from disk
|
||||||
|
([#490](https://github.com/chatmail/server/pull/490))
|
||||||
|
|
||||||
|
- opendkim: restart once every day to mend RAM leaks
|
||||||
|
([#498](https://github.com/chatmail/server/pull/498)
|
||||||
|
|
||||||
|
- migration guide: let opendkim own the DKIM keys directory
|
||||||
|
([#468](https://github.com/chatmail/server/pull/468))
|
||||||
|
|
||||||
|
- improve secure-join message detection
|
||||||
|
([#473](https://github.com/chatmail/server/pull/473))
|
||||||
|
|
||||||
|
- use old crypt lib in python < 3.11
|
||||||
|
([#483](https://github.com/chatmail/server/pull/483))
|
||||||
|
|
||||||
|
- chatmaild: set umask to 0700 for doveauth + metadata
|
||||||
|
([#490](https://github.com/chatmail/server/pull/492))
|
||||||
|
|
||||||
|
- remove MTA-STS daemon
|
||||||
|
([#488](https://github.com/chatmail/server/pull/488))
|
||||||
|
|
||||||
|
- replace `Subject` with `[...]` for all outgoing mails.
|
||||||
|
([#481](https://github.com/chatmail/server/pull/481))
|
||||||
|
|
||||||
|
- opendkim: use su instead of sudo
|
||||||
|
([#491](https://github.com/chatmail/server/pull/491))
|
||||||
|
|
||||||
|
## 1.5.0 2024-12-20
|
||||||
|
|
||||||
|
- cmdeploy dns: always show recommended DNS records
|
||||||
|
([#463](https://github.com/chatmail/server/pull/463))
|
||||||
|
|
||||||
|
- add `--all` to `cmdeploy dns`
|
||||||
|
([#462](https://github.com/chatmail/server/pull/462))
|
||||||
|
|
||||||
|
- fix `_mta-sts` TXT DNS record
|
||||||
|
([#461](https://github.com/chatmail/server/pull/461)
|
||||||
|
|
||||||
|
- deploy `iroh-relay` and also update "realtime relay services" in privacy policy.
|
||||||
|
([#434](https://github.com/chatmail/server/pull/434))
|
||||||
|
([#451](https://github.com/chatmail/server/pull/451))
|
||||||
|
|
||||||
|
- add guide to migrate chatmail to a new server
|
||||||
|
([#429](https://github.com/chatmail/server/pull/429))
|
||||||
|
|
||||||
|
- disable anvil authentication penalty
|
||||||
|
([#414](https://github.com/chatmail/server/pull/444)
|
||||||
|
|
||||||
|
- increase `request_queue_size` for UNIX sockets to 1000.
|
||||||
|
([#437](https://github.com/chatmail/server/pull/437))
|
||||||
|
|
||||||
|
- add argument to `cmdeploy run` for specifying
|
||||||
|
a different SSH host than `mail_domain`
|
||||||
|
([#439](https://github.com/chatmail/server/pull/439))
|
||||||
|
|
||||||
|
- query autoritative nameserver to bypass DNS cache
|
||||||
|
([#424](https://github.com/chatmail/server/pull/424))
|
||||||
|
|
||||||
|
- add mtail support (new optional `mtail_address` ini value)
|
||||||
|
This defines the address on which [`mtail`](https://google.github.io/mtail/)
|
||||||
|
exposes its metrics collected from the logs.
|
||||||
|
If you want to collect the metrics with Prometheus,
|
||||||
|
setup a private network (e.g. WireGuard interface)
|
||||||
|
and assign an IP address from this network to the host.
|
||||||
|
If you do not plan to collect metrics,
|
||||||
|
keep this setting unset.
|
||||||
|
([#388](https://github.com/chatmail/server/pull/388))
|
||||||
|
|
||||||
|
- fix checking for required DNS records
|
||||||
|
([#412](https://github.com/chatmail/server/pull/412))
|
||||||
|
|
||||||
|
- add support for specifying whole domains for recipient passthrough list
|
||||||
|
([#408](https://github.com/chatmail/server/pull/408))
|
||||||
|
|
||||||
|
- add a paragraph about "account deletion" to info page
|
||||||
|
([#405](https://github.com/chatmail/server/pull/405))
|
||||||
|
|
||||||
|
- avoid nginx listening on ipv6 if v6 is dsiabled
|
||||||
|
([#402](https://github.com/chatmail/server/pull/402))
|
||||||
|
|
||||||
|
- refactor ssh-based execution to allow organizing remote functions in
|
||||||
|
modules.
|
||||||
|
([#396](https://github.com/chatmail/server/pull/396))
|
||||||
|
|
||||||
|
- trigger "apt upgrade" during "cmdeploy run"
|
||||||
|
([#398](https://github.com/chatmail/server/pull/398))
|
||||||
|
|
||||||
|
- drop hispanilandia passthrough address
|
||||||
|
([#401](https://github.com/chatmail/server/pull/401))
|
||||||
|
|
||||||
|
- set CAA record flags to 0
|
||||||
|
|
||||||
|
- add IMAP capabilities instead of overwriting them
|
||||||
|
([#413](https://github.com/chatmail/server/pull/413))
|
||||||
|
|
||||||
|
- fix OpenPGP payload check
|
||||||
|
([#435](https://github.com/chatmail/server/pull/435))
|
||||||
|
|
||||||
|
- fix Dovecot quota_max_mail_size to use max_message_size config value
|
||||||
|
([#438](https://github.com/chatmail/server/pull/438))
|
||||||
|
|
||||||
|
|
||||||
|
## 1.4.1 2024-07-31
|
||||||
|
|
||||||
|
- fix metadata dictproxy which would confuse transactions
|
||||||
|
resulting in missed notifications and other issues.
|
||||||
|
([#393](https://github.com/chatmail/server/pull/393))
|
||||||
|
([#394](https://github.com/chatmail/server/pull/394))
|
||||||
|
|
||||||
|
- add optional "imap_rawlog" config option. If true,
|
||||||
|
.in/.out files are created in user home dirs
|
||||||
|
containing the imap protocol messages.
|
||||||
|
([#389](https://github.com/chatmail/server/pull/389))
|
||||||
|
|
||||||
|
## 1.4.0 2024-07-28
|
||||||
|
|
||||||
|
- Add `disable_ipv6` config option to chatmail.ini.
|
||||||
|
Required if the server doesn't have IPv6 connectivity.
|
||||||
|
([#312](https://github.com/chatmail/server/pull/312))
|
||||||
|
|
||||||
|
- allow current K9/Thunderbird-mail releases to send encrypted messages
|
||||||
|
outside by accepting their localized "encrypted subject" strings.
|
||||||
|
([#370](https://github.com/chatmail/server/pull/370))
|
||||||
|
|
||||||
|
- Migrate and remove sqlite database in favor of password/lastlogin tracking
|
||||||
|
in a user's maildir.
|
||||||
|
([#379](https://github.com/chatmail/server/pull/379))
|
||||||
|
|
||||||
|
- Require pyinfra V3 installed on the client side,
|
||||||
|
run `./scripts/initenv.sh` to upgrade locally.
|
||||||
|
([#378](https://github.com/chatmail/server/pull/378))
|
||||||
|
|
||||||
|
- don't hardcode "/home/vmail" paths but rather set them
|
||||||
|
once in the config object and use it everywhere else,
|
||||||
|
thereby also improving testability.
|
||||||
|
([#351](https://github.com/chatmail/server/pull/351))
|
||||||
|
temporarily introduced obligatory "passdb_path" and "mailboxes_dir"
|
||||||
|
settings but they were removed/obsoleted in
|
||||||
|
([#380](https://github.com/chatmail/server/pull/380))
|
||||||
|
|
||||||
|
- BREAKING: new required chatmail.ini value 'delete_inactive_users_after = 100'
|
||||||
|
which removes users from database and mails after 100 days without any login.
|
||||||
|
([#350](https://github.com/chatmail/server/pull/350))
|
||||||
|
|
||||||
|
- Refine DNS checking to distinguish between "required" and "recommended" settings
|
||||||
|
([#372](https://github.com/chatmail/server/pull/372))
|
||||||
|
|
||||||
|
- reload nginx in the acmetool cronjob
|
||||||
|
([#360](https://github.com/chatmail/server/pull/360))
|
||||||
|
|
||||||
|
- remove checking of reverse-DNS PTR records. Chatmail-servers don't
|
||||||
|
depend on it and even in the wider e-mail system it's not common anymore.
|
||||||
|
If it's an issue, a chatmail operator can still care to properly set reverse DNS.
|
||||||
|
([#348](https://github.com/chatmail/server/pull/348))
|
||||||
|
|
||||||
|
- Make DNS-checking faster and more interactive, run it fully during "cmdeploy run",
|
||||||
|
also introducing a generic mechanism for rapid remote ssh-based python function execution.
|
||||||
|
([#346](https://github.com/chatmail/server/pull/346))
|
||||||
|
|
||||||
|
- Don't fix file owner ship of /home/vmail
|
||||||
|
([#345](https://github.com/chatmail/server/pull/345))
|
||||||
|
|
||||||
|
- Support iterating over all users with doveadm commands
|
||||||
|
([#344](https://github.com/chatmail/server/pull/344))
|
||||||
|
|
||||||
|
- Test and fix for attempts to create inadmissible accounts
|
||||||
|
([#333](https://github.com/chatmail/server/pull/321))
|
||||||
|
|
||||||
|
- check that OpenPGP has only PKESK, SKESK and SEIPD packets
|
||||||
|
([#323](https://github.com/chatmail/server/pull/323),
|
||||||
|
[#324](https://github.com/chatmail/server/pull/324))
|
||||||
|
|
||||||
|
- improve filtermail checks for encrypted messages and drop support for unencrypted MDNs
|
||||||
|
([#320](https://github.com/chatmail/server/pull/320))
|
||||||
|
|
||||||
|
- replace `bash` with `/bin/sh`
|
||||||
|
([#334](https://github.com/chatmail/server/pull/334))
|
||||||
|
|
||||||
|
- Increase number of logged in IMAP sessions to 50000
|
||||||
|
([#335](https://github.com/chatmail/server/pull/335))
|
||||||
|
|
||||||
|
- filtermail: do not allow ASCII armor without actual payload
|
||||||
|
([#325](https://github.com/chatmail/server/pull/325))
|
||||||
|
|
||||||
|
- Remove sieve to enable hardlink deduplication in LMTP
|
||||||
|
([#343](https://github.com/chatmail/server/pull/343))
|
||||||
|
|
||||||
|
- dovecot: enable gzip compression on disk
|
||||||
|
([#341](https://github.com/chatmail/server/pull/341))
|
||||||
|
|
||||||
|
- DKIM-sign Content-Type and oversign all signed headers
|
||||||
|
([#296](https://github.com/chatmail/server/pull/296))
|
||||||
|
|
||||||
|
- Add nonci_accounts metric
|
||||||
|
([#347](https://github.com/chatmail/server/pull/347))
|
||||||
|
|
||||||
|
- doveauth: log when a new account is created
|
||||||
|
([#349](https://github.com/chatmail/server/pull/349))
|
||||||
|
|
||||||
|
- Multiplex HTTPS, IMAP and SMTP on port 443
|
||||||
|
([#357](https://github.com/chatmail/server/pull/357))
|
||||||
|
|
||||||
|
## 1.3.0 - 2024-06-06
|
||||||
|
|
||||||
|
- don't check necessary DNS records on cmdeploy init anymore
|
||||||
|
([#316](https://github.com/chatmail/server/pull/316))
|
||||||
|
|
||||||
|
- ensure cron and acl are installed
|
||||||
|
([#293](https://github.com/chatmail/server/pull/293),
|
||||||
|
[#310](https://github.com/chatmail/server/pull/310))
|
||||||
|
|
||||||
|
- change default for delete_mails_after from 40 to 20 days
|
||||||
|
([#300](https://github.com/chatmail/server/pull/300))
|
||||||
|
|
||||||
|
- save journald logs only to memory and save nginx logs to journald instead of file
|
||||||
|
([#299](https://github.com/chatmail/server/pull/299))
|
||||||
|
|
||||||
|
- fix writing of multiple obs repositories in `/etc/apt/sources.list`
|
||||||
|
([#290](https://github.com/chatmail/server/pull/290))
|
||||||
|
|
||||||
|
- metadata: add support for `/shared/vendor/deltachat/irohrelay`
|
||||||
|
([#284](https://github.com/chatmail/server/pull/284))
|
||||||
|
|
||||||
|
- Emit "XCHATMAIL" capability from IMAP server
|
||||||
|
([#278](https://github.com/chatmail/server/pull/278))
|
||||||
|
|
||||||
|
- Move echobot `into /var/lib/echobot`
|
||||||
|
([#281](https://github.com/chatmail/server/pull/281))
|
||||||
|
|
||||||
|
- Accept Let's Encrypt's new Terms of Services
|
||||||
|
([#275](https://github.com/chatmail/server/pull/276))
|
||||||
|
|
||||||
|
- Reload Dovecot and Postfix when TLS certificate updates
|
||||||
|
([#271](https://github.com/chatmail/server/pull/271))
|
||||||
|
|
||||||
|
- Use forked version of dovecot without hardcoded delays
|
||||||
|
([#270](https://github.com/chatmail/server/pull/270))
|
||||||
|
|
||||||
|
## 1.2.0 - 2024-04-04
|
||||||
|
|
||||||
|
- Install dig on the server to resolve DNS records
|
||||||
|
([#267](https://github.com/chatmail/server/pull/267))
|
||||||
|
|
||||||
|
- preserve notification order and exponentially backoff with
|
||||||
|
retries for tokens where we didn't get a successful return
|
||||||
|
([#265](https://github.com/chatmail/server/pull/263))
|
||||||
|
|
||||||
|
- Run chatmail-metadata and doveauth as vmail
|
||||||
|
([#261](https://github.com/chatmail/server/pull/261))
|
||||||
|
|
||||||
|
- Apply systemd restrictions to echobot
|
||||||
|
([#259](https://github.com/chatmail/server/pull/259))
|
||||||
|
|
||||||
|
- re-enable running the CI in pull requests, but not concurrently
|
||||||
|
([#258](https://github.com/chatmail/server/pull/258))
|
||||||
|
|
||||||
|
|
||||||
|
## 1.1.0 - 2024-03-28
|
||||||
|
|
||||||
|
### The changelog starts to record changes from March 15th, 2024
|
||||||
|
|
||||||
|
- Move systemd unit templates to cmdeploy package
|
||||||
|
([#255](https://github.com/chatmail/server/pull/255))
|
||||||
|
|
||||||
|
- Persist push tokens and support multiple device per address
|
||||||
|
([#254](https://github.com/chatmail/server/pull/254))
|
||||||
|
|
||||||
|
- Avoid warning for regular doveauth protocol's hello message.
|
||||||
|
([#250](https://github.com/chatmail/server/pull/250))
|
||||||
|
|
||||||
|
- Fix various tests to pass again with "cmdeploy test".
|
||||||
|
([#245](https://github.com/chatmail/server/pull/245),
|
||||||
|
[#242](https://github.com/chatmail/server/pull/242)
|
||||||
|
|
||||||
|
- Ensure lets-encrypt certificates are reloaded after renewal
|
||||||
|
([#244]) https://github.com/chatmail/server/pull/244
|
||||||
|
|
||||||
|
- Persist tokens to avoid iOS users loosing push-notifications when the
|
||||||
|
chatmail metadata service is restarted (happens regularly during deploys)
|
||||||
|
([#238](https://github.com/chatmail/server/pull/239)
|
||||||
|
|
||||||
|
- Fix failing sieve-script compile errors on incoming messages
|
||||||
|
([#237](https://github.com/chatmail/server/pull/239)
|
||||||
|
|
||||||
|
- Fix quota reporting after expunging of old mails
|
||||||
|
([#233](https://github.com/chatmail/server/pull/239)
|
||||||
21
LICENSE
Normal file
21
LICENSE
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
The MIT License (MIT)
|
||||||
|
|
||||||
|
Copyright (c) 2023, chatmail and delta chat teams
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||||
|
this software and associated documentation files (the "Software"), to deal in
|
||||||
|
the Software without restriction, including without limitation the rights to
|
||||||
|
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
|
||||||
|
of the Software, and to permit persons to whom the Software is furnished to do
|
||||||
|
so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
|
SOFTWARE.
|
||||||
564
README.md
564
README.md
@@ -1,67 +1,535 @@
|
|||||||
# Chat Mail server configuration
|
|
||||||
|
|
||||||
This package deploys Postfix and Dovecot servers, including OpenDKIM for DKIM signing.
|
<img width="800px" src="www/src/collage-top.png"/>
|
||||||
|
|
||||||
|
# Chatmail relays for end-to-end encrypted e-mail
|
||||||
|
|
||||||
|
Chatmail relay servers are interoperable Mail Transport Agents (MTAs) designed for:
|
||||||
|
|
||||||
|
- **Convenience:** Low friction instant onboarding
|
||||||
|
|
||||||
|
- **Privacy:** No name, phone numbers, email required or collected
|
||||||
|
|
||||||
|
- **End-to-End Encryption enforced**: only OpenPGP messages with metadata minimization allowed
|
||||||
|
|
||||||
|
- **Instant:** Privacy-preserving Push Notifications for Apple, Google, and Huawei
|
||||||
|
|
||||||
|
- **Speed:** Message delivery in half a second, with optional P2P realtime connections
|
||||||
|
|
||||||
|
- **Transport Security:** Strict TLS and DKIM enforced
|
||||||
|
|
||||||
|
- **Reliability:** No spam or IP reputation checks; rate-limits are suitable for realtime chats
|
||||||
|
|
||||||
|
- **Efficiency:** Messages are only stored for transit and removed automatically
|
||||||
|
|
||||||
|
This repository contains everything needed to setup a ready-to-use chatmail relay
|
||||||
|
comprised of a minimal setup of the battle-tested
|
||||||
|
[Postfix SMTP](https://www.postfix.org) and [Dovecot IMAP](https://www.dovecot.org) MTAs/MDAs.
|
||||||
|
|
||||||
|
The automated setup is designed and optimized for providing chatmail addresses
|
||||||
|
for immediate permission-free onboarding through chat apps and bots.
|
||||||
|
Chatmail addresses are automatically created at first login,
|
||||||
|
after which the initially specified password is required
|
||||||
|
for sending and receiving messages through them.
|
||||||
|
|
||||||
|
Please see [this list of known apps and client projects](https://chatmail.at/clients.html)
|
||||||
|
and [this list of known public 3rd party chatmail relay servers](https://chatmail.at/relays).
|
||||||
|
|
||||||
|
|
||||||
|
## Minimal requirements, Prerequisites
|
||||||
|
|
||||||
|
You will need the following:
|
||||||
|
|
||||||
|
- Control over a domain through a DNS provider of your choice.
|
||||||
|
|
||||||
|
- A Debian 12 server with reachable SMTP/SUBMISSIONS/IMAPS/HTTPS ports.
|
||||||
|
IPv6 is encouraged if available.
|
||||||
|
Chatmail relay servers only require 1GB RAM, one CPU, and perhaps 10GB storage for a
|
||||||
|
few thousand active chatmail addresses.
|
||||||
|
|
||||||
|
- Key-based SSH authentication to the root user.
|
||||||
|
You must add a passphrase-protected private key to your local ssh-agent
|
||||||
|
because you can't type in your passphrase during deployment.
|
||||||
|
(An ed25519 private key is required due to an [upstream bug in paramiko](https://github.com/paramiko/paramiko/issues/2191))
|
||||||
|
|
||||||
Postfix uses Dovecot for authentication as described in <https://www.postfix.org/SASL_README.html#server_dovecot>
|
|
||||||
|
|
||||||
## Getting started
|
## Getting started
|
||||||
|
|
||||||
prepare:
|
We use `chat.example.org` as the chatmail domain in the following steps.
|
||||||
|
Please substitute it with your own domain.
|
||||||
|
|
||||||
pip install -e chatmail-infra
|
1. Setup the initial DNS records.
|
||||||
|
The following is an example in the familiar BIND zone file format with
|
||||||
|
a TTL of 1 hour (3600 seconds).
|
||||||
|
Please substitute your domain and IP addresses.
|
||||||
|
|
||||||
|
```
|
||||||
|
chat.example.com. 3600 IN A 198.51.100.5
|
||||||
|
chat.example.com. 3600 IN AAAA 2001:db8::5
|
||||||
|
www.chat.example.com. 3600 IN CNAME chat.example.com.
|
||||||
|
mta-sts.chat.example.com. 3600 IN CNAME chat.example.com.
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Clone the repository and bootstrap the Python virtualenv.
|
||||||
|
|
||||||
|
```
|
||||||
|
git clone https://github.com/chatmail/relay
|
||||||
|
cd relay
|
||||||
|
scripts/initenv.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Create chatmail configuration file `chatmail.ini`:
|
||||||
|
|
||||||
|
```
|
||||||
|
scripts/cmdeploy init chat.example.org # <-- use your domain
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Verify that SSH root login works:
|
||||||
|
|
||||||
|
```
|
||||||
|
ssh root@chat.example.org # <-- use your domain
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
then run with pyinfra command line tool:
|
5. Deploy the remote chatmail relay server:
|
||||||
|
|
||||||
CHATMAIL_DOMAIN=c1.testrun.org pyinfra --ssh-user root c1.testrun.org deploy.py
|
```
|
||||||
|
scripts/cmdeploy run
|
||||||
|
```
|
||||||
|
This script will check that you have all necessary DNS records.
|
||||||
|
If DNS records are missing, it will recommend
|
||||||
|
which you should configure at your DNS provider
|
||||||
|
(it can take some time until they are public).
|
||||||
|
|
||||||
|
### Other helpful commands:
|
||||||
|
|
||||||
## Structure (wip)
|
To check the status of your remotely running chatmail service:
|
||||||
```
|
|
||||||
|
|
||||||
# package doveauth tool and deploy chatmail server to a envvar-specified ssh-reachable host
|
|
||||||
deploy.py
|
|
||||||
|
|
||||||
# chatmail pyinfra deploy package
|
|
||||||
chatmail-pyinfra
|
|
||||||
pyproject.toml
|
|
||||||
chatmail/__init__ ...
|
|
||||||
|
|
||||||
# doveauth tool used by dovecot's auth mechanism on the host system
|
|
||||||
doveauth
|
|
||||||
README.md
|
|
||||||
pyproject.toml
|
|
||||||
doveauth.py
|
|
||||||
test_doveauth.py
|
|
||||||
|
|
||||||
# lmtp server to block (outgoing) unencrypted messages
|
|
||||||
filtermail
|
|
||||||
README.md
|
|
||||||
pyproject.toml
|
|
||||||
....
|
|
||||||
|
|
||||||
# online tests (after deploy)
|
|
||||||
|
|
||||||
online-tests # runnable via pytest
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# scripts for setup/development/deployment
|
|
||||||
|
|
||||||
scripts/
|
|
||||||
init.sh # create venv/other perequires
|
|
||||||
deploy.sh # run pyinfra based deploy of everything
|
|
||||||
test.sh # run all local and online tests
|
|
||||||
|
|
||||||
|
```
|
||||||
|
scripts/cmdeploy status
|
||||||
```
|
```
|
||||||
|
|
||||||
## Dovecot/Postfix configuration
|
To display and check all recommended DNS records:
|
||||||
|
|
||||||
|
```
|
||||||
|
scripts/cmdeploy dns
|
||||||
|
```
|
||||||
|
|
||||||
|
To test whether your chatmail service is working correctly:
|
||||||
|
|
||||||
|
```
|
||||||
|
scripts/cmdeploy test
|
||||||
|
```
|
||||||
|
|
||||||
|
To measure the performance of your chatmail service:
|
||||||
|
|
||||||
|
```
|
||||||
|
scripts/cmdeploy bench
|
||||||
|
```
|
||||||
|
|
||||||
|
## Overview of this repository
|
||||||
|
|
||||||
|
This repository has four directories:
|
||||||
|
|
||||||
|
- [cmdeploy](https://github.com/chatmail/relay/tree/main/cmdeploy)
|
||||||
|
is a collection of configuration files
|
||||||
|
and a [pyinfra](https://pyinfra.com)-based deployment script.
|
||||||
|
|
||||||
|
- [chatmaild](https://github.com/chatmail/relay/tree/main/chatmaild)
|
||||||
|
is a Python package containing several small services
|
||||||
|
which handle authentication,
|
||||||
|
trigger push notifications on new messages,
|
||||||
|
ensure that outbound mails are encrypted,
|
||||||
|
delete inactive users,
|
||||||
|
and some other minor things.
|
||||||
|
chatmaild can also be installed as a stand-alone Python package.
|
||||||
|
|
||||||
|
- [www](https://github.com/chatmail/relay/tree/main/www)
|
||||||
|
contains the html, css, and markdown files
|
||||||
|
which make up a chatmail relay's web page.
|
||||||
|
Edit them before deploying to make your chatmail relay stand out.
|
||||||
|
|
||||||
|
- [scripts](https://github.com/chatmail/relay/tree/main/scripts)
|
||||||
|
offers two convenience tools for beginners;
|
||||||
|
`initenv.sh` installs the necessary dependencies to a local virtual environment,
|
||||||
|
and the `scripts/cmdeploy` script enables you
|
||||||
|
to run the `cmdeploy` command line tool in the local virtual environment.
|
||||||
|
|
||||||
|
### cmdeploy
|
||||||
|
|
||||||
|
The `cmdeploy/src/cmdeploy/cmdeploy.py` command line tool
|
||||||
|
helps with setting up and managing the chatmail service.
|
||||||
|
`cmdeploy init` creates the `chatmail.ini` config file.
|
||||||
|
`cmdeploy run` uses a [pyinfra](https://pyinfra.com/)-based [script](`cmdeploy/src/cmdeploy/__init__.py`)
|
||||||
|
to automatically install or upgrade all chatmail components on a relay,
|
||||||
|
according to the `chatmail.ini` config.
|
||||||
|
|
||||||
|
The components of chatmail are:
|
||||||
|
|
||||||
|
- [Postfix SMTP MTA](https://www.postfix.org) accepts and relays messages
|
||||||
|
(both from your users and from the wider e-mail MTA network)
|
||||||
|
|
||||||
|
- [Dovecot IMAP MDA](https://www.dovecot.org) stores messages for your users until they download them
|
||||||
|
|
||||||
|
- [Nginx](https://nginx.org/) shows the web page with your privacy policy and additional information
|
||||||
|
|
||||||
|
- [acmetool](https://hlandau.github.io/acmetool/) manages TLS certificates for Dovecot, Postfix, and Nginx
|
||||||
|
|
||||||
|
- [OpenDKIM](http://www.opendkim.org/) for signing messages with DKIM and rejecting inbound messages without DKIM
|
||||||
|
|
||||||
|
- [mtail](https://google.github.io/mtail/) for collecting anonymized metrics in case you have monitoring
|
||||||
|
|
||||||
|
- [Iroh relay](https://www.iroh.computer/docs/concepts/relay)
|
||||||
|
which helps client devices to establish Peer-to-Peer connections
|
||||||
|
|
||||||
|
- and the chatmaild services, explained in the next section:
|
||||||
|
|
||||||
|
### chatmaild
|
||||||
|
|
||||||
|
`chatmaild` implements various systemd-controlled services
|
||||||
|
that integrate with Dovecot and Postfix to achieve instant-onboarding and
|
||||||
|
only relaying OpenPGP end-to-end messages encrypted messages.
|
||||||
|
A short overview of `chatmaild` services:
|
||||||
|
|
||||||
|
- [`doveauth`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/doveauth.py)
|
||||||
|
implements create-on-login address semantics and is used
|
||||||
|
by Dovecot during IMAP login and by Postfix during SMTP/SUBMISSION login
|
||||||
|
which in turn uses [Dovecot SASL](https://doc.dovecot.org/configuration_manual/authentication/dict/#complete-example-for-authenticating-via-a-unix-socket)
|
||||||
|
to authenticate logins.
|
||||||
|
|
||||||
|
- [`filtermail`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/filtermail.py)
|
||||||
|
prevents unencrypted email from leaving or entering the chatmail service
|
||||||
|
and is integrated into Postfix's outbound and inbound mail pipelines.
|
||||||
|
|
||||||
|
- [`chatmail-metadata`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/metadata.py) is contacted by a
|
||||||
|
[Dovecot lua script](https://github.com/chatmail/relay/blob/main/cmdeploy/src/cmdeploy/dovecot/push_notification.lua)
|
||||||
|
to store user-specific relay-side config.
|
||||||
|
On new messages,
|
||||||
|
it [passes the user's push notification token](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/notifier.py)
|
||||||
|
to [notifications.delta.chat](https://delta.chat/help#instant-delivery)
|
||||||
|
so the push notifications on the user's phone can be triggered
|
||||||
|
by Apple/Google/Huawei.
|
||||||
|
|
||||||
|
- [`delete_inactive_users`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/delete_inactive_users.py)
|
||||||
|
deletes users if they have not logged in for a very long time.
|
||||||
|
The timeframe can be configured in `chatmail.ini`.
|
||||||
|
|
||||||
|
- [`lastlogin`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/lastlogin.py)
|
||||||
|
is contacted by Dovecot when a user logs in
|
||||||
|
and stores the date of the login.
|
||||||
|
|
||||||
|
- [`echobot`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/echo.py)
|
||||||
|
is a small bot for test purposes.
|
||||||
|
It simply echoes back messages from users.
|
||||||
|
|
||||||
|
- [`chatmail-metrics`](https://github.com/chatmail/relay/blob/main/chatmaild/src/chatmaild/metrics.py)
|
||||||
|
collects some metrics and displays them at `https://example.org/metrics`.
|
||||||
|
|
||||||
|
### Home page and getting started for users
|
||||||
|
|
||||||
|
`cmdeploy run` also creates default static web pages and deploys them
|
||||||
|
to a Nginx web server with:
|
||||||
|
|
||||||
|
- a default `index.html` along with a QR code that users can click to
|
||||||
|
create an address on your chatmail relay
|
||||||
|
|
||||||
|
- a default `info.html` that is linked from the home page
|
||||||
|
|
||||||
|
- a default `policy.html` that is linked from the home page
|
||||||
|
|
||||||
|
All `.html` files are generated
|
||||||
|
by the according markdown `.md` file in the `www/src` directory.
|
||||||
|
|
||||||
|
|
||||||
|
### Refining the web pages
|
||||||
|
|
||||||
|
```
|
||||||
|
scripts/cmdeploy webdev
|
||||||
|
```
|
||||||
|
|
||||||
|
This starts a local live development cycle for chatmail web pages:
|
||||||
|
|
||||||
|
- uses the `www/src/page-layout.html` file for producing static
|
||||||
|
HTML pages from `www/src/*.md` files
|
||||||
|
|
||||||
|
- continously builds the web presence reading files from `www/src` directory
|
||||||
|
and generating HTML files and copying assets to the `www/build` directory.
|
||||||
|
|
||||||
|
- Starts a browser window automatically where you can "refresh" as needed.
|
||||||
|
|
||||||
|
## Mailbox directory layout
|
||||||
|
|
||||||
|
Fresh chatmail addresses have a mailbox directory that contains:
|
||||||
|
|
||||||
|
- a `password` file with the salted password required for authenticating
|
||||||
|
whether a login may use the address to send/receive messages.
|
||||||
|
If you modify the password file manually, you effectively block the user.
|
||||||
|
|
||||||
|
- `enforceE2EEincoming` is a default-created file with each address.
|
||||||
|
If present the file indicates that this chatmail address rejects incoming cleartext messages.
|
||||||
|
If absent the address accepts incoming cleartext messages.
|
||||||
|
|
||||||
|
- `dovecot*`, `cur`, `new` and `tmp` represent IMAP/mailbox state.
|
||||||
|
If the address is only used by one device, the Maildir directories
|
||||||
|
will typically be empty unless the user of that address hasn't been online
|
||||||
|
for a while.
|
||||||
|
|
||||||
|
|
||||||
|
## Emergency Commands to disable automatic address creation
|
||||||
|
|
||||||
|
If you need to stop address creation,
|
||||||
|
e.g. because some script is wildly creating addresses,
|
||||||
|
login with ssh and run:
|
||||||
|
|
||||||
|
```
|
||||||
|
touch /etc/chatmail-nocreate
|
||||||
|
```
|
||||||
|
|
||||||
|
Chatmail address creation will be denied while this file is present.
|
||||||
|
|
||||||
### Ports
|
### Ports
|
||||||
|
|
||||||
Postfix listens on ports 25 (smtp) and 587 (submission) and 465 (submissions).
|
[Postfix](http://www.postfix.org/) listens on ports 25 (SMTP) and 587 (SUBMISSION) and 465 (SUBMISSIONS).
|
||||||
Dovecot listens on ports 143(imap) and 993 (imaps).
|
[Dovecot](https://www.dovecot.org/) listens on ports 143 (IMAP) and 993 (IMAPS).
|
||||||
|
[Nginx](https://www.nginx.com/) listens on port 8443 (HTTPS-ALT) and 443 (HTTPS).
|
||||||
|
Port 443 multiplexes HTTPS, IMAP and SMTP using ALPN to redirect connections to ports 8443, 465 or 993.
|
||||||
|
[acmetool](https://hlandau.github.io/acmetool/) listens on port 80 (HTTP).
|
||||||
|
|
||||||
## DNS
|
chatmail-core based apps will, however, discover all ports and configurations
|
||||||
|
automatically by reading the [autoconfig XML file](https://www.ietf.org/archive/id/draft-bucksch-autoconfig-00.html) from the chatmail relay server.
|
||||||
|
|
||||||
For DKIM you must add a DNS entry as in /etc/opendkim/selector.txt (where selector is the opendkim_selector configured in the chatmail inventory).
|
## Email authentication
|
||||||
|
|
||||||
|
Chatmail relays enforce [DKIM](https://www.rfc-editor.org/rfc/rfc6376)
|
||||||
|
to authenticate incoming emails.
|
||||||
|
Incoming emails must have a valid DKIM signature with
|
||||||
|
Signing Domain Identifier (SDID, `d=` parameter in the DKIM-Signature header)
|
||||||
|
equal to the `From:` header domain.
|
||||||
|
This property is checked by OpenDKIM screen policy script
|
||||||
|
before validating the signatures.
|
||||||
|
This correpsonds to strict [DMARC](https://www.rfc-editor.org/rfc/rfc7489) alignment (`adkim=s`),
|
||||||
|
but chatmail does not rely on DMARC and does not consult the sender policy published in DMARC records.
|
||||||
|
Other legacy authentication mechanisms such as [iprev](https://www.rfc-editor.org/rfc/rfc8601#section-2.7.3)
|
||||||
|
and [SPF](https://www.rfc-editor.org/rfc/rfc7208) are also not taken into account.
|
||||||
|
If there is no valid DKIM signature on the incoming email,
|
||||||
|
the sender receives a "5.7.1 No valid DKIM signature found" error.
|
||||||
|
|
||||||
|
Outgoing emails must be sent over authenticated connection
|
||||||
|
with envelope MAIL FROM (return path) corresponding to the login.
|
||||||
|
This is ensured by Postfix which maps login username
|
||||||
|
to MAIL FROM with
|
||||||
|
[`smtpd_sender_login_maps`](https://www.postfix.org/postconf.5.html#smtpd_sender_login_maps)
|
||||||
|
and rejects incorrectly authenticated emails with [`reject_sender_login_mismatch`](reject_sender_login_mismatch) policy.
|
||||||
|
`From:` header must correspond to envelope MAIL FROM,
|
||||||
|
this is ensured by `filtermail` proxy.
|
||||||
|
|
||||||
|
## TLS requirements
|
||||||
|
|
||||||
|
Postfix is configured to require valid TLS
|
||||||
|
by setting [`smtp_tls_security_level`](https://www.postfix.org/postconf.5.html#smtp_tls_security_level) to `verify`.
|
||||||
|
If emails don't arrive at your chatmail relay server,
|
||||||
|
the problem is likely that your relay does not have a valid TLS certificate.
|
||||||
|
|
||||||
|
You can test it by resolving `MX` records of your relay domain
|
||||||
|
and then connecting to MX relays (e.g `mx.example.org`) with
|
||||||
|
`openssl s_client -connect mx.example.org:25 -verify_hostname mx.example.org -verify_return_error -starttls smtp`
|
||||||
|
from the host that has open port 25 to verify that certificate is valid.
|
||||||
|
|
||||||
|
When providing a TLS certificate to your chatmail relay server,
|
||||||
|
make sure to provide the full certificate chain
|
||||||
|
and not just the last certificate.
|
||||||
|
|
||||||
|
If you are running an Exim server and don't see incoming connections
|
||||||
|
from a chatmail relay server in the logs,
|
||||||
|
make sure `smtp_no_mail` log item is enabled in the config
|
||||||
|
with `log_selector = +smtp_no_mail`.
|
||||||
|
By default Exim does not log sessions that are closed
|
||||||
|
before sending the `MAIL` command.
|
||||||
|
This happens if certificate is not recognized as valid by Postfix,
|
||||||
|
so you might think that connection is not established
|
||||||
|
while actually it is a problem with your TLS certificate.
|
||||||
|
|
||||||
|
## Migrating a chatmail relay to a new host
|
||||||
|
|
||||||
|
If you want to migrate chatmail relay from an old machine
|
||||||
|
to a new machine,
|
||||||
|
you can use these steps.
|
||||||
|
They were tested with a Linux laptop;
|
||||||
|
you might need to adjust some of the steps to your environment.
|
||||||
|
|
||||||
|
Let's assume that your `mail_domain` is `mail.example.org`,
|
||||||
|
all involved machines run Debian 12,
|
||||||
|
your old site's IP address is `13.37.13.37`,
|
||||||
|
and your new site's IP address is `13.12.23.42`.
|
||||||
|
|
||||||
|
Note, you should lower the TTLs of your DNS records to a value
|
||||||
|
such as 300 (5 minutes) so the migration happens as smoothly as possible.
|
||||||
|
|
||||||
|
During the guide you might get a warning about changed SSH Host keys;
|
||||||
|
in this case, just run `ssh-keygen -R "mail.example.org"` as recommended.
|
||||||
|
|
||||||
|
1. First, disable mail services on the old site.
|
||||||
|
|
||||||
|
```
|
||||||
|
cmdeploy run --disable-mail --ssh-host 13.37.13.37
|
||||||
|
```
|
||||||
|
|
||||||
|
Now your users will notice the migration
|
||||||
|
and will not be able to send or receive messages
|
||||||
|
until the migration is completed.
|
||||||
|
|
||||||
|
2. Now we want to copy `/home/vmail`, `/var/lib/acme`, `/etc/dkimkeys`, `/run/echobot`, and `/var/spool/postfix` to the new site.
|
||||||
|
Login to the old site while forwarding your SSH agent
|
||||||
|
so you can copy directly from the old to the new site with your SSH key:
|
||||||
|
```
|
||||||
|
ssh -A root@13.37.13.37
|
||||||
|
tar c - /home/vmail/mail /var/lib/acme /etc/dkimkeys /run/echobot /var/spool/postfix | ssh root@13.12.23.42 "tar x -C /"
|
||||||
|
```
|
||||||
|
|
||||||
|
This transfers all addresses, the TLS certificate, DKIM keys (so DKIM DNS record remains valid), and the echobot's password so it continues to function.
|
||||||
|
It also preserves the Postfix mail spool so any messages pending delivery will still be delivered.
|
||||||
|
|
||||||
|
3. Install chatmail on the new machine:
|
||||||
|
|
||||||
|
```
|
||||||
|
cmdeploy run --disable-mail --ssh-host 13.12.23.42
|
||||||
|
```
|
||||||
|
Postfix and Dovecot are disabled for now; we will enable them later.
|
||||||
|
We first need to make the new site fully operational.
|
||||||
|
|
||||||
|
3. On the new site, run the following to ensure the ownership is correct in case UIDs/GIDs changed:
|
||||||
|
|
||||||
|
```
|
||||||
|
chown root: -R /var/lib/acme
|
||||||
|
chown opendkim: -R /etc/dkimkeys
|
||||||
|
chown vmail: -R /home/vmail/mail
|
||||||
|
chown echobot: -R /run/echobot
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Now, update DNS entries.
|
||||||
|
|
||||||
|
If other MTAs try to deliver messages to your chatmail domain they may fail intermittently,
|
||||||
|
as DNS catches up with the new site settings
|
||||||
|
but normally will retry delivering messages
|
||||||
|
for at least a week, so messages will not be lost.
|
||||||
|
|
||||||
|
5. Finally, you can execute `cmdeploy run --ssh-host 13.12.23.42` to turn on chatmail on the new relay.
|
||||||
|
Your users will be able to use the chatmail relay as soon as the DNS changes have propagated.
|
||||||
|
Voilà!
|
||||||
|
|
||||||
|
## Setting up a reverse proxy
|
||||||
|
|
||||||
|
A chatmail relay MTA does not track or depend on the client IP address
|
||||||
|
for its operation, so it can be run behind a reverse proxy.
|
||||||
|
This will not even affect incoming mail authentication
|
||||||
|
as DKIM only checks the cryptographic signature
|
||||||
|
of the message and does not use the IP address as the input.
|
||||||
|
|
||||||
|
For example, you may want to self-host your chatmail relay
|
||||||
|
and only use hosted VPS to provide a public IP address
|
||||||
|
for client connections and incoming mail.
|
||||||
|
You can connect chatmail relay to VPS
|
||||||
|
using a tunnel protocol
|
||||||
|
such as [WireGuard](https://www.wireguard.com/)
|
||||||
|
and setup a reverse proxy on a VPS
|
||||||
|
to forward connections to the chatmail relay
|
||||||
|
over the tunnel.
|
||||||
|
You can also setup multiple reverse proxies
|
||||||
|
for your chatmail relay in different networks
|
||||||
|
to ensure your relay is reachable even when
|
||||||
|
one of the IPs becomes inaccessible due to
|
||||||
|
hosting or routing problems.
|
||||||
|
|
||||||
|
Note that your chatmail relay still needs
|
||||||
|
to be able to make outgoing connections on port 25
|
||||||
|
to send messages outside.
|
||||||
|
|
||||||
|
To setup a reverse proxy
|
||||||
|
(or rather Destination NAT, DNAT)
|
||||||
|
for your chatmail relay,
|
||||||
|
put the following configuration in `/etc/nftables.conf`:
|
||||||
|
```
|
||||||
|
#!/usr/sbin/nft -f
|
||||||
|
|
||||||
|
flush ruleset
|
||||||
|
|
||||||
|
define wan = eth0
|
||||||
|
|
||||||
|
# Which ports to proxy.
|
||||||
|
#
|
||||||
|
# Note that SSH is not proxied
|
||||||
|
# so it is possible to log into the proxy server
|
||||||
|
# and not the original one.
|
||||||
|
define ports = { smtp, http, https, imap, imaps, submission, submissions }
|
||||||
|
|
||||||
|
# The host we want to proxy to.
|
||||||
|
define ipv4_address = AAA.BBB.CCC.DDD
|
||||||
|
define ipv6_address = [XXX::1]
|
||||||
|
|
||||||
|
table ip nat {
|
||||||
|
chain prerouting {
|
||||||
|
type nat hook prerouting priority dstnat; policy accept;
|
||||||
|
iif $wan tcp dport $ports dnat to $ipv4_address
|
||||||
|
}
|
||||||
|
|
||||||
|
chain postrouting {
|
||||||
|
type nat hook postrouting priority 0;
|
||||||
|
|
||||||
|
oifname $wan masquerade
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
table ip6 nat {
|
||||||
|
chain prerouting {
|
||||||
|
type nat hook prerouting priority dstnat; policy accept;
|
||||||
|
iif $wan tcp dport $ports dnat to $ipv6_address
|
||||||
|
}
|
||||||
|
|
||||||
|
chain postrouting {
|
||||||
|
type nat hook postrouting priority 0;
|
||||||
|
|
||||||
|
oifname $wan masquerade
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
table inet filter {
|
||||||
|
chain input {
|
||||||
|
type filter hook input priority filter; policy drop;
|
||||||
|
|
||||||
|
# Accept ICMP.
|
||||||
|
# It is especially important to accept ICMPv6 ND messages,
|
||||||
|
# otherwise IPv6 connectivity breaks.
|
||||||
|
icmp type { echo-request } accept
|
||||||
|
icmpv6 type { echo-request, nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert } accept
|
||||||
|
|
||||||
|
# Allow incoming SSH connections.
|
||||||
|
tcp dport { ssh } accept
|
||||||
|
|
||||||
|
ct state established accept
|
||||||
|
}
|
||||||
|
chain forward {
|
||||||
|
type filter hook forward priority filter; policy drop;
|
||||||
|
|
||||||
|
ct state established accept
|
||||||
|
ip daddr $ipv4_address counter accept
|
||||||
|
ip6 daddr $ipv6_address counter accept
|
||||||
|
}
|
||||||
|
chain output {
|
||||||
|
type filter hook output priority filter;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Run `systemctl enable nftables.service`
|
||||||
|
to ensure configuration is reloaded when the proxy relay reboots.
|
||||||
|
|
||||||
|
Uncomment in `/etc/sysctl.conf` the following two lines:
|
||||||
|
|
||||||
|
```
|
||||||
|
net.ipv4.ip_forward=1
|
||||||
|
net.ipv6.conf.all.forwarding=1
|
||||||
|
```
|
||||||
|
|
||||||
|
Then reboot the relay or do `sysctl -p` and `nft -f /etc/nftables.conf`.
|
||||||
|
|
||||||
|
Once proxy relay is set up,
|
||||||
|
you can add its IP address to the DNS.
|
||||||
|
|||||||
3
chatmaild/MANIFEST.in
Normal file
3
chatmaild/MANIFEST.in
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
include src/chatmaild/ini/*.ini.f
|
||||||
|
include src/chatmaild/ini/*.ini
|
||||||
|
include src/chatmaild/tests/mail-data/*
|
||||||
@@ -1,35 +1,71 @@
|
|||||||
[build-system]
|
[build-system]
|
||||||
requires = ["setuptools>=45"]
|
requires = ["setuptools>=61"]
|
||||||
build-backend = "setuptools.build_meta"
|
build-backend = "setuptools.build_meta"
|
||||||
|
|
||||||
[project]
|
[project]
|
||||||
name = "chatmaild"
|
name = "chatmaild"
|
||||||
version = "0.1"
|
version = "0.2"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"aiosmtpd"
|
"aiosmtpd",
|
||||||
|
"iniconfig",
|
||||||
|
"deltachat-rpc-server",
|
||||||
|
"deltachat-rpc-client",
|
||||||
|
"filelock",
|
||||||
|
"requests",
|
||||||
|
"crypt-r >= 3.13.1 ; python_version >= '3.11'",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[tool.setuptools]
|
||||||
|
include-package-data = true
|
||||||
|
|
||||||
|
[tool.setuptools.packages.find]
|
||||||
|
where = ['src']
|
||||||
|
|
||||||
[project.scripts]
|
[project.scripts]
|
||||||
doveauth = "chatmaild.doveauth:main"
|
doveauth = "chatmaild.doveauth:main"
|
||||||
doveauth-dictproxy = "chatmaild.dictproxy:main"
|
chatmail-metadata = "chatmaild.metadata:main"
|
||||||
filtermail = "chatmaild.filtermail:main"
|
filtermail = "chatmaild.filtermail:main"
|
||||||
|
echobot = "chatmaild.echo:main"
|
||||||
|
chatmail-metrics = "chatmaild.metrics:main"
|
||||||
|
delete_inactive_users = "chatmaild.delete_inactive_users:main"
|
||||||
|
lastlogin = "chatmaild.lastlogin:main"
|
||||||
|
|
||||||
|
[project.entry-points.pytest11]
|
||||||
|
"chatmaild.testplugin" = "chatmaild.tests.plugin"
|
||||||
|
|
||||||
[tool.pytest.ini_options]
|
[tool.pytest.ini_options]
|
||||||
addopts = "-v -ra --strict-markers"
|
addopts = "-v -ra --strict-markers"
|
||||||
|
log_format = "%(asctime)s %(levelname)s %(message)s"
|
||||||
|
log_date_format = "%Y-%m-%d %H:%M:%S"
|
||||||
|
log_level = "INFO"
|
||||||
|
|
||||||
|
[tool.ruff]
|
||||||
|
lint.select = [
|
||||||
|
"F", # Pyflakes
|
||||||
|
"I", # isort
|
||||||
|
|
||||||
|
"PLC", # Pylint Convention
|
||||||
|
"PLE", # Pylint Error
|
||||||
|
"PLW", # Pylint Warning
|
||||||
|
]
|
||||||
|
|
||||||
[tool.tox]
|
[tool.tox]
|
||||||
legacy_tox_ini = """
|
legacy_tox_ini = """
|
||||||
[tox]
|
[tox]
|
||||||
isolated_build = true
|
isolated_build = true
|
||||||
envlist = lint
|
envlist = lint,py
|
||||||
|
|
||||||
[testenv:lint]
|
[testenv:lint]
|
||||||
skipdist = True
|
skipdist = True
|
||||||
skip_install = True
|
skip_install = True
|
||||||
deps =
|
deps =
|
||||||
ruff
|
ruff
|
||||||
black
|
|
||||||
commands =
|
commands =
|
||||||
black --quiet --check --diff src/
|
ruff format --quiet --diff src/
|
||||||
ruff src/
|
ruff check src/
|
||||||
|
|
||||||
|
[testenv]
|
||||||
|
deps = pytest
|
||||||
|
pdbpp
|
||||||
|
commands = pytest -v -rsXx {posargs}
|
||||||
"""
|
"""
|
||||||
|
|||||||
@@ -0,0 +1 @@
|
|||||||
|
|
||||||
|
|||||||
131
chatmaild/src/chatmaild/config.py
Normal file
131
chatmaild/src/chatmaild/config.py
Normal file
@@ -0,0 +1,131 @@
|
|||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
import iniconfig
|
||||||
|
|
||||||
|
from chatmaild.user import User
|
||||||
|
|
||||||
|
echobot_password_path = Path("/run/echobot/password")
|
||||||
|
|
||||||
|
|
||||||
|
def read_config(inipath):
|
||||||
|
assert Path(inipath).exists(), inipath
|
||||||
|
cfg = iniconfig.IniConfig(inipath)
|
||||||
|
params = cfg.sections["params"]
|
||||||
|
default_config_content = get_default_config_content(params["mail_domain"])
|
||||||
|
df_params = iniconfig.IniConfig("ini", data=default_config_content)["params"]
|
||||||
|
new_params = dict(df_params.items())
|
||||||
|
new_params.update(params)
|
||||||
|
return Config(inipath, params=new_params)
|
||||||
|
|
||||||
|
|
||||||
|
class Config:
|
||||||
|
def __init__(self, inipath, params):
|
||||||
|
self._inipath = inipath
|
||||||
|
self.mail_domain = params["mail_domain"]
|
||||||
|
self.max_user_send_per_minute = int(params["max_user_send_per_minute"])
|
||||||
|
self.max_mailbox_size = params["max_mailbox_size"]
|
||||||
|
self.max_message_size = int(params.get("max_message_size", "31457280"))
|
||||||
|
self.delete_mails_after = params["delete_mails_after"]
|
||||||
|
self.delete_inactive_users_after = int(params["delete_inactive_users_after"])
|
||||||
|
self.username_min_length = int(params["username_min_length"])
|
||||||
|
self.username_max_length = int(params["username_max_length"])
|
||||||
|
self.password_min_length = int(params["password_min_length"])
|
||||||
|
self.passthrough_senders = params["passthrough_senders"].split()
|
||||||
|
self.passthrough_recipients = params["passthrough_recipients"].split()
|
||||||
|
self.filtermail_smtp_port = int(params["filtermail_smtp_port"])
|
||||||
|
self.filtermail_smtp_port_incoming = int(
|
||||||
|
params["filtermail_smtp_port_incoming"]
|
||||||
|
)
|
||||||
|
self.postfix_reinject_port = int(params["postfix_reinject_port"])
|
||||||
|
self.postfix_reinject_port_incoming = int(
|
||||||
|
params["postfix_reinject_port_incoming"]
|
||||||
|
)
|
||||||
|
self.mtail_address = params.get("mtail_address")
|
||||||
|
self.disable_ipv6 = params.get("disable_ipv6", "false").lower() == "true"
|
||||||
|
self.imap_rawlog = params.get("imap_rawlog", "false").lower() == "true"
|
||||||
|
if "iroh_relay" not in params:
|
||||||
|
self.iroh_relay = "https://" + params["mail_domain"]
|
||||||
|
self.enable_iroh_relay = True
|
||||||
|
else:
|
||||||
|
self.iroh_relay = params["iroh_relay"].strip()
|
||||||
|
self.enable_iroh_relay = False
|
||||||
|
self.privacy_postal = params.get("privacy_postal")
|
||||||
|
self.privacy_mail = params.get("privacy_mail")
|
||||||
|
self.privacy_pdo = params.get("privacy_pdo")
|
||||||
|
self.privacy_supervisor = params.get("privacy_supervisor")
|
||||||
|
|
||||||
|
# deprecated option
|
||||||
|
mbdir = params.get("mailboxes_dir", f"/home/vmail/mail/{self.mail_domain}")
|
||||||
|
self.mailboxes_dir = Path(mbdir.strip())
|
||||||
|
|
||||||
|
# old unused option (except for first migration from sqlite to maildir store)
|
||||||
|
self.passdb_path = Path(params.get("passdb_path", "/home/vmail/passdb.sqlite"))
|
||||||
|
|
||||||
|
def _getbytefile(self):
|
||||||
|
return open(self._inipath, "rb")
|
||||||
|
|
||||||
|
def get_user(self, addr):
|
||||||
|
if not addr or "@" not in addr or "/" in addr:
|
||||||
|
raise ValueError(f"invalid address {addr!r}")
|
||||||
|
|
||||||
|
maildir = self.mailboxes_dir.joinpath(addr)
|
||||||
|
if addr.startswith("echo@"):
|
||||||
|
password_path = echobot_password_path
|
||||||
|
else:
|
||||||
|
password_path = maildir.joinpath("password")
|
||||||
|
|
||||||
|
return User(maildir, addr, password_path, uid="vmail", gid="vmail")
|
||||||
|
|
||||||
|
|
||||||
|
def write_initial_config(inipath, mail_domain, overrides):
|
||||||
|
"""Write out default config file, using the specified config value overrides."""
|
||||||
|
content = get_default_config_content(mail_domain, **overrides)
|
||||||
|
inipath.write_text(content)
|
||||||
|
|
||||||
|
|
||||||
|
def get_default_config_content(mail_domain, **overrides):
|
||||||
|
from importlib.resources import files
|
||||||
|
|
||||||
|
inidir = files(__package__).joinpath("ini")
|
||||||
|
source_inipath = inidir.joinpath("chatmail.ini.f")
|
||||||
|
content = source_inipath.read_text().format(mail_domain=mail_domain)
|
||||||
|
|
||||||
|
# apply config overrides
|
||||||
|
new_lines = []
|
||||||
|
extra = overrides.copy()
|
||||||
|
for line in content.split("\n"):
|
||||||
|
new_line = line.strip()
|
||||||
|
if new_line and new_line[0] not in "#[":
|
||||||
|
name, value = map(str.strip, new_line.split("=", maxsplit=1))
|
||||||
|
value = extra.pop(name, value)
|
||||||
|
new_line = f"{name} = {value}"
|
||||||
|
new_lines.append(new_line)
|
||||||
|
|
||||||
|
for name, value in extra.items():
|
||||||
|
new_line = f"{name} = {value}"
|
||||||
|
new_lines.append(new_line)
|
||||||
|
|
||||||
|
content = "\n".join(new_lines)
|
||||||
|
|
||||||
|
# apply testrun privacy overrides
|
||||||
|
|
||||||
|
if mail_domain.endswith(".testrun.org"):
|
||||||
|
override_inipath = inidir.joinpath("override-testrun.ini")
|
||||||
|
privacy = iniconfig.IniConfig(override_inipath)["privacy"]
|
||||||
|
lines = []
|
||||||
|
for line in content.split("\n"):
|
||||||
|
for key, value in privacy.items():
|
||||||
|
value_lines = value.strip().split("\n")
|
||||||
|
if not line.startswith(f"{key} =") or not value_lines:
|
||||||
|
continue
|
||||||
|
if len(value_lines) == 1:
|
||||||
|
lines.append(f"{key} = {value}")
|
||||||
|
else:
|
||||||
|
lines.append(f"{key} =")
|
||||||
|
for vl in value_lines:
|
||||||
|
lines.append(f" {vl}")
|
||||||
|
break
|
||||||
|
else:
|
||||||
|
lines.append(line)
|
||||||
|
content = "\n".join(lines)
|
||||||
|
return content
|
||||||
@@ -1,140 +0,0 @@
|
|||||||
import sqlite3
|
|
||||||
import contextlib
|
|
||||||
import time
|
|
||||||
from pathlib import Path
|
|
||||||
|
|
||||||
|
|
||||||
class DBError(Exception):
|
|
||||||
"""error during an operation on the database."""
|
|
||||||
|
|
||||||
|
|
||||||
class Connection:
|
|
||||||
def __init__(self, sqlconn, write):
|
|
||||||
self._sqlconn = sqlconn
|
|
||||||
self._write = write
|
|
||||||
|
|
||||||
def close(self):
|
|
||||||
self._sqlconn.close()
|
|
||||||
|
|
||||||
def commit(self):
|
|
||||||
self._sqlconn.commit()
|
|
||||||
|
|
||||||
def rollback(self):
|
|
||||||
self._sqlconn.rollback()
|
|
||||||
|
|
||||||
def execute(self, query, params=()):
|
|
||||||
cur = self.cursor()
|
|
||||||
try:
|
|
||||||
cur.execute(query, params)
|
|
||||||
except sqlite3.IntegrityError as e:
|
|
||||||
raise DBError(e)
|
|
||||||
return cur
|
|
||||||
|
|
||||||
def cursor(self):
|
|
||||||
return self._sqlconn.cursor()
|
|
||||||
|
|
||||||
def create_user(self, addr: str, password: str):
|
|
||||||
"""Create a row in the users table."""
|
|
||||||
self.execute("PRAGMA foreign_keys=on")
|
|
||||||
q = """INSERT INTO users (addr, password, last_login)
|
|
||||||
VALUES (?, ?, ?)"""
|
|
||||||
self.execute(q, (addr, password, int(time.time())))
|
|
||||||
|
|
||||||
def get_user(self, addr: str) -> {}:
|
|
||||||
"""Get a row from the users table."""
|
|
||||||
q = "SELECT addr, password, last_login from users WHERE addr = ?"
|
|
||||||
row = self._sqlconn.execute(q, (addr,)).fetchone()
|
|
||||||
result = {}
|
|
||||||
if row:
|
|
||||||
result = dict(
|
|
||||||
user=row[0],
|
|
||||||
password=row[1],
|
|
||||||
last_login=row[2],
|
|
||||||
)
|
|
||||||
return result
|
|
||||||
|
|
||||||
|
|
||||||
class Database:
|
|
||||||
def __init__(self, path: str):
|
|
||||||
self.path = Path(path)
|
|
||||||
self.ensure_tables()
|
|
||||||
|
|
||||||
def _get_connection(
|
|
||||||
self, write=False, transaction=False, closing=False
|
|
||||||
) -> Connection:
|
|
||||||
# we let the database serialize all writers at connection time
|
|
||||||
# to play it very safe (we don't have massive amounts of writes).
|
|
||||||
mode = "ro"
|
|
||||||
if write:
|
|
||||||
mode = "rw"
|
|
||||||
if not self.path.exists():
|
|
||||||
mode = "rwc"
|
|
||||||
uri = "file:%s?mode=%s" % (self.path, mode)
|
|
||||||
sqlconn = sqlite3.connect(
|
|
||||||
uri,
|
|
||||||
timeout=60,
|
|
||||||
isolation_level=None if transaction else "DEFERRED",
|
|
||||||
uri=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
# Enable Write-Ahead Logging to avoid readers blocking writers and vice versa.
|
|
||||||
if write:
|
|
||||||
sqlconn.execute("PRAGMA journal_mode=wal")
|
|
||||||
|
|
||||||
if transaction:
|
|
||||||
start_time = time.time()
|
|
||||||
while 1:
|
|
||||||
try:
|
|
||||||
sqlconn.execute("begin immediate")
|
|
||||||
break
|
|
||||||
except sqlite3.OperationalError:
|
|
||||||
# another thread may be writing, give it a chance to finish
|
|
||||||
time.sleep(0.1)
|
|
||||||
if time.time() - start_time > 5:
|
|
||||||
# if it takes this long, something is wrong
|
|
||||||
raise
|
|
||||||
conn = Connection(sqlconn, write=write)
|
|
||||||
if closing:
|
|
||||||
conn = contextlib.closing(conn)
|
|
||||||
return conn
|
|
||||||
|
|
||||||
@contextlib.contextmanager
|
|
||||||
def write_transaction(self):
|
|
||||||
conn = self._get_connection(closing=False, write=True, transaction=True)
|
|
||||||
try:
|
|
||||||
yield conn
|
|
||||||
except Exception:
|
|
||||||
conn.rollback()
|
|
||||||
conn.close()
|
|
||||||
raise
|
|
||||||
else:
|
|
||||||
conn.commit()
|
|
||||||
conn.close()
|
|
||||||
|
|
||||||
def read_connection(self, closing=True) -> Connection:
|
|
||||||
return self._get_connection(closing=closing, write=False)
|
|
||||||
|
|
||||||
def get_schema_version(self) -> int:
|
|
||||||
with self.read_connection() as conn:
|
|
||||||
dbversion = conn.execute("PRAGMA user_version").fetchone()[0]
|
|
||||||
return dbversion
|
|
||||||
|
|
||||||
CURRENT_DBVERSION = 1
|
|
||||||
|
|
||||||
def ensure_tables(self):
|
|
||||||
with self.write_transaction() as conn:
|
|
||||||
if self.get_schema_version() > 1:
|
|
||||||
raise DBError(
|
|
||||||
"version is %s; downgrading schema is not supported"
|
|
||||||
% (self.get_schema_version(),)
|
|
||||||
)
|
|
||||||
conn.execute(
|
|
||||||
"""
|
|
||||||
CREATE TABLE IF NOT EXISTS users (
|
|
||||||
addr TEXT PRIMARY KEY,
|
|
||||||
password TEXT,
|
|
||||||
last_login INTEGER
|
|
||||||
)
|
|
||||||
""",
|
|
||||||
)
|
|
||||||
conn.execute("PRAGMA user_version=%s" % (self.CURRENT_DBVERSION,))
|
|
||||||
31
chatmaild/src/chatmaild/delete_inactive_users.py
Normal file
31
chatmaild/src/chatmaild/delete_inactive_users.py
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
"""
|
||||||
|
Remove inactive users
|
||||||
|
"""
|
||||||
|
|
||||||
|
import os
|
||||||
|
import shutil
|
||||||
|
import sys
|
||||||
|
import time
|
||||||
|
|
||||||
|
from .config import read_config
|
||||||
|
|
||||||
|
|
||||||
|
def delete_inactive_users(config):
|
||||||
|
cutoff_date = time.time() - config.delete_inactive_users_after * 86400
|
||||||
|
for addr in os.listdir(config.mailboxes_dir):
|
||||||
|
try:
|
||||||
|
user = config.get_user(addr)
|
||||||
|
except ValueError:
|
||||||
|
continue
|
||||||
|
|
||||||
|
read_timestamp = user.get_last_login_timestamp()
|
||||||
|
if read_timestamp and read_timestamp < cutoff_date:
|
||||||
|
path = config.mailboxes_dir.joinpath(addr)
|
||||||
|
assert path == user.maildir
|
||||||
|
shutil.rmtree(path, ignore_errors=True)
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
(cfgpath,) = sys.argv[1:]
|
||||||
|
config = read_config(cfgpath)
|
||||||
|
delete_inactive_users(config)
|
||||||
@@ -1,115 +1,98 @@
|
|||||||
|
import logging
|
||||||
import os
|
import os
|
||||||
import sys
|
from socketserver import StreamRequestHandler, ThreadingUnixStreamServer
|
||||||
import json
|
|
||||||
from socketserver import (
|
|
||||||
UnixStreamServer,
|
|
||||||
StreamRequestHandler,
|
|
||||||
ThreadingMixIn,
|
|
||||||
)
|
|
||||||
import pwd
|
|
||||||
import subprocess
|
|
||||||
|
|
||||||
from .database import Database
|
|
||||||
|
|
||||||
|
|
||||||
def encrypt_password(password: str):
|
class DictProxy:
|
||||||
password = password.encode("ascii")
|
def loop_forever(self, rfile, wfile):
|
||||||
# https://doc.dovecot.org/configuration_manual/authentication/password_schemes/
|
# Transaction storage is local to each handler loop.
|
||||||
process = subprocess.Popen(
|
# Dovecot reuses transaction IDs across connections,
|
||||||
["doveadm", "pw", "-s", "SHA512-CRYPT"],
|
# starting transaction with the name `1`
|
||||||
stdin=subprocess.PIPE,
|
# on two different connections to the same proxy sometimes.
|
||||||
stdout=subprocess.PIPE,
|
transactions = {}
|
||||||
)
|
|
||||||
stdout_data, _stderr_data = process.communicate(
|
|
||||||
input=password + b"\n" + password + b"\n"
|
|
||||||
)
|
|
||||||
return stdout_data.decode("ascii").strip()
|
|
||||||
|
|
||||||
|
while True:
|
||||||
|
msg = rfile.readline().strip().decode()
|
||||||
|
if not msg:
|
||||||
|
break
|
||||||
|
|
||||||
def create_user(db, user, password):
|
res = self.handle_dovecot_request(msg, transactions)
|
||||||
with db.write_transaction() as conn:
|
if res:
|
||||||
conn.create_user(user, password)
|
wfile.write(res.encode("ascii"))
|
||||||
return dict(home=f"/home/vmail/{user}", uid="vmail", gid="vmail", password=password)
|
wfile.flush()
|
||||||
|
|
||||||
|
def handle_dovecot_request(self, msg, transactions):
|
||||||
def get_user_data(db, user):
|
# see https://doc.dovecot.org/developer_manual/design/dict_protocol/#dovecot-dict-protocol
|
||||||
with db.read_connection() as conn:
|
short_command = msg[0]
|
||||||
result = conn.get_user(user)
|
|
||||||
if result:
|
|
||||||
result["uid"] = "vmail"
|
|
||||||
result["gid"] = "vmail"
|
|
||||||
return result
|
|
||||||
|
|
||||||
|
|
||||||
def lookup_userdb(db, user):
|
|
||||||
return get_user_data(db, user)
|
|
||||||
|
|
||||||
|
|
||||||
def lookup_passdb(db, user, password):
|
|
||||||
userdata = get_user_data(db, user)
|
|
||||||
if not userdata:
|
|
||||||
return create_user(db, user, encrypt_password(password))
|
|
||||||
userdata["password"] = userdata["password"].strip()
|
|
||||||
return userdata
|
|
||||||
|
|
||||||
|
|
||||||
def handle_dovecot_request(msg, db):
|
|
||||||
print(f"received msg: {msg!r}", file=sys.stderr)
|
|
||||||
short_command = msg[0]
|
|
||||||
if short_command == "L": # LOOKUP
|
|
||||||
parts = msg[1:].split("\t")
|
parts = msg[1:].split("\t")
|
||||||
keyname, user = parts[:2]
|
|
||||||
namespace, type, *args = keyname.split("/")
|
|
||||||
reply_command = "F"
|
|
||||||
res = ""
|
|
||||||
if namespace == "shared":
|
|
||||||
if type == "userdb":
|
|
||||||
res = lookup_userdb(db, user)
|
|
||||||
if res:
|
|
||||||
reply_command = "O"
|
|
||||||
else:
|
|
||||||
reply_command = "N"
|
|
||||||
elif type == "passdb":
|
|
||||||
res = lookup_passdb(db, user, password=args[0])
|
|
||||||
if res:
|
|
||||||
reply_command = "O"
|
|
||||||
else:
|
|
||||||
reply_command = "N"
|
|
||||||
print(f"res: {res!r}", file=sys.stderr)
|
|
||||||
json_res = json.dumps(res) if res else ""
|
|
||||||
return f"{reply_command}{json_res}\n"
|
|
||||||
return None
|
|
||||||
|
|
||||||
|
if short_command == "L":
|
||||||
|
return self.handle_lookup(parts)
|
||||||
|
elif short_command == "I":
|
||||||
|
return self.handle_iterate(parts)
|
||||||
|
elif short_command == "H":
|
||||||
|
return # no version checking
|
||||||
|
|
||||||
class ThreadedUnixStreamServer(ThreadingMixIn, UnixStreamServer):
|
if short_command not in ("BSC"):
|
||||||
pass
|
logging.warning(f"unknown dictproxy request: {msg!r}")
|
||||||
|
return
|
||||||
|
|
||||||
|
transaction_id = parts[0]
|
||||||
|
|
||||||
def main():
|
if short_command == "B":
|
||||||
socket = sys.argv[1]
|
return self.handle_begin_transaction(transaction_id, parts, transactions)
|
||||||
passwd_entry = pwd.getpwnam(sys.argv[2])
|
elif short_command == "C":
|
||||||
db = Database(sys.argv[3])
|
return self.handle_commit_transaction(transaction_id, parts, transactions)
|
||||||
|
elif short_command == "S":
|
||||||
|
addr = transactions[transaction_id]["addr"]
|
||||||
|
if not self.handle_set(addr, parts):
|
||||||
|
transactions[transaction_id]["res"] = "F\n"
|
||||||
|
logging.error(f"dictproxy-set failed for {addr!r}: {msg!r}")
|
||||||
|
|
||||||
class Handler(StreamRequestHandler):
|
def handle_lookup(self, parts):
|
||||||
def handle(self):
|
logging.warning(f"lookup ignored: {parts!r}")
|
||||||
while True:
|
return "N\n"
|
||||||
msg = self.rfile.readline().strip().decode()
|
|
||||||
if not msg:
|
|
||||||
continue
|
|
||||||
res = handle_dovecot_request(msg, db)
|
|
||||||
if res:
|
|
||||||
print(f"sending result: {res!r}", file=sys.stderr)
|
|
||||||
self.wfile.write(res.encode("ascii"))
|
|
||||||
self.wfile.flush()
|
|
||||||
|
|
||||||
try:
|
def handle_iterate(self, parts):
|
||||||
os.unlink(socket)
|
# Empty line means ITER_FINISHED.
|
||||||
except FileNotFoundError:
|
# If we don't return empty line Dovecot will timeout.
|
||||||
pass
|
return "\n"
|
||||||
|
|
||||||
|
def handle_begin_transaction(self, transaction_id, parts, transactions):
|
||||||
|
addr = parts[1]
|
||||||
|
transactions[transaction_id] = dict(addr=addr, res="O\n")
|
||||||
|
|
||||||
|
def handle_set(self, addr, parts):
|
||||||
|
# For documentation on key structure see
|
||||||
|
# https://github.com/dovecot/core/blob/main/src/lib-storage/mailbox-attribute.h
|
||||||
|
return False
|
||||||
|
|
||||||
|
def handle_commit_transaction(self, transaction_id, parts, transactions):
|
||||||
|
# return whatever "set" command(s) set as result.
|
||||||
|
return transactions.pop(transaction_id)["res"]
|
||||||
|
|
||||||
|
def serve_forever_from_socket(self, socket):
|
||||||
|
dictproxy = self
|
||||||
|
|
||||||
|
class Handler(StreamRequestHandler):
|
||||||
|
def handle(self):
|
||||||
|
try:
|
||||||
|
dictproxy.loop_forever(self.rfile, self.wfile)
|
||||||
|
except Exception:
|
||||||
|
logging.exception("Exception in the handler")
|
||||||
|
raise
|
||||||
|
|
||||||
with ThreadedUnixStreamServer(socket, Handler) as server:
|
|
||||||
os.chown(socket, uid=passwd_entry.pw_uid, gid=passwd_entry.pw_gid)
|
|
||||||
try:
|
try:
|
||||||
server.serve_forever()
|
os.unlink(socket)
|
||||||
except KeyboardInterrupt:
|
except FileNotFoundError:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
with CustomThreadingUnixStreamServer(socket, Handler) as server:
|
||||||
|
try:
|
||||||
|
server.serve_forever()
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
class CustomThreadingUnixStreamServer(ThreadingUnixStreamServer):
|
||||||
|
request_queue_size = 1000
|
||||||
|
|||||||
@@ -1,10 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Dict authentication proxy for dovecot
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart=/usr/local/bin/doveauth-dictproxy /run/dovecot/doveauth.socket vmail /home/vmail/passdb.sqlite
|
|
||||||
Restart=always
|
|
||||||
RestartSec=30
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -1,65 +1,160 @@
|
|||||||
#!/usr/bin/env python3
|
import json
|
||||||
import base64
|
import logging
|
||||||
|
import os
|
||||||
import sys
|
import sys
|
||||||
|
|
||||||
from .database import Database
|
try:
|
||||||
|
import crypt_r
|
||||||
|
except ImportError:
|
||||||
|
import crypt as crypt_r
|
||||||
|
|
||||||
|
from .config import Config, read_config
|
||||||
|
from .dictproxy import DictProxy
|
||||||
|
from .migrate_db import migrate_from_db_to_maildir
|
||||||
|
|
||||||
|
NOCREATE_FILE = "/etc/chatmail-nocreate"
|
||||||
|
|
||||||
|
|
||||||
def get_user_data(db, user):
|
def encrypt_password(password: str):
|
||||||
with db.read_connection() as conn:
|
# https://doc.dovecot.org/configuration_manual/authentication/password_schemes/
|
||||||
result = conn.get_user(user)
|
passhash = crypt_r.crypt(password, crypt_r.METHOD_SHA512)
|
||||||
if result:
|
return "{SHA512-CRYPT}" + passhash
|
||||||
result["uid"] = "vmail"
|
|
||||||
result["gid"] = "vmail"
|
|
||||||
return result
|
|
||||||
|
|
||||||
|
|
||||||
def create_user(db, user, password):
|
def is_allowed_to_create(config: Config, user, cleartext_password) -> bool:
|
||||||
with db.write_transaction() as conn:
|
"""Return True if user and password are admissable."""
|
||||||
conn.create_user(user, password)
|
if os.path.exists(NOCREATE_FILE):
|
||||||
return dict(home=f"/home/vmail/{user}", uid="vmail", gid="vmail", password=password)
|
logging.warning(f"blocked account creation because {NOCREATE_FILE!r} exists.")
|
||||||
|
return False
|
||||||
|
|
||||||
|
if len(cleartext_password) < config.password_min_length:
|
||||||
|
logging.warning(
|
||||||
|
"Password needs to be at least %s characters long",
|
||||||
|
config.password_min_length,
|
||||||
|
)
|
||||||
|
return False
|
||||||
|
|
||||||
|
parts = user.split("@")
|
||||||
|
if len(parts) != 2:
|
||||||
|
logging.warning(f"user {user!r} is not a proper e-mail address")
|
||||||
|
return False
|
||||||
|
localpart, domain = parts
|
||||||
|
|
||||||
|
if localpart == "echo":
|
||||||
|
# echobot account should not be created in the database
|
||||||
|
return False
|
||||||
|
|
||||||
|
if (
|
||||||
|
len(localpart) > config.username_max_length
|
||||||
|
or len(localpart) < config.username_min_length
|
||||||
|
):
|
||||||
|
logging.warning(
|
||||||
|
"localpart %s has to be between %s and %s chars long",
|
||||||
|
localpart,
|
||||||
|
config.username_min_length,
|
||||||
|
config.username_max_length,
|
||||||
|
)
|
||||||
|
return False
|
||||||
|
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
def verify_user(db, user, password):
|
def split_and_unescape(s):
|
||||||
userdata = get_user_data(db, user)
|
"""Split strings using double quote as a separator and backslash as escape character
|
||||||
if userdata:
|
into parts."""
|
||||||
if userdata.get("password") == password:
|
|
||||||
userdata["status"] = "ok"
|
out = ""
|
||||||
|
i = 0
|
||||||
|
while i < len(s):
|
||||||
|
c = s[i]
|
||||||
|
if c == "\\":
|
||||||
|
# Skip escape character.
|
||||||
|
i += 1
|
||||||
|
|
||||||
|
# This will raise IndexError if there is no character
|
||||||
|
# after escape character. This is expected
|
||||||
|
# as this is an invalid input.
|
||||||
|
out += s[i]
|
||||||
|
elif c == '"':
|
||||||
|
# Separator
|
||||||
|
yield out
|
||||||
|
out = ""
|
||||||
else:
|
else:
|
||||||
userdata["status"] = "fail"
|
out += c
|
||||||
else:
|
i += 1
|
||||||
userdata = create_user(db, user, password)
|
yield out
|
||||||
userdata["status"] = "ok"
|
|
||||||
|
|
||||||
return userdata
|
|
||||||
|
|
||||||
|
|
||||||
def lookup_user(db, user):
|
class AuthDictProxy(DictProxy):
|
||||||
userdata = get_user_data(db, user)
|
def __init__(self, config):
|
||||||
if userdata:
|
super().__init__()
|
||||||
userdata["status"] = "ok"
|
self.config = config
|
||||||
else:
|
|
||||||
userdata["status"] = "fail"
|
|
||||||
return userdata
|
|
||||||
|
|
||||||
|
def handle_lookup(self, parts):
|
||||||
|
# Dovecot <2.3.17 has only one part,
|
||||||
|
# do not attempt to read any other parts for compatibility.
|
||||||
|
keyname = parts[0]
|
||||||
|
|
||||||
def dump_result(res):
|
namespace, type, args = keyname.split("/", 2)
|
||||||
for key, value in res.items():
|
args = list(split_and_unescape(args))
|
||||||
print(f"{key}={value}")
|
|
||||||
|
config = self.config
|
||||||
|
reply_command = "F"
|
||||||
|
res = ""
|
||||||
|
if namespace == "shared":
|
||||||
|
if type == "userdb":
|
||||||
|
user = args[0]
|
||||||
|
if user.endswith(f"@{config.mail_domain}"):
|
||||||
|
res = self.lookup_userdb(user)
|
||||||
|
if res:
|
||||||
|
reply_command = "O"
|
||||||
|
else:
|
||||||
|
reply_command = "N"
|
||||||
|
elif type == "passdb":
|
||||||
|
user = args[1]
|
||||||
|
if user.endswith(f"@{config.mail_domain}"):
|
||||||
|
res = self.lookup_passdb(user, cleartext_password=args[0])
|
||||||
|
if res:
|
||||||
|
reply_command = "O"
|
||||||
|
else:
|
||||||
|
reply_command = "N"
|
||||||
|
json_res = json.dumps(res) if res else ""
|
||||||
|
return f"{reply_command}{json_res}\n"
|
||||||
|
|
||||||
|
def handle_iterate(self, parts):
|
||||||
|
# example: I0\t0\tshared/userdb/
|
||||||
|
if parts[2] == "shared/userdb/":
|
||||||
|
result = "".join(
|
||||||
|
f"Oshared/userdb/{user}\t\n" for user in self.iter_userdb()
|
||||||
|
)
|
||||||
|
return f"{result}\n"
|
||||||
|
|
||||||
|
def iter_userdb(self) -> list:
|
||||||
|
"""Get a list of all user addresses."""
|
||||||
|
return [x for x in os.listdir(self.config.mailboxes_dir) if "@" in x]
|
||||||
|
|
||||||
|
def lookup_userdb(self, addr):
|
||||||
|
return self.config.get_user(addr).get_userdb_dict()
|
||||||
|
|
||||||
|
def lookup_passdb(self, addr, cleartext_password):
|
||||||
|
user = self.config.get_user(addr)
|
||||||
|
userdata = user.get_userdb_dict()
|
||||||
|
if userdata:
|
||||||
|
return userdata
|
||||||
|
if not is_allowed_to_create(self.config, addr, cleartext_password):
|
||||||
|
return
|
||||||
|
|
||||||
|
user.set_password(encrypt_password(cleartext_password))
|
||||||
|
print(f"Created address: {addr}", file=sys.stderr)
|
||||||
|
return user.get_userdb_dict()
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
db = Database("/home/vmail/passdb.sqlite")
|
socket, cfgpath = sys.argv[1:]
|
||||||
if sys.argv[1] == "hexauth":
|
config = read_config(cfgpath)
|
||||||
login = base64.b16decode(sys.argv[2]).decode()
|
|
||||||
password = base64.b16decode(sys.argv[3]).decode()
|
|
||||||
res = verify_user(db, login, password)
|
|
||||||
dump_result(res)
|
|
||||||
elif sys.argv[1] == "hexlookup":
|
|
||||||
login = base64.b16decode(sys.argv[2]).decode()
|
|
||||||
res = lookup_user(db, login)
|
|
||||||
dump_result(res)
|
|
||||||
|
|
||||||
|
migrate_from_db_to_maildir(config)
|
||||||
|
|
||||||
if __name__ == "__main__":
|
dictproxy = AuthDictProxy(config=config)
|
||||||
main()
|
|
||||||
|
dictproxy.serve_forever_from_socket(socket)
|
||||||
|
|||||||
109
chatmaild/src/chatmaild/echo.py
Normal file
109
chatmaild/src/chatmaild/echo.py
Normal file
@@ -0,0 +1,109 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
"""Advanced echo bot example.
|
||||||
|
|
||||||
|
it will echo back any message that has non-empty text and also supports the /help command.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import subprocess
|
||||||
|
import sys
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
from deltachat_rpc_client import Bot, DeltaChat, EventType, Rpc, events
|
||||||
|
|
||||||
|
from chatmaild.config import echobot_password_path, read_config
|
||||||
|
from chatmaild.doveauth import encrypt_password
|
||||||
|
from chatmaild.newemail import create_newemail_dict
|
||||||
|
|
||||||
|
hooks = events.HookCollection()
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.RawEvent)
|
||||||
|
def log_event(event):
|
||||||
|
if event.kind == EventType.INFO:
|
||||||
|
logging.info(event.msg)
|
||||||
|
elif event.kind == EventType.WARNING:
|
||||||
|
logging.warning(event.msg)
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.RawEvent(EventType.ERROR))
|
||||||
|
def log_error(event):
|
||||||
|
logging.error("%s", event.msg)
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.MemberListChanged)
|
||||||
|
def on_memberlist_changed(event):
|
||||||
|
logging.info(
|
||||||
|
"member %s was %s", event.member, "added" if event.member_added else "removed"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.GroupImageChanged)
|
||||||
|
def on_group_image_changed(event):
|
||||||
|
logging.info("group image %s", "deleted" if event.image_deleted else "changed")
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.GroupNameChanged)
|
||||||
|
def on_group_name_changed(event):
|
||||||
|
logging.info(f"group name changed, old name: {event.old_name}")
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.NewMessage(func=lambda e: not e.command))
|
||||||
|
def echo(event):
|
||||||
|
snapshot = event.message_snapshot
|
||||||
|
if snapshot.is_info:
|
||||||
|
# Ignore info messages
|
||||||
|
return
|
||||||
|
if snapshot.text or snapshot.file:
|
||||||
|
snapshot.chat.send_message(text=snapshot.text, file=snapshot.file)
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.on(events.NewMessage(command="/help"))
|
||||||
|
def help_command(event):
|
||||||
|
snapshot = event.message_snapshot
|
||||||
|
snapshot.chat.send_text("Send me any message and I will echo it back")
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
logging.basicConfig(level=logging.INFO)
|
||||||
|
path = os.environ.get("PATH")
|
||||||
|
venv_path = sys.argv[0].strip("echobot")
|
||||||
|
os.environ["PATH"] = path + ":" + venv_path
|
||||||
|
with Rpc() as rpc:
|
||||||
|
deltachat = DeltaChat(rpc)
|
||||||
|
system_info = deltachat.get_system_info()
|
||||||
|
logging.info(f"Running deltachat core {system_info.deltachat_core_version}")
|
||||||
|
|
||||||
|
accounts = deltachat.get_all_accounts()
|
||||||
|
account = accounts[0] if accounts else deltachat.add_account()
|
||||||
|
|
||||||
|
bot = Bot(account, hooks)
|
||||||
|
|
||||||
|
config = read_config(sys.argv[1])
|
||||||
|
addr = "echo@" + config.mail_domain
|
||||||
|
|
||||||
|
# Create password file
|
||||||
|
if bot.is_configured():
|
||||||
|
password = bot.account.get_config("mail_pw")
|
||||||
|
else:
|
||||||
|
password = create_newemail_dict(config)["password"]
|
||||||
|
|
||||||
|
echobot_password_path.write_text(encrypt_password(password))
|
||||||
|
# Give the user which doveauth runs as access to the password file.
|
||||||
|
subprocess.check_call(
|
||||||
|
["/usr/bin/setfacl", "-m", "user:vmail:r", echobot_password_path],
|
||||||
|
)
|
||||||
|
|
||||||
|
if not bot.is_configured():
|
||||||
|
bot.configure(addr, password)
|
||||||
|
|
||||||
|
# write invite link to working directory
|
||||||
|
invitelink = bot.account.get_qr_code()
|
||||||
|
Path("invite-link.txt").write_text(invitelink)
|
||||||
|
|
||||||
|
bot.run_forever()
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
||||||
44
chatmaild/src/chatmaild/filedict.py
Normal file
44
chatmaild/src/chatmaild/filedict.py
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
from contextlib import contextmanager
|
||||||
|
from random import randint
|
||||||
|
|
||||||
|
import filelock
|
||||||
|
|
||||||
|
|
||||||
|
class FileDict:
|
||||||
|
"""Concurrency-safe multi-reader/single-writer persistent dict."""
|
||||||
|
|
||||||
|
def __init__(self, path):
|
||||||
|
self.path = path
|
||||||
|
self.lock_path = path.with_name(path.name + ".lock")
|
||||||
|
|
||||||
|
@contextmanager
|
||||||
|
def modify(self):
|
||||||
|
# the OS will release the lock if the process dies,
|
||||||
|
# and the contextmanager will otherwise guarantee release
|
||||||
|
with filelock.FileLock(self.lock_path):
|
||||||
|
data = self.read()
|
||||||
|
yield data
|
||||||
|
write_path = self.path.with_name(self.path.name + ".tmp")
|
||||||
|
with write_path.open("w") as f:
|
||||||
|
json.dump(data, f)
|
||||||
|
os.rename(write_path, self.path)
|
||||||
|
|
||||||
|
def read(self):
|
||||||
|
try:
|
||||||
|
with self.path.open("r") as f:
|
||||||
|
return json.load(f)
|
||||||
|
except FileNotFoundError:
|
||||||
|
return {}
|
||||||
|
except Exception:
|
||||||
|
logging.warning(f"corrupt serialization state at: {self.path!r}")
|
||||||
|
return {}
|
||||||
|
|
||||||
|
|
||||||
|
def write_bytes_atomic(path, content):
|
||||||
|
rint = randint(0, 10000000)
|
||||||
|
tmp = path.with_name(path.name + f".tmp-{rint}")
|
||||||
|
tmp.write_bytes(content)
|
||||||
|
os.rename(tmp, path)
|
||||||
@@ -1,103 +1,342 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
import asyncio
|
import asyncio
|
||||||
|
import base64
|
||||||
|
import binascii
|
||||||
import logging
|
import logging
|
||||||
from email.parser import BytesParser
|
import sys
|
||||||
|
import time
|
||||||
from email import policy
|
from email import policy
|
||||||
|
from email.parser import BytesParser
|
||||||
from aiosmtpd.lmtp import LMTP
|
from email.utils import parseaddr
|
||||||
from aiosmtpd.controller import UnixSocketController
|
|
||||||
from smtplib import SMTP as SMTPClient
|
from smtplib import SMTP as SMTPClient
|
||||||
|
|
||||||
|
from aiosmtpd.controller import Controller
|
||||||
|
from aiosmtpd.smtp import SMTP
|
||||||
|
|
||||||
def check_encrypted(content):
|
from .config import read_config
|
||||||
"""Check that the message is an OpenPGP-encrypted message."""
|
|
||||||
message = BytesParser(policy=policy.default).parsebytes(content)
|
ENCRYPTION_NEEDED_523 = "523 Encryption Needed: Invalid Unencrypted Mail"
|
||||||
|
|
||||||
|
|
||||||
|
def check_openpgp_payload(payload: bytes):
|
||||||
|
"""Checks the OpenPGP payload.
|
||||||
|
|
||||||
|
OpenPGP payload must consist only of PKESK and SKESK packets
|
||||||
|
terminated by a single SEIPD packet.
|
||||||
|
|
||||||
|
Returns True if OpenPGP payload is correct,
|
||||||
|
False otherwise.
|
||||||
|
|
||||||
|
May raise IndexError while trying to read OpenPGP packet header
|
||||||
|
if it is truncated.
|
||||||
|
"""
|
||||||
|
i = 0
|
||||||
|
while i < len(payload):
|
||||||
|
# Only OpenPGP format is allowed.
|
||||||
|
if payload[i] & 0xC0 != 0xC0:
|
||||||
|
return False
|
||||||
|
|
||||||
|
packet_type_id = payload[i] & 0x3F
|
||||||
|
i += 1
|
||||||
|
if payload[i] < 192:
|
||||||
|
# One-octet length.
|
||||||
|
body_len = payload[i]
|
||||||
|
i += 1
|
||||||
|
elif payload[i] < 224:
|
||||||
|
# Two-octet length.
|
||||||
|
body_len = ((payload[i] - 192) << 8) + payload[i + 1] + 192
|
||||||
|
i += 2
|
||||||
|
elif payload[i] == 255:
|
||||||
|
# Five-octet length.
|
||||||
|
body_len = (
|
||||||
|
(payload[i + 1] << 24)
|
||||||
|
| (payload[i + 2] << 16)
|
||||||
|
| (payload[i + 3] << 8)
|
||||||
|
| payload[i + 4]
|
||||||
|
)
|
||||||
|
i += 5
|
||||||
|
else:
|
||||||
|
# Partial body length is not allowed.
|
||||||
|
return False
|
||||||
|
|
||||||
|
i += body_len
|
||||||
|
|
||||||
|
if i == len(payload):
|
||||||
|
# Last packet should be
|
||||||
|
# Symmetrically Encrypted and Integrity Protected Data Packet (SEIPD)
|
||||||
|
#
|
||||||
|
# This is the only place where this function may return `True`.
|
||||||
|
return packet_type_id == 18
|
||||||
|
elif packet_type_id not in [1, 3]:
|
||||||
|
# All packets except the last one must be either
|
||||||
|
# Public-Key Encrypted Session Key Packet (PKESK)
|
||||||
|
# or
|
||||||
|
# Symmetric-Key Encrypted Session Key Packet (SKESK)
|
||||||
|
return False
|
||||||
|
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def check_armored_payload(payload: str):
|
||||||
|
prefix = "-----BEGIN PGP MESSAGE-----\r\n\r\n"
|
||||||
|
if not payload.startswith(prefix):
|
||||||
|
return False
|
||||||
|
payload = payload.removeprefix(prefix)
|
||||||
|
|
||||||
|
while payload.endswith("\r\n"):
|
||||||
|
payload = payload.removesuffix("\r\n")
|
||||||
|
suffix = "-----END PGP MESSAGE-----"
|
||||||
|
if not payload.endswith(suffix):
|
||||||
|
return False
|
||||||
|
payload = payload.removesuffix(suffix)
|
||||||
|
|
||||||
|
# Remove CRC24.
|
||||||
|
payload = payload.rpartition("=")[0]
|
||||||
|
|
||||||
|
try:
|
||||||
|
payload = base64.b64decode(payload)
|
||||||
|
except binascii.Error:
|
||||||
|
return False
|
||||||
|
|
||||||
|
try:
|
||||||
|
return check_openpgp_payload(payload)
|
||||||
|
except IndexError:
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def is_securejoin(message):
|
||||||
|
if message.get("secure-join") not in ["vc-request", "vg-request"]:
|
||||||
|
return False
|
||||||
if not message.is_multipart():
|
if not message.is_multipart():
|
||||||
return False
|
return False
|
||||||
if message.get("subject") != "...":
|
parts_count = 0
|
||||||
|
for part in message.iter_parts():
|
||||||
|
parts_count += 1
|
||||||
|
if parts_count > 1:
|
||||||
|
return False
|
||||||
|
if part.is_multipart():
|
||||||
|
return False
|
||||||
|
if part.get_content_type() != "text/plain":
|
||||||
|
return False
|
||||||
|
|
||||||
|
payload = part.get_payload().strip().lower()
|
||||||
|
if payload not in ("secure-join: vc-request", "secure-join: vg-request"):
|
||||||
|
return False
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def check_encrypted(message):
|
||||||
|
"""Check that the message is an OpenPGP-encrypted message.
|
||||||
|
|
||||||
|
MIME structure of the message must correspond to <https://www.rfc-editor.org/rfc/rfc3156>.
|
||||||
|
"""
|
||||||
|
if not message.is_multipart():
|
||||||
return False
|
return False
|
||||||
if message.get_content_type() != "multipart/encrypted":
|
if message.get_content_type() != "multipart/encrypted":
|
||||||
return False
|
return False
|
||||||
parts_count = 0
|
parts_count = 0
|
||||||
for part in message.iter_parts():
|
for part in message.iter_parts():
|
||||||
|
# We explicitly check Content-Type of each part later,
|
||||||
|
# but this is to be absolutely sure `get_payload()` returns string and not list.
|
||||||
|
if part.is_multipart():
|
||||||
|
return False
|
||||||
|
|
||||||
if parts_count == 0:
|
if parts_count == 0:
|
||||||
if part.get_content_type() != "application/pgp-encrypted":
|
if part.get_content_type() != "application/pgp-encrypted":
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
payload = part.get_payload()
|
||||||
|
if payload.strip() != "Version: 1":
|
||||||
|
return False
|
||||||
elif parts_count == 1:
|
elif parts_count == 1:
|
||||||
if part.get_content_type() != "application/octet-stream":
|
if part.get_content_type() != "application/octet-stream":
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
if not check_armored_payload(part.get_payload()):
|
||||||
|
return False
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
parts_count += 1
|
parts_count += 1
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
class ExampleController(UnixSocketController):
|
async def asyncmain_beforequeue(config, mode):
|
||||||
|
if mode == "outgoing":
|
||||||
|
port = config.filtermail_smtp_port
|
||||||
|
handler = OutgoingBeforeQueueHandler(config)
|
||||||
|
else:
|
||||||
|
port = config.filtermail_smtp_port_incoming
|
||||||
|
handler = IncomingBeforeQueueHandler(config)
|
||||||
|
HackedController(handler, hostname="127.0.0.1", port=port).start()
|
||||||
|
|
||||||
|
|
||||||
|
def recipient_matches_passthrough(recipient, passthrough_recipients):
|
||||||
|
for addr in passthrough_recipients:
|
||||||
|
if recipient == addr:
|
||||||
|
return True
|
||||||
|
if addr[0] == "@" and recipient.endswith(addr):
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
class HackedController(Controller):
|
||||||
def factory(self):
|
def factory(self):
|
||||||
return LMTP(self.handler, **self.SMTP_kwargs)
|
return SMTPDiscardRCPTO_options(self.handler, **self.SMTP_kwargs)
|
||||||
|
|
||||||
|
|
||||||
class ExampleHandler:
|
class SMTPDiscardRCPTO_options(SMTP):
|
||||||
async def handle_RCPT(self, server, session, envelope, address, rcpt_options):
|
def _getparams(self, params):
|
||||||
envelope.rcpt_tos.append(address)
|
# aiosmtpd's SMTP daemon fails to handle a request if there are RCPT TO options
|
||||||
|
# We just ignore them for our incoming filtermail purposes
|
||||||
|
if len(params) == 1 and params[0].startswith("ORCPT"):
|
||||||
|
return {}
|
||||||
|
return super()._getparams(params)
|
||||||
|
|
||||||
|
|
||||||
|
class OutgoingBeforeQueueHandler:
|
||||||
|
def __init__(self, config):
|
||||||
|
self.config = config
|
||||||
|
self.send_rate_limiter = SendRateLimiter()
|
||||||
|
|
||||||
|
async def handle_MAIL(self, server, session, envelope, address, mail_options):
|
||||||
|
logging.info(f"handle_MAIL from {address}")
|
||||||
|
envelope.mail_from = address
|
||||||
|
max_sent = self.config.max_user_send_per_minute
|
||||||
|
if not self.send_rate_limiter.is_sending_allowed(address, max_sent):
|
||||||
|
return f"450 4.7.1: Too much mail from {address}"
|
||||||
|
|
||||||
|
parts = envelope.mail_from.split("@")
|
||||||
|
if len(parts) != 2:
|
||||||
|
return f"500 Invalid from address <{envelope.mail_from!r}>"
|
||||||
|
|
||||||
return "250 OK"
|
return "250 OK"
|
||||||
|
|
||||||
async def handle_DATA(self, server, session, envelope):
|
async def handle_DATA(self, server, session, envelope):
|
||||||
logging.info("Processing DATA message from %s", envelope.mail_from)
|
logging.info("handle_DATA before-queue")
|
||||||
|
error = self.check_DATA(envelope)
|
||||||
|
if error:
|
||||||
|
return error
|
||||||
|
logging.info("re-injecting the mail that passed checks")
|
||||||
|
client = SMTPClient("localhost", self.config.postfix_reinject_port)
|
||||||
|
client.sendmail(
|
||||||
|
envelope.mail_from, envelope.rcpt_tos, envelope.original_content
|
||||||
|
)
|
||||||
|
return "250 OK"
|
||||||
|
|
||||||
valid_recipients = []
|
def check_DATA(self, envelope):
|
||||||
|
"""the central filtering function for e-mails."""
|
||||||
|
logging.info(f"Processing DATA message from {envelope.mail_from}")
|
||||||
|
|
||||||
mail_encrypted = check_encrypted(envelope.content)
|
message = BytesParser(policy=policy.default).parsebytes(envelope.content)
|
||||||
|
mail_encrypted = check_encrypted(message)
|
||||||
|
|
||||||
|
_, from_addr = parseaddr(message.get("from").strip())
|
||||||
|
|
||||||
|
if envelope.mail_from.lower() != from_addr.lower():
|
||||||
|
return f"500 Invalid FROM <{from_addr!r}> for <{envelope.mail_from!r}>"
|
||||||
|
|
||||||
|
if mail_encrypted or is_securejoin(message):
|
||||||
|
print("Outgoing: Filtering encrypted mail.", file=sys.stderr)
|
||||||
|
return
|
||||||
|
|
||||||
|
print("Outgoing: Filtering unencrypted mail.", file=sys.stderr)
|
||||||
|
|
||||||
|
if envelope.mail_from in self.config.passthrough_senders:
|
||||||
|
return
|
||||||
|
|
||||||
|
# allow self-sent Autocrypt Setup Message
|
||||||
|
if envelope.rcpt_tos == [from_addr]:
|
||||||
|
if message.get("subject") == "Autocrypt Setup Message":
|
||||||
|
if message.get_content_type() == "multipart/mixed":
|
||||||
|
return
|
||||||
|
|
||||||
|
passthrough_recipients = self.config.passthrough_recipients
|
||||||
|
|
||||||
res = []
|
|
||||||
for recipient in envelope.rcpt_tos:
|
for recipient in envelope.rcpt_tos:
|
||||||
my_local_domain = envelope.mail_from.split("@")
|
if recipient_matches_passthrough(recipient, passthrough_recipients):
|
||||||
if len(my_local_domain) != 2:
|
|
||||||
res += [f"500 Invalid from address <{envelope.mail_from}>"]
|
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if envelope.mail_from == recipient:
|
print("Rejected unencrypted mail.", file=sys.stderr)
|
||||||
# Always allow sending emails to self.
|
return ENCRYPTION_NEEDED_523
|
||||||
valid_recipients += [recipient]
|
|
||||||
res += ["250 OK"]
|
|
||||||
|
class IncomingBeforeQueueHandler:
|
||||||
|
def __init__(self, config):
|
||||||
|
self.config = config
|
||||||
|
|
||||||
|
async def handle_DATA(self, server, session, envelope):
|
||||||
|
logging.info("handle_DATA before-queue")
|
||||||
|
error = self.check_DATA(envelope)
|
||||||
|
if error:
|
||||||
|
return error
|
||||||
|
logging.info("re-injecting the mail that passed checks")
|
||||||
|
|
||||||
|
# the smtp daemon on reinject_port_incoming gives it to dkim milter
|
||||||
|
# which looks at source address to determine whether to verify or sign
|
||||||
|
client = SMTPClient(
|
||||||
|
"localhost",
|
||||||
|
self.config.postfix_reinject_port_incoming,
|
||||||
|
source_address=("127.0.0.2", 0),
|
||||||
|
)
|
||||||
|
client.sendmail(
|
||||||
|
envelope.mail_from, envelope.rcpt_tos, envelope.original_content
|
||||||
|
)
|
||||||
|
return "250 OK"
|
||||||
|
|
||||||
|
def check_DATA(self, envelope):
|
||||||
|
"""the central filtering function for e-mails."""
|
||||||
|
logging.info(f"Processing DATA message from {envelope.mail_from}")
|
||||||
|
|
||||||
|
message = BytesParser(policy=policy.default).parsebytes(envelope.content)
|
||||||
|
mail_encrypted = check_encrypted(message)
|
||||||
|
|
||||||
|
if mail_encrypted or is_securejoin(message):
|
||||||
|
print("Incoming: Filtering encrypted mail.", file=sys.stderr)
|
||||||
|
return
|
||||||
|
|
||||||
|
print("Incoming: Filtering unencrypted mail.", file=sys.stderr)
|
||||||
|
|
||||||
|
# we want cleartext mailer-daemon messages to pass through
|
||||||
|
# chatmail core will typically not display them as normal messages
|
||||||
|
if message.get("auto-submitted"):
|
||||||
|
_, from_addr = parseaddr(message.get("from").strip())
|
||||||
|
if from_addr.lower().startswith("mailer-daemon@"):
|
||||||
|
if message.get_content_type() == "multipart/report":
|
||||||
|
return
|
||||||
|
|
||||||
|
for recipient in envelope.rcpt_tos:
|
||||||
|
user = self.config.get_user(recipient)
|
||||||
|
if user is None or user.is_incoming_cleartext_ok():
|
||||||
continue
|
continue
|
||||||
|
|
||||||
recipient_local_domain = recipient.split("@")
|
print("Rejected unencrypted mail.", file=sys.stderr)
|
||||||
if len(recipient_local_domain) != 2:
|
return ENCRYPTION_NEEDED_523
|
||||||
res += [f"500 Invalid address <{recipient}>"]
|
|
||||||
continue
|
|
||||||
|
|
||||||
is_outgoing = recipient_local_domain[1] != my_local_domain[1]
|
|
||||||
if is_outgoing and not mail_encrypted:
|
|
||||||
res += ["500 Outgoing mail must be encrypted"]
|
|
||||||
continue
|
|
||||||
|
|
||||||
valid_recipients += [recipient]
|
|
||||||
res += ["250 OK"]
|
|
||||||
|
|
||||||
# Reinject the mail back into Postfix.
|
|
||||||
if valid_recipients:
|
|
||||||
logging.info("Reinjecting the mail")
|
|
||||||
client = SMTPClient("localhost", "10026")
|
|
||||||
client.sendmail(envelope.mail_from, valid_recipients, envelope.content)
|
|
||||||
|
|
||||||
return "\r\n".join(res)
|
|
||||||
|
|
||||||
|
|
||||||
async def asyncmain(loop):
|
class SendRateLimiter:
|
||||||
controller = ExampleController(
|
def __init__(self):
|
||||||
ExampleHandler(), unix_socket="/var/spool/postfix/private/filtermail"
|
self.addr2timestamps = {}
|
||||||
)
|
|
||||||
controller.start()
|
def is_sending_allowed(self, mail_from, max_send_per_minute):
|
||||||
|
last = self.addr2timestamps.setdefault(mail_from, [])
|
||||||
|
now = time.time()
|
||||||
|
last[:] = [ts for ts in last if ts >= (now - 60)]
|
||||||
|
if len(last) <= max_send_per_minute:
|
||||||
|
last.append(now)
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
logging.basicConfig(level=logging.INFO)
|
args = sys.argv[1:]
|
||||||
|
assert len(args) == 2
|
||||||
|
config = read_config(args[0])
|
||||||
|
mode = args[1]
|
||||||
|
logging.basicConfig(level=logging.WARN)
|
||||||
loop = asyncio.new_event_loop()
|
loop = asyncio.new_event_loop()
|
||||||
asyncio.set_event_loop(loop)
|
asyncio.set_event_loop(loop)
|
||||||
loop.create_task(asyncmain(loop=loop))
|
assert mode in ["incoming", "outgoing"]
|
||||||
|
task = asyncmain_beforequeue(config, mode)
|
||||||
|
loop.create_task(task)
|
||||||
|
logging.info("entering serving loop")
|
||||||
loop.run_forever()
|
loop.run_forever()
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
main()
|
|
||||||
|
|||||||
@@ -1,10 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Email filter for chatmail servers
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart=/usr/local/bin/filtermail
|
|
||||||
Restart=always
|
|
||||||
RestartSec=30
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
108
chatmaild/src/chatmaild/ini/chatmail.ini.f
Normal file
108
chatmaild/src/chatmaild/ini/chatmail.ini.f
Normal file
@@ -0,0 +1,108 @@
|
|||||||
|
[params]
|
||||||
|
|
||||||
|
# mail domain (MUST be set to fully qualified chat mail domain)
|
||||||
|
mail_domain = {mail_domain}
|
||||||
|
|
||||||
|
#
|
||||||
|
# If you only do private test deploys, you don't need to modify any settings below
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# Restrictions on user addresses
|
||||||
|
#
|
||||||
|
|
||||||
|
# how many mails a user can send out per minute
|
||||||
|
max_user_send_per_minute = 60
|
||||||
|
|
||||||
|
# maximum mailbox size of a chatmail address
|
||||||
|
max_mailbox_size = 100M
|
||||||
|
|
||||||
|
# maximum message size for an e-mail in bytes
|
||||||
|
max_message_size = 31457280
|
||||||
|
|
||||||
|
# days after which mails are unconditionally deleted
|
||||||
|
delete_mails_after = 20
|
||||||
|
|
||||||
|
# days after which users without a successful login are deleted (database and mails)
|
||||||
|
delete_inactive_users_after = 90
|
||||||
|
|
||||||
|
# minimum length a username must have
|
||||||
|
username_min_length = 9
|
||||||
|
|
||||||
|
# maximum length a username can have
|
||||||
|
username_max_length = 9
|
||||||
|
|
||||||
|
# minimum length a password must have
|
||||||
|
password_min_length = 9
|
||||||
|
|
||||||
|
# list of chatmail addresses which can send outbound un-encrypted mail
|
||||||
|
passthrough_senders =
|
||||||
|
|
||||||
|
# list of e-mail recipients for which to accept outbound un-encrypted mails
|
||||||
|
# (space-separated, item may start with "@" to whitelist whole recipient domains)
|
||||||
|
passthrough_recipients = xstore@testrun.org
|
||||||
|
|
||||||
|
#
|
||||||
|
# Deployment Details
|
||||||
|
#
|
||||||
|
|
||||||
|
# SMTP outgoing filtermail and reinjection
|
||||||
|
filtermail_smtp_port = 10080
|
||||||
|
postfix_reinject_port = 10025
|
||||||
|
|
||||||
|
# SMTP incoming filtermail and reinjection
|
||||||
|
filtermail_smtp_port_incoming = 10081
|
||||||
|
postfix_reinject_port_incoming = 10026
|
||||||
|
|
||||||
|
# if set to "True" IPv6 is disabled
|
||||||
|
disable_ipv6 = False
|
||||||
|
|
||||||
|
# Defaults to https://iroh.{{mail_domain}} and running `iroh-relay` on the chatmail
|
||||||
|
# service.
|
||||||
|
# If you set it to anything else, the service will be disabled
|
||||||
|
# and users will be directed to use the given iroh relay URL.
|
||||||
|
# Set it to empty string if you want users to use their default iroh relay.
|
||||||
|
# iroh_relay =
|
||||||
|
|
||||||
|
# Address on which `mtail` listens,
|
||||||
|
# e.g. 127.0.0.1 or some private network
|
||||||
|
# address like 192.168.10.1.
|
||||||
|
# You can point Prometheus
|
||||||
|
# or some other OpenMetrics-compatible
|
||||||
|
# collector to
|
||||||
|
# http://{{mtail_address}}:3903/metrics
|
||||||
|
# and display collected metrics with Grafana.
|
||||||
|
#
|
||||||
|
# WARNING: do not expose this service
|
||||||
|
# to the public IP address.
|
||||||
|
#
|
||||||
|
# `mtail is not running if the setting is not set.
|
||||||
|
|
||||||
|
# mtail_address = 127.0.0.1
|
||||||
|
|
||||||
|
#
|
||||||
|
# Debugging options
|
||||||
|
#
|
||||||
|
|
||||||
|
# set to True if you want to track imap protocol execution
|
||||||
|
# in per-maildir ".in/.out" files.
|
||||||
|
# Note that you need to manually cleanup these files
|
||||||
|
# so use this option with caution on production servers.
|
||||||
|
imap_rawlog = false
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Privacy Policy
|
||||||
|
#
|
||||||
|
|
||||||
|
# postal address of privacy contact
|
||||||
|
privacy_postal =
|
||||||
|
|
||||||
|
# email address of privacy contact
|
||||||
|
privacy_mail =
|
||||||
|
|
||||||
|
# postal address of the privacy data officer
|
||||||
|
privacy_pdo =
|
||||||
|
|
||||||
|
# postal address of the privacy supervisor
|
||||||
|
privacy_supervisor =
|
||||||
16
chatmaild/src/chatmaild/ini/override-testrun.ini
Normal file
16
chatmaild/src/chatmaild/ini/override-testrun.ini
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
|
||||||
|
[privacy]
|
||||||
|
|
||||||
|
passthrough_recipients = privacy@testrun.org xstore@testrun.org
|
||||||
|
|
||||||
|
privacy_postal =
|
||||||
|
Merlinux GmbH, Represented by the managing director H. Krekel,
|
||||||
|
Reichgrafen Str. 20, 79102 Freiburg, Germany
|
||||||
|
|
||||||
|
privacy_mail = privacy@testrun.org
|
||||||
|
privacy_pdo =
|
||||||
|
Prof. Dr. Fabian Schmieder, lexICT UG (limited), Ostfeldstr. 49, 30559 Hannover.
|
||||||
|
You can contact him at *delta-privacy@merlinux.eu* (Keyword: DPO)
|
||||||
|
privacy_supervisor =
|
||||||
|
State Commissioner for Data Protection and Freedom of Information of
|
||||||
|
Baden-Württemberg in 70173 Stuttgart, Germany.
|
||||||
31
chatmaild/src/chatmaild/lastlogin.py
Normal file
31
chatmaild/src/chatmaild/lastlogin.py
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
import sys
|
||||||
|
|
||||||
|
from .config import read_config
|
||||||
|
from .dictproxy import DictProxy
|
||||||
|
|
||||||
|
|
||||||
|
class LastLoginDictProxy(DictProxy):
|
||||||
|
def __init__(self, config):
|
||||||
|
super().__init__()
|
||||||
|
self.config = config
|
||||||
|
|
||||||
|
def handle_set(self, addr, parts):
|
||||||
|
keyname = parts[1].split("/")
|
||||||
|
value = parts[2] if len(parts) > 2 else ""
|
||||||
|
if keyname[0] == "shared" and keyname[1] == "last-login":
|
||||||
|
if addr.startswith("echo@"):
|
||||||
|
return True
|
||||||
|
addr = keyname[2]
|
||||||
|
timestamp = int(value)
|
||||||
|
user = self.config.get_user(addr)
|
||||||
|
user.set_last_login_timestamp(timestamp)
|
||||||
|
return True
|
||||||
|
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
socket, config_path = sys.argv[1:]
|
||||||
|
config = read_config(config_path)
|
||||||
|
dictproxy = LastLoginDictProxy(config=config)
|
||||||
|
dictproxy.serve_forever_from_socket(socket)
|
||||||
101
chatmaild/src/chatmaild/metadata.py
Normal file
101
chatmaild/src/chatmaild/metadata.py
Normal file
@@ -0,0 +1,101 @@
|
|||||||
|
import logging
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from .config import read_config
|
||||||
|
from .dictproxy import DictProxy
|
||||||
|
from .filedict import FileDict
|
||||||
|
from .notifier import Notifier
|
||||||
|
|
||||||
|
|
||||||
|
class Metadata:
|
||||||
|
# each SETMETADATA on this key appends to a list of unique device tokens
|
||||||
|
# which only ever get removed if the upstream indicates the token is invalid
|
||||||
|
DEVICETOKEN_KEY = "devicetoken"
|
||||||
|
|
||||||
|
def __init__(self, vmail_dir):
|
||||||
|
self.vmail_dir = vmail_dir
|
||||||
|
|
||||||
|
def get_metadata_dict(self, addr):
|
||||||
|
return FileDict(self.vmail_dir / addr / "metadata.json")
|
||||||
|
|
||||||
|
def add_token_to_addr(self, addr, token):
|
||||||
|
with self.get_metadata_dict(addr).modify() as data:
|
||||||
|
tokens = data.setdefault(self.DEVICETOKEN_KEY, [])
|
||||||
|
if token not in tokens:
|
||||||
|
tokens.append(token)
|
||||||
|
|
||||||
|
def remove_token_from_addr(self, addr, token):
|
||||||
|
with self.get_metadata_dict(addr).modify() as data:
|
||||||
|
tokens = data.get(self.DEVICETOKEN_KEY, [])
|
||||||
|
if token in tokens:
|
||||||
|
tokens.remove(token)
|
||||||
|
|
||||||
|
def get_tokens_for_addr(self, addr):
|
||||||
|
mdict = self.get_metadata_dict(addr).read()
|
||||||
|
return mdict.get(self.DEVICETOKEN_KEY, [])
|
||||||
|
|
||||||
|
|
||||||
|
class MetadataDictProxy(DictProxy):
|
||||||
|
def __init__(self, notifier, metadata, iroh_relay=None):
|
||||||
|
super().__init__()
|
||||||
|
self.notifier = notifier
|
||||||
|
self.metadata = metadata
|
||||||
|
self.iroh_relay = iroh_relay
|
||||||
|
|
||||||
|
def handle_lookup(self, parts):
|
||||||
|
# Lpriv/43f5f508a7ea0366dff30200c15250e3/devicetoken\tlkj123poi@c2.testrun.org
|
||||||
|
keyparts = parts[0].split("/", 2)
|
||||||
|
if keyparts[0] == "priv":
|
||||||
|
keyname = keyparts[2]
|
||||||
|
addr = parts[1]
|
||||||
|
if keyname == self.metadata.DEVICETOKEN_KEY:
|
||||||
|
res = " ".join(self.metadata.get_tokens_for_addr(addr))
|
||||||
|
return f"O{res}\n"
|
||||||
|
elif keyparts[0] == "shared":
|
||||||
|
keyname = keyparts[2]
|
||||||
|
if (
|
||||||
|
keyname == "vendor/vendor.dovecot/pvt/server/vendor/deltachat/irohrelay"
|
||||||
|
and self.iroh_relay
|
||||||
|
):
|
||||||
|
# Handle `GETMETADATA "" /shared/vendor/deltachat/irohrelay`
|
||||||
|
return f"O{self.iroh_relay}\n"
|
||||||
|
logging.warning(f"lookup ignored: {parts!r}")
|
||||||
|
return "N\n"
|
||||||
|
|
||||||
|
def handle_set(self, addr, parts):
|
||||||
|
# For documentation on key structure see
|
||||||
|
# https://github.com/dovecot/core/blob/main/src/lib-storage/mailbox-attribute.h
|
||||||
|
keyname = parts[1].split("/")
|
||||||
|
value = parts[2] if len(parts) > 2 else ""
|
||||||
|
if keyname[0] == "priv" and keyname[2] == self.metadata.DEVICETOKEN_KEY:
|
||||||
|
self.metadata.add_token_to_addr(addr, value)
|
||||||
|
return True
|
||||||
|
elif keyname[0] == "priv" and keyname[2] == "messagenew":
|
||||||
|
self.notifier.new_message_for_addr(addr, self.metadata)
|
||||||
|
return True
|
||||||
|
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
socket, config_path = sys.argv[1:]
|
||||||
|
|
||||||
|
config = read_config(config_path)
|
||||||
|
iroh_relay = config.iroh_relay
|
||||||
|
|
||||||
|
vmail_dir = config.mailboxes_dir
|
||||||
|
if not vmail_dir.exists():
|
||||||
|
logging.error("vmail dir does not exist: %r", vmail_dir)
|
||||||
|
return 1
|
||||||
|
|
||||||
|
queue_dir = vmail_dir / "pending_notifications"
|
||||||
|
queue_dir.mkdir(exist_ok=True)
|
||||||
|
metadata = Metadata(vmail_dir)
|
||||||
|
notifier = Notifier(queue_dir)
|
||||||
|
notifier.start_notification_threads(metadata.remove_token_from_addr)
|
||||||
|
|
||||||
|
dictproxy = MetadataDictProxy(
|
||||||
|
notifier=notifier, metadata=metadata, iroh_relay=iroh_relay
|
||||||
|
)
|
||||||
|
|
||||||
|
dictproxy.serve_forever_from_socket(socket)
|
||||||
32
chatmaild/src/chatmaild/metrics.py
Normal file
32
chatmaild/src/chatmaild/metrics.py
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
import sys
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
|
||||||
|
def main(vmail_dir=None):
|
||||||
|
if vmail_dir is None:
|
||||||
|
vmail_dir = sys.argv[1]
|
||||||
|
|
||||||
|
accounts = 0
|
||||||
|
ci_accounts = 0
|
||||||
|
|
||||||
|
for path in Path(vmail_dir).iterdir():
|
||||||
|
if not path.joinpath("cur").is_dir():
|
||||||
|
continue
|
||||||
|
accounts += 1
|
||||||
|
if path.name[:3] in ("ci-", "ac_"):
|
||||||
|
ci_accounts += 1
|
||||||
|
|
||||||
|
print("# HELP total number of accounts")
|
||||||
|
print("# TYPE accounts gauge")
|
||||||
|
print(f"accounts {accounts}")
|
||||||
|
print("# HELP number of CI accounts")
|
||||||
|
print("# TYPE ci_accounts gauge")
|
||||||
|
print(f"ci_accounts {ci_accounts}")
|
||||||
|
print("# HELP number of non-CI accounts")
|
||||||
|
print("# TYPE nonci_accounts gauge")
|
||||||
|
print(f"nonci_accounts {accounts - ci_accounts}")
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
||||||
63
chatmaild/src/chatmaild/migrate_db.py
Normal file
63
chatmaild/src/chatmaild/migrate_db.py
Normal file
@@ -0,0 +1,63 @@
|
|||||||
|
"""
|
||||||
|
migration code from old sqlite databases into per-maildir "password" files
|
||||||
|
where mtime reflects and is updated to be the "last-login" time.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import sqlite3
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from chatmaild.config import read_config
|
||||||
|
|
||||||
|
|
||||||
|
def get_all_rows(path):
|
||||||
|
assert path.exists()
|
||||||
|
uri = f"file:{path}?mode=ro"
|
||||||
|
sqlconn = sqlite3.connect(uri, timeout=60, isolation_level="DEFERRED", uri=True)
|
||||||
|
cur = sqlconn.cursor()
|
||||||
|
cur.execute("SELECT * from users")
|
||||||
|
rows = cur.fetchall()
|
||||||
|
sqlconn.close()
|
||||||
|
return rows
|
||||||
|
|
||||||
|
|
||||||
|
def migrate_from_db_to_maildir(config, chunking=10000):
|
||||||
|
path = config.passdb_path
|
||||||
|
if not path.exists():
|
||||||
|
return
|
||||||
|
|
||||||
|
all_rows = get_all_rows(path)
|
||||||
|
|
||||||
|
# don't transfer special/CI accounts
|
||||||
|
rows = [row for row in all_rows if row[0][:3] not in ("ci-", "ac_")]
|
||||||
|
|
||||||
|
logging.info(f"ignoring {len(all_rows) - len(rows)} CI accounts")
|
||||||
|
logging.info(f"migrating {len(rows)} sqlite database passwords to user dirs")
|
||||||
|
|
||||||
|
for i, row in enumerate(rows):
|
||||||
|
addr = row[0]
|
||||||
|
enc_password = row[1]
|
||||||
|
user = config.get_user(addr)
|
||||||
|
user.set_password(enc_password)
|
||||||
|
|
||||||
|
if len(row) == 3 and row[2]:
|
||||||
|
timestamp = int(row[2])
|
||||||
|
user.set_last_login_timestamp(timestamp)
|
||||||
|
|
||||||
|
if i > 0 and i % chunking == 0:
|
||||||
|
logging.info(f"migration-progress: {i} passwords transferred")
|
||||||
|
|
||||||
|
logging.info("migration: all passwords migrated")
|
||||||
|
oldpath = config.passdb_path.with_suffix(config.passdb_path.suffix + ".old")
|
||||||
|
os.rename(config.passdb_path, oldpath)
|
||||||
|
for path in config.passdb_path.parent.iterdir():
|
||||||
|
if path.name.startswith(config.passdb_path.name + "-"):
|
||||||
|
path.unlink()
|
||||||
|
logging.info(f"migration: moved database to {oldpath!r}")
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
config = read_config(sys.argv[1])
|
||||||
|
logging.basicConfig(level=logging.INFO)
|
||||||
|
migrate_from_db_to_maildir(config)
|
||||||
36
chatmaild/src/chatmaild/newemail.py
Normal file
36
chatmaild/src/chatmaild/newemail.py
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
#!/usr/local/lib/chatmaild/venv/bin/python3
|
||||||
|
|
||||||
|
"""CGI script for creating new accounts."""
|
||||||
|
|
||||||
|
import json
|
||||||
|
import random
|
||||||
|
import secrets
|
||||||
|
import string
|
||||||
|
|
||||||
|
from chatmaild.config import Config, read_config
|
||||||
|
|
||||||
|
CONFIG_PATH = "/usr/local/lib/chatmaild/chatmail.ini"
|
||||||
|
ALPHANUMERIC = string.ascii_lowercase + string.digits
|
||||||
|
ALPHANUMERIC_PUNCT = string.ascii_letters + string.digits + string.punctuation
|
||||||
|
|
||||||
|
|
||||||
|
def create_newemail_dict(config: Config):
|
||||||
|
user = "".join(random.choices(ALPHANUMERIC, k=config.username_min_length))
|
||||||
|
password = "".join(
|
||||||
|
secrets.choice(ALPHANUMERIC_PUNCT)
|
||||||
|
for _ in range(config.password_min_length + 3)
|
||||||
|
)
|
||||||
|
return dict(email=f"{user}@{config.mail_domain}", password=f"{password}")
|
||||||
|
|
||||||
|
|
||||||
|
def print_new_account():
|
||||||
|
config = read_config(CONFIG_PATH)
|
||||||
|
creds = create_newemail_dict(config)
|
||||||
|
|
||||||
|
print("Content-Type: application/json")
|
||||||
|
print("")
|
||||||
|
print(json.dumps(creds))
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
print_new_account()
|
||||||
166
chatmaild/src/chatmaild/notifier.py
Normal file
166
chatmaild/src/chatmaild/notifier.py
Normal file
@@ -0,0 +1,166 @@
|
|||||||
|
"""
|
||||||
|
This modules provides notification machinery for transmitting device tokens to
|
||||||
|
a central notification server which in turn contacts a phone provider's notification server
|
||||||
|
to trigger Delta Chat apps to retrieve messages and provide instant notifications to users.
|
||||||
|
|
||||||
|
The Notifier class arranges the queuing of tokens in separate PriorityQueues
|
||||||
|
from which NotifyThreads take and transmit them via HTTPS
|
||||||
|
to the `notifications.delta.chat` service.
|
||||||
|
The current lack of proper HTTP/2-support in Python leads us
|
||||||
|
to use multiple threads and connections to the Rust-implemented `notifications.delta.chat`
|
||||||
|
which itself uses HTTP/2 and thus only a single connection to phone-notification providers.
|
||||||
|
|
||||||
|
If a token fails to cause a successful notification
|
||||||
|
it is moved to a retry-number specific PriorityQueue
|
||||||
|
which handles all tokens that failed a particular number of times
|
||||||
|
and which are scheduled for retry using exponential back-off timing.
|
||||||
|
If a token notification would be scheduled more than DROP_DEADLINE seconds
|
||||||
|
after its first attempt, it is dropped with a log error.
|
||||||
|
|
||||||
|
Note that tokens are completely opaque to the notification machinery here
|
||||||
|
and will in the future be encrypted foreclosing all ability to distinguish
|
||||||
|
which device token ultimately goes to which phone-provider notification service,
|
||||||
|
or to understand the relation of "device tokens" and chatmail addresses.
|
||||||
|
The meaning and format of tokens is basically a matter of Delta-Chat Core and
|
||||||
|
the `notification.delta.chat` service.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import logging
|
||||||
|
import math
|
||||||
|
import os
|
||||||
|
import time
|
||||||
|
from dataclasses import dataclass
|
||||||
|
from pathlib import Path
|
||||||
|
from queue import PriorityQueue
|
||||||
|
from threading import Thread
|
||||||
|
from uuid import uuid4
|
||||||
|
|
||||||
|
import requests
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class PersistentQueueItem:
|
||||||
|
path: Path
|
||||||
|
addr: str
|
||||||
|
start_ts: int
|
||||||
|
token: str
|
||||||
|
|
||||||
|
def delete(self):
|
||||||
|
self.path.unlink(missing_ok=True)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def create(cls, queue_dir, addr, start_ts, token):
|
||||||
|
queue_id = uuid4().hex
|
||||||
|
start_ts = int(start_ts)
|
||||||
|
path = queue_dir.joinpath(queue_id)
|
||||||
|
tmp_path = path.with_name(path.name + ".tmp")
|
||||||
|
tmp_path.write_text(f"{addr}\n{start_ts}\n{token}")
|
||||||
|
os.rename(tmp_path, path)
|
||||||
|
return cls(path, addr, start_ts, token)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def read_from_path(cls, path):
|
||||||
|
addr, start_ts, token = path.read_text().split("\n", maxsplit=2)
|
||||||
|
return cls(path, addr, int(start_ts), token)
|
||||||
|
|
||||||
|
def __lt__(self, other):
|
||||||
|
return self.start_ts < other.start_ts
|
||||||
|
|
||||||
|
|
||||||
|
class Notifier:
|
||||||
|
URL = "https://notifications.delta.chat/notify"
|
||||||
|
CONNECTION_TIMEOUT = 60.0 # seconds until http-request is given up
|
||||||
|
BASE_DELAY = 8.0 # base seconds for exponential back-off delay
|
||||||
|
DROP_DEADLINE = 5 * 60 * 60 # drop notifications after 5 hours
|
||||||
|
|
||||||
|
def __init__(self, queue_dir):
|
||||||
|
self.queue_dir = queue_dir
|
||||||
|
max_tries = int(math.log(self.DROP_DEADLINE, self.BASE_DELAY)) + 1
|
||||||
|
self.retry_queues = [PriorityQueue() for _ in range(max_tries)]
|
||||||
|
|
||||||
|
def compute_delay(self, retry_num):
|
||||||
|
return 0 if retry_num == 0 else pow(self.BASE_DELAY, retry_num)
|
||||||
|
|
||||||
|
def new_message_for_addr(self, addr, metadata):
|
||||||
|
start_ts = int(time.time())
|
||||||
|
for token in metadata.get_tokens_for_addr(addr):
|
||||||
|
queue_item = PersistentQueueItem.create(
|
||||||
|
self.queue_dir, addr, start_ts, token
|
||||||
|
)
|
||||||
|
self.queue_for_retry(queue_item)
|
||||||
|
|
||||||
|
def requeue_persistent_queue_items(self):
|
||||||
|
for queue_path in self.queue_dir.iterdir():
|
||||||
|
if queue_path.name.endswith(".tmp"):
|
||||||
|
logging.warning(f"removing spurious queue item: {queue_path!r}")
|
||||||
|
queue_path.unlink()
|
||||||
|
continue
|
||||||
|
queue_item = PersistentQueueItem.read_from_path(queue_path)
|
||||||
|
self.queue_for_retry(queue_item)
|
||||||
|
|
||||||
|
def queue_for_retry(self, queue_item, retry_num=0):
|
||||||
|
delay = self.compute_delay(retry_num)
|
||||||
|
when = int(time.time()) + delay
|
||||||
|
deadline = queue_item.start_ts + self.DROP_DEADLINE
|
||||||
|
if retry_num >= len(self.retry_queues) or when > deadline:
|
||||||
|
queue_item.delete()
|
||||||
|
logging.error(f"notification exceeded deadline: {queue_item.token!r}")
|
||||||
|
return
|
||||||
|
|
||||||
|
self.retry_queues[retry_num].put((when, queue_item))
|
||||||
|
|
||||||
|
def start_notification_threads(self, remove_token_from_addr):
|
||||||
|
self.requeue_persistent_queue_items()
|
||||||
|
threads = {}
|
||||||
|
for retry_num in range(len(self.retry_queues)):
|
||||||
|
# use 4 threads for first-try tokens and less for subsequent tries
|
||||||
|
num_threads = 4 if retry_num == 0 else 2
|
||||||
|
threads[retry_num] = []
|
||||||
|
for _ in range(num_threads):
|
||||||
|
thread = NotifyThread(self, retry_num, remove_token_from_addr)
|
||||||
|
threads[retry_num].append(thread)
|
||||||
|
thread.start()
|
||||||
|
return threads
|
||||||
|
|
||||||
|
|
||||||
|
class NotifyThread(Thread):
|
||||||
|
def __init__(self, notifier, retry_num, remove_token_from_addr):
|
||||||
|
super().__init__(daemon=True)
|
||||||
|
self.notifier = notifier
|
||||||
|
self.retry_num = retry_num
|
||||||
|
self.remove_token_from_addr = remove_token_from_addr
|
||||||
|
|
||||||
|
def stop(self):
|
||||||
|
self.notifier.retry_queues[self.retry_num].put((None, None))
|
||||||
|
|
||||||
|
def run(self):
|
||||||
|
requests_session = requests.Session()
|
||||||
|
while self.retry_one(requests_session):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def retry_one(self, requests_session, sleep=time.sleep):
|
||||||
|
when, queue_item = self.notifier.retry_queues[self.retry_num].get()
|
||||||
|
if when is None:
|
||||||
|
return False
|
||||||
|
wait_time = when - int(time.time())
|
||||||
|
if wait_time > 0:
|
||||||
|
sleep(wait_time)
|
||||||
|
self.perform_request_to_notification_server(requests_session, queue_item)
|
||||||
|
return True
|
||||||
|
|
||||||
|
def perform_request_to_notification_server(self, requests_session, queue_item):
|
||||||
|
timeout = self.notifier.CONNECTION_TIMEOUT
|
||||||
|
token = queue_item.token
|
||||||
|
try:
|
||||||
|
res = requests_session.post(self.notifier.URL, data=token, timeout=timeout)
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
res = e
|
||||||
|
else:
|
||||||
|
if res.status_code in (200, 410):
|
||||||
|
if res.status_code == 410:
|
||||||
|
self.remove_token_from_addr(queue_item.addr, token)
|
||||||
|
queue_item.delete()
|
||||||
|
return
|
||||||
|
|
||||||
|
logging.warning(f"Notification request failed: {res!r}")
|
||||||
|
self.notifier.queue_for_retry(queue_item, retry_num=self.retry_num + 1)
|
||||||
@@ -1,36 +0,0 @@
|
|||||||
import pytest
|
|
||||||
|
|
||||||
from .dictproxy import get_user_data
|
|
||||||
from .doveauth import verify_user
|
|
||||||
from .database import Database, DBError
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture()
|
|
||||||
def db(tmpdir):
|
|
||||||
db_path = tmpdir / "passdb.sqlite"
|
|
||||||
print("database path:", db_path)
|
|
||||||
return Database(db_path)
|
|
||||||
|
|
||||||
|
|
||||||
def test_basic(db):
|
|
||||||
verify_user(db, "link2xt@c1.testrun.org", "asdf")
|
|
||||||
data = get_user_data(db, "link2xt@c1.testrun.org")
|
|
||||||
assert data
|
|
||||||
|
|
||||||
|
|
||||||
def test_verify_or_create(db):
|
|
||||||
res = verify_user(db, "newuser1@something.org", "kajdlkajsldk12l3kj1983")
|
|
||||||
assert res["status"] == "ok"
|
|
||||||
res = verify_user(db, "newuser1@something.org", "kajdlqweqwe")
|
|
||||||
assert res["status"] == "fail"
|
|
||||||
|
|
||||||
|
|
||||||
def test_db_version(db):
|
|
||||||
assert db.get_schema_version() == 1
|
|
||||||
|
|
||||||
|
|
||||||
def test_too_high_db_version(db):
|
|
||||||
with db.write_transaction() as conn:
|
|
||||||
conn.execute("PRAGMA user_version=%s;" % (999,))
|
|
||||||
with pytest.raises(DBError):
|
|
||||||
db.ensure_tables()
|
|
||||||
@@ -1,286 +0,0 @@
|
|||||||
import pytest
|
|
||||||
|
|
||||||
from .filtermail import check_encrypted
|
|
||||||
|
|
||||||
|
|
||||||
def test_filtermail():
|
|
||||||
assert not check_encrypted(b"foo")
|
|
||||||
|
|
||||||
assert not check_encrypted(
|
|
||||||
"\r\n".join(
|
|
||||||
[
|
|
||||||
"Subject: =?utf-8?q?Message_from_foobar=40c2=2Etestrun=2Eorg?=",
|
|
||||||
"Chat-Disposition-Notification-To: foobar@c2.testrun.org",
|
|
||||||
"Chat-User-Avatar: 0",
|
|
||||||
"From: <foobar@c2.testrun.org>",
|
|
||||||
"To: <barbaz@c2.testrun.org>",
|
|
||||||
"Date: Sun, 15 Oct 2023 16:41:44 +0000",
|
|
||||||
"Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"Chat-Version: 1.0",
|
|
||||||
"Autocrypt: addr=foobar@c2.testrun.org; prefer-encrypt=mutual;",
|
|
||||||
"\tkeydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m",
|
|
||||||
"\tnNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID",
|
|
||||||
"\tFgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I",
|
|
||||||
"\tHjNLht7Qf6++mAhlJmtDcA/0C8VYJhsUpmiDjuZaMDWNv4FO2BJG6LH7gSm6n7ClMJzjgEZSrw3hIK",
|
|
||||||
"\tKwYBBAGXVQEFAQEHQAxGG/QW0owCfMp1A+vXEMwgzWcBpNFr58kX2eXuPpM6AwEIB8J4BBgWCAAgBQ",
|
|
||||||
"\tJlKvDeAhsMFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJDg1gEAwLf8KDoAAKyYgjyI",
|
|
||||||
"\tvYvO9VEgBni1C4Xx1VjcaEmlDK8BALoFuUCK+enw76TtDcAUKhlhUiM6SDRExkS4Nskp/BcK",
|
|
||||||
"MIME-Version: 1.0",
|
|
||||||
"Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no",
|
|
||||||
"",
|
|
||||||
"Hi!",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
]
|
|
||||||
).encode()
|
|
||||||
)
|
|
||||||
|
|
||||||
assert not check_encrypted(
|
|
||||||
"\r\n".join(
|
|
||||||
[
|
|
||||||
"Subject: =?utf-8?q?Message_from_foobar=40c2=2Etestrun=2Eorg?=",
|
|
||||||
"Chat-Disposition-Notification-To: foobar@c2.testrun.org",
|
|
||||||
"Chat-User-Avatar: 0",
|
|
||||||
"From: <foobar@c2.testrun.org>",
|
|
||||||
"To: <barbaz@c2.testrun.org>",
|
|
||||||
"Date: Sun, 15 Oct 2023 16:41:44 +0000",
|
|
||||||
"Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"Chat-Version: 1.0",
|
|
||||||
"Autocrypt: addr=foobar@c2.testrun.org; prefer-encrypt=mutual;",
|
|
||||||
"\tkeydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m",
|
|
||||||
"\tnNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID",
|
|
||||||
"\tFgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I",
|
|
||||||
"\tHjNLht7Qf6++mAhlJmtDcA/0C8VYJhsUpmiDjuZaMDWNv4FO2BJG6LH7gSm6n7ClMJzjgEZSrw3hIK",
|
|
||||||
"\tKwYBBAGXVQEFAQEHQAxGG/QW0owCfMp1A+vXEMwgzWcBpNFr58kX2eXuPpM6AwEIB8J4BBgWCAAgBQ",
|
|
||||||
"\tJlKvDeAhsMFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJDg1gEAwLf8KDoAAKyYgjyI",
|
|
||||||
"\tvYvO9VEgBni1C4Xx1VjcaEmlDK8BALoFuUCK+enw76TtDcAUKhlhUiM6SDRExkS4Nskp/BcK",
|
|
||||||
"MIME-Version: 1.0",
|
|
||||||
"Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no",
|
|
||||||
"",
|
|
||||||
"Hi!",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
]
|
|
||||||
).encode()
|
|
||||||
)
|
|
||||||
|
|
||||||
# https://xkcd.com/1181/
|
|
||||||
assert not check_encrypted(
|
|
||||||
"\r\n".join(
|
|
||||||
[
|
|
||||||
"Subject: =?utf-8?q?Message_from_foobar=40c2=2Etestrun=2Eorg?=",
|
|
||||||
"Chat-Disposition-Notification-To: foobar@c2.testrun.org",
|
|
||||||
"Chat-User-Avatar: 0",
|
|
||||||
"From: <foobar@c2.testrun.org>",
|
|
||||||
"To: <barbaz@c2.testrun.org>",
|
|
||||||
"Date: Sun, 15 Oct 2023 16:41:44 +0000",
|
|
||||||
"Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"Chat-Version: 1.0",
|
|
||||||
"Autocrypt: addr=foobar@c2.testrun.org; prefer-encrypt=mutual;",
|
|
||||||
"\tkeydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m",
|
|
||||||
"\tnNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID",
|
|
||||||
"\tFgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I",
|
|
||||||
"\tHjNLht7Qf6++mAhlJmtDcA/0C8VYJhsUpmiDjuZaMDWNv4FO2BJG6LH7gSm6n7ClMJzjgEZSrw3hIK",
|
|
||||||
"\tKwYBBAGXVQEFAQEHQAxGG/QW0owCfMp1A+vXEMwgzWcBpNFr58kX2eXuPpM6AwEIB8J4BBgWCAAgBQ",
|
|
||||||
"\tJlKvDeAhsMFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJDg1gEAwLf8KDoAAKyYgjyI",
|
|
||||||
"\tvYvO9VEgBni1C4Xx1VjcaEmlDK8BALoFuUCK+enw76TtDcAUKhlhUiM6SDRExkS4Nskp/BcK",
|
|
||||||
"MIME-Version: 1.0",
|
|
||||||
"Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no",
|
|
||||||
"",
|
|
||||||
"-----BEGIN PGP MESSAGE-----",
|
|
||||||
"Hi!",
|
|
||||||
"-----END PGP MESSAGE-----",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
]
|
|
||||||
).encode()
|
|
||||||
)
|
|
||||||
|
|
||||||
assert check_encrypted(
|
|
||||||
"\r\n".join(
|
|
||||||
[
|
|
||||||
"Subject: ...",
|
|
||||||
"From: <barbaz@c2.testrun.org>",
|
|
||||||
"To: <foobar@c2.testrun.org>",
|
|
||||||
"Date: Sun, 15 Oct 2023 16:43:21 +0000",
|
|
||||||
"Message-ID: <Mr.UVyJWZmkCKM.hGzNc6glBE_@c2.testrun.org>",
|
|
||||||
"In-Reply-To: <Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>",
|
|
||||||
"References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"\t<Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>",
|
|
||||||
"Chat-Version: 1.0",
|
|
||||||
"Autocrypt: addr=barbaz@c2.testrun.org; prefer-encrypt=mutual;",
|
|
||||||
"\tkeydata=xjMEZSwWjhYJKwYBBAHaRw8BAQdAQBEhqeJh0GueHB6kF/DUQqYCxARNBVokg/AzT+7LqH",
|
|
||||||
"\trNFzxiYXJiYXpAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUsFo4CGwMECwkIBwYVCAkKCwID",
|
|
||||||
"\tFgIBFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX9A4AEAnHWHp49eBCMHK5t66gYPiW",
|
|
||||||
"\tXQuB1mwUjzGfYWB+0RXUoA/0xcQ3FbUNlGKW7Blp6eMFfViv6Mv2d3kNSXACB6nmcMzjgEZSwWjhIK",
|
|
||||||
"\tKwYBBAGXVQEFAQEHQBpY5L2M1XHo0uxf8SX1wNLBp/OVvidoWHQF2Jz+kJsUAwEIB8J4BBgWCAAgBQ",
|
|
||||||
"\tJlLBaOAhsMFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX/INgEA37AJaNvruYsJVanP",
|
|
||||||
"\tIXnYw4CKd55UAwl8Zcy+M2diAbkA/0fHHcGV4r78hpbbL1Os52DPOdqYQRauIeJUeG+G6bQO",
|
|
||||||
"MIME-Version: 1.0",
|
|
||||||
'Content-Type: multipart/encrypted; protocol="application/pgp-encrypted";',
|
|
||||||
'\tboundary="YFrteb74qSXmggbOxZL9dRnhymywAi"',
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--YFrteb74qSXmggbOxZL9dRnhymywAi",
|
|
||||||
"Content-Description: PGP/MIME version identification",
|
|
||||||
"Content-Type: application/pgp-encrypted",
|
|
||||||
"",
|
|
||||||
"Version: 1",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--YFrteb74qSXmggbOxZL9dRnhymywAi",
|
|
||||||
"Content-Description: OpenPGP encrypted message",
|
|
||||||
'Content-Disposition: inline; filename="encrypted.asc";',
|
|
||||||
'Content-Type: application/octet-stream; name="encrypted.asc"',
|
|
||||||
"",
|
|
||||||
"-----BEGIN PGP MESSAGE-----",
|
|
||||||
"",
|
|
||||||
"wU4DhW3gBZ/VvCYSAQdA8bMs2spwbKdGjVsL1ByPkNrqD7frpB73maeL6I6SzDYg",
|
|
||||||
"O5G53tv339RdKq3WRcCtEEvxjHlUx2XNwXzC04BpmfvBTgNfPUyLDzjXnxIBB0Ae",
|
|
||||||
"8ymwGvXMCCimHXN0Dg8Ui62KOi03h0UgheoHWovJSCDF4CKre/xtFr3nL7lq/PKI",
|
|
||||||
"JsjVNz7/RK9FSXF6WwfONtLCyQGEuVAsB/KXfCBEyfKhaMwGHvhujRidGW5uV1no",
|
|
||||||
"lMGl3ODmo29Lgeu2uSE7EpJRZoe6hU6ddmBkqxax61ZtkaFlGFFpdo2K8balNNdz",
|
|
||||||
"ZsJ/9mmI9x3oOJ4/l1nhQbUO9ADbs7gJhFdV5Qkp30b5fCI7bU+aoe1ccBbLe/WM",
|
|
||||||
"YUty1PqcuQT7XjA+XmYuL261tvW8pBetT+i33/E2d8PzzYt2IuK9qeevyS+yxdwA",
|
|
||||||
"kfwejFWzzsUlJaDxs1x4XOxkMgSj+jo+g12dFOb7fyClsAnq23iDb8AuaT/BScAI",
|
|
||||||
"+lO+gher69+6LmM7VGHLG5k762J1jTaQCaKt1s8TAWV99Eo4491vL6fyvk3l/Cfg",
|
|
||||||
"RXSwiWFgj19Pn0Rq7CD9v22UE2vdUMBTcV4aw79mClk1YQ23jbF0y5DCjPdJ62Zo",
|
|
||||||
"tskBgFt3NoWV80jZ76zIBLrrjLwCCll8JjJtFwSkt2GX5RFBsVa4A8IDht9RtEk7",
|
|
||||||
"rrHgbSZQfkauEi/mH3/6CDZoLqSHudUZ7d4MaJwun1TkFYGe2ORwGJd4OBj3oGJp",
|
|
||||||
"H8YBwCpk///L/fKjX0Gg3M8nrpM4wrRFhPKidAgO/kcm25X4+ZHlVkWBTCt5RWKI",
|
|
||||||
"fHh6oLDZCqCfcgMkE1KKmwfIHaUkhq5BPRigwy6i5dh1DM4+1UCLh3dxzVbqE9b9",
|
|
||||||
"61NB19nXdRtDA2sOUnj9ve6m/wEPyCb6/zBQZqvCBYb1/AjdXpUrFT+DbpfyxaXN",
|
|
||||||
"XfhDVb5mNqNM/IVj0V5fvTc6vOfYbzQtPm10H+FdWWfb+rJRfyC3MA2w2IqstFe3",
|
|
||||||
"w3bu2iE6CQvSqRvge+ZqLKt/NqYwOURiUmpuklbl3kPJ97+mfKWoiqk8Iz1VY+bb",
|
|
||||||
"NMUC7aoGv+jcoj+WS6PYO8N6BeRVUUB3ZJSf8nzjgxm1/BcM+UD3BPrlhT11ODRs",
|
|
||||||
"baifGbprMWwt3dhb8cQgRT8GPdpO1OsDkzL6iikMjLHWWiA99GV6ruiHsIPw6boW",
|
|
||||||
"A6/uSOskbDHOROotKmddGTBd0iiHXAoQsJFt1ZjUkt6EHrgWs+GAvrvKpXs1mrz8",
|
|
||||||
"uj3GwEFrHS+Xuf2UDgpszYT3hI2cL/kUtGakVR7m7vVMZqXBUbZdGAEb1PZNPwsI",
|
|
||||||
"E4aMK02+EVB+tSN4Fzj99N2YD0inVYt+oPjr2tHhUS6aSGBNS/48Ki47DOg4Sxkn",
|
|
||||||
"lkOWnEbCD+XTnbDd",
|
|
||||||
"=agR5",
|
|
||||||
"-----END PGP MESSAGE-----",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--YFrteb74qSXmggbOxZL9dRnhymywAi--",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
]
|
|
||||||
).encode()
|
|
||||||
)
|
|
||||||
|
|
||||||
assert not check_encrypted(
|
|
||||||
"\r\n".join(
|
|
||||||
[
|
|
||||||
"Subject: Buy Penis Enlargement at www.malicious-domain.com",
|
|
||||||
"From: <barbaz@c2.testrun.org>",
|
|
||||||
"To: <foobar@c2.testrun.org>",
|
|
||||||
"Date: Sun, 15 Oct 2023 16:43:21 +0000",
|
|
||||||
"Message-ID: <Mr.UVyJWZmkCKM.hGzNc6glBE_@c2.testrun.org>",
|
|
||||||
"In-Reply-To: <Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>",
|
|
||||||
"References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>",
|
|
||||||
"\t<Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>",
|
|
||||||
"Chat-Version: 1.0",
|
|
||||||
"Autocrypt: addr=barbaz@c2.testrun.org; prefer-encrypt=mutual;",
|
|
||||||
"\tkeydata=xjMEZSwWjhYJKwYBBAHaRw8BAQdAQBEhqeJh0GueHB6kF/DUQqYCxARNBVokg/AzT+7LqH",
|
|
||||||
"\trNFzxiYXJiYXpAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUsFo4CGwMECwkIBwYVCAkKCwID",
|
|
||||||
"\tFgIBFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX9A4AEAnHWHp49eBCMHK5t66gYPiW",
|
|
||||||
"\tXQuB1mwUjzGfYWB+0RXUoA/0xcQ3FbUNlGKW7Blp6eMFfViv6Mv2d3kNSXACB6nmcMzjgEZSwWjhIK",
|
|
||||||
"\tKwYBBAGXVQEFAQEHQBpY5L2M1XHo0uxf8SX1wNLBp/OVvidoWHQF2Jz+kJsUAwEIB8J4BBgWCAAgBQ",
|
|
||||||
"\tJlLBaOAhsMFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX/INgEA37AJaNvruYsJVanP",
|
|
||||||
"\tIXnYw4CKd55UAwl8Zcy+M2diAbkA/0fHHcGV4r78hpbbL1Os52DPOdqYQRauIeJUeG+G6bQO",
|
|
||||||
"MIME-Version: 1.0",
|
|
||||||
'Content-Type: multipart/encrypted; protocol="application/pgp-encrypted";',
|
|
||||||
'\tboundary="YFrteb74qSXmggbOxZL9dRnhymywAi"',
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--YFrteb74qSXmggbOxZL9dRnhymywAi",
|
|
||||||
"Content-Description: PGP/MIME version identification",
|
|
||||||
"Content-Type: application/pgp-encrypted",
|
|
||||||
"",
|
|
||||||
"Version: 1",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--YFrteb74qSXmggbOxZL9dRnhymywAi",
|
|
||||||
"Content-Description: OpenPGP encrypted message",
|
|
||||||
'Content-Disposition: inline; filename="encrypted.asc";',
|
|
||||||
'Content-Type: application/octet-stream; name="encrypted.asc"',
|
|
||||||
"",
|
|
||||||
"-----BEGIN PGP MESSAGE-----",
|
|
||||||
"",
|
|
||||||
"wU4DhW3gBZ/VvCYSAQdA8bMs2spwbKdGjVsL1ByPkNrqD7frpB73maeL6I6SzDYg",
|
|
||||||
"O5G53tv339RdKq3WRcCtEEvxjHlUx2XNwXzC04BpmfvBTgNfPUyLDzjXnxIBB0Ae",
|
|
||||||
"8ymwGvXMCCimHXN0Dg8Ui62KOi03h0UgheoHWovJSCDF4CKre/xtFr3nL7lq/PKI",
|
|
||||||
"JsjVNz7/RK9FSXF6WwfONtLCyQGEuVAsB/KXfCBEyfKhaMwGHvhujRidGW5uV1no",
|
|
||||||
"lMGl3ODmo29Lgeu2uSE7EpJRZoe6hU6ddmBkqxax61ZtkaFlGFFpdo2K8balNNdz",
|
|
||||||
"ZsJ/9mmI9x3oOJ4/l1nhQbUO9ADbs7gJhFdV5Qkp30b5fCI7bU+aoe1ccBbLe/WM",
|
|
||||||
"YUty1PqcuQT7XjA+XmYuL261tvW8pBetT+i33/E2d8PzzYt2IuK9qeevyS+yxdwA",
|
|
||||||
"kfwejFWzzsUlJaDxs1x4XOxkMgSj+jo+g12dFOb7fyClsAnq23iDb8AuaT/BScAI",
|
|
||||||
"+lO+gher69+6LmM7VGHLG5k762J1jTaQCaKt1s8TAWV99Eo4491vL6fyvk3l/Cfg",
|
|
||||||
"RXSwiWFgj19Pn0Rq7CD9v22UE2vdUMBTcV4aw79mClk1YQ23jbF0y5DCjPdJ62Zo",
|
|
||||||
"tskBgFt3NoWV80jZ76zIBLrrjLwCCll8JjJtFwSkt2GX5RFBsVa4A8IDht9RtEk7",
|
|
||||||
"rrHgbSZQfkauEi/mH3/6CDZoLqSHudUZ7d4MaJwun1TkFYGe2ORwGJd4OBj3oGJp",
|
|
||||||
"H8YBwCpk///L/fKjX0Gg3M8nrpM4wrRFhPKidAgO/kcm25X4+ZHlVkWBTCt5RWKI",
|
|
||||||
"fHh6oLDZCqCfcgMkE1KKmwfIHaUkhq5BPRigwy6i5dh1DM4+1UCLh3dxzVbqE9b9",
|
|
||||||
"61NB19nXdRtDA2sOUnj9ve6m/wEPyCb6/zBQZqvCBYb1/AjdXpUrFT+DbpfyxaXN",
|
|
||||||
"XfhDVb5mNqNM/IVj0V5fvTc6vOfYbzQtPm10H+FdWWfb+rJRfyC3MA2w2IqstFe3",
|
|
||||||
"w3bu2iE6CQvSqRvge+ZqLKt/NqYwOURiUmpuklbl3kPJ97+mfKWoiqk8Iz1VY+bb",
|
|
||||||
"NMUC7aoGv+jcoj+WS6PYO8N6BeRVUUB3ZJSf8nzjgxm1/BcM+UD3BPrlhT11ODRs",
|
|
||||||
"baifGbprMWwt3dhb8cQgRT8GPdpO1OsDkzL6iikMjLHWWiA99GV6ruiHsIPw6boW",
|
|
||||||
"A6/uSOskbDHOROotKmddGTBd0iiHXAoQsJFt1ZjUkt6EHrgWs+GAvrvKpXs1mrz8",
|
|
||||||
"uj3GwEFrHS+Xuf2UDgpszYT3hI2cL/kUtGakVR7m7vVMZqXBUbZdGAEb1PZNPwsI",
|
|
||||||
"E4aMK02+EVB+tSN4Fzj99N2YD0inVYt+oPjr2tHhUS6aSGBNS/48Ki47DOg4Sxkn",
|
|
||||||
"lkOWnEbCD+XTnbDd",
|
|
||||||
"=agR5",
|
|
||||||
"-----END PGP MESSAGE-----",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--YFrteb74qSXmggbOxZL9dRnhymywAi--",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
]
|
|
||||||
).encode()
|
|
||||||
)
|
|
||||||
|
|
||||||
assert not check_encrypted(
|
|
||||||
"\r\n".join(
|
|
||||||
[
|
|
||||||
"Subject: Message opened",
|
|
||||||
"From: <barbaz@c2.testrun.org>",
|
|
||||||
"To: <foobar@c2.testrun.org>",
|
|
||||||
"Date: Sun, 15 Oct 2023 16:43:25 +0000",
|
|
||||||
"Message-ID: <Mr.78MWtlV7RAi.goCFzBhCYfy@c2.testrun.org>",
|
|
||||||
"Auto-Submitted: auto-replied",
|
|
||||||
"Chat-Version: 1.0",
|
|
||||||
"MIME-Version: 1.0",
|
|
||||||
"Content-Type: multipart/report; report-type=disposition-notification;",
|
|
||||||
'\tboundary="Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi"',
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi",
|
|
||||||
"Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no",
|
|
||||||
"",
|
|
||||||
'The "Hi!" message you sent was displayed on the screen of the recipient.',
|
|
||||||
"",
|
|
||||||
"This is no guarantee the content was read.",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi",
|
|
||||||
"Content-Type: message/disposition-notification",
|
|
||||||
"",
|
|
||||||
"Reporting-UA: Delta Chat 1.124.1",
|
|
||||||
"Original-Recipient: rfc822;barbaz@c2.testrun.org",
|
|
||||||
"Final-Recipient: rfc822;barbaz@c2.testrun.org",
|
|
||||||
"Original-Message-ID: <Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>",
|
|
||||||
"Disposition: manual-action/MDN-sent-automatically; displayed",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
"--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi--",
|
|
||||||
"",
|
|
||||||
"",
|
|
||||||
]
|
|
||||||
).encode()
|
|
||||||
)
|
|
||||||
56
chatmaild/src/chatmaild/tests/mail-data/asm.eml
Normal file
56
chatmaild/src/chatmaild/tests/mail-data/asm.eml
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
From: {from_addr}
|
||||||
|
To: {to_addr}
|
||||||
|
Autocrypt-Setup-Message: v1
|
||||||
|
Subject: Autocrypt Setup Message
|
||||||
|
Date: Tue, 22 Jan 2019 12:56:29 +0100
|
||||||
|
Content-type: multipart/mixed; boundary="Y6fyGi9SoGeH8WwRaEdC6bbBcYOedDzrQ"
|
||||||
|
|
||||||
|
--Y6fyGi9SoGeH8WwRaEdC6bbBcYOedDzrQ
|
||||||
|
Content-Type: text/plain
|
||||||
|
|
||||||
|
This message contains all information to transfer your Autocrypt
|
||||||
|
settings along with your secret key securely from your original
|
||||||
|
device.
|
||||||
|
|
||||||
|
To set up your new device for Autocrypt, please follow the
|
||||||
|
instuctions that should be presented by your new device.
|
||||||
|
|
||||||
|
You can keep this message and use it as a backup for your secret
|
||||||
|
key. If you want to do this, you should write down the Setup Code
|
||||||
|
and store it securely.
|
||||||
|
--Y6fyGi9SoGeH8WwRaEdC6bbBcYOedDzrQ
|
||||||
|
Content-Type: application/autocrypt-setup
|
||||||
|
Content-Disposition: attachment; filename="autocrypt-setup-message.html"
|
||||||
|
|
||||||
|
<html><body>
|
||||||
|
<p>
|
||||||
|
This is the Autocrypt setup file used to transfer settings and
|
||||||
|
keys between clients. You can decrypt it using the Setup Code
|
||||||
|
presented on your old device, and then import the contained key
|
||||||
|
into your keyring.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<pre>
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
Passphrase-Format: numeric9x4
|
||||||
|
Passphrase-Begin: 17
|
||||||
|
|
||||||
|
jA0EBwMCFAxADoCdzeX/0ukBlqI5+pfpKb751qd/7nLNbkpy3gVcaf1QwRPZYt40
|
||||||
|
Ynp08UqRQ2g48ZlnzHLSwlTGOPTuv2Jt8ka+pgZ45xzvJSG2gau03xP4VsC271kR
|
||||||
|
VmCjdb0Y6Rk96mAwfGzrkbaRQ9Z7fIoL866GOv6h9neiVIkp+JYlTV6ISD0ZQJ4Q
|
||||||
|
I6dOQkB/TWZyVjtiJDOQHdfNWliA6NtqaLq19wlu9L5xXjuNpY95KwR8EJXWe0+o
|
||||||
|
Y3d2U/KxOAkXKghP2Qg1GtlPVeGC5T4p03TGI6pzKT+kHX6Rrm9wK6sM9aTquMmF
|
||||||
|
Vok84Jg1DFnwivWC2RILR81rXi7k/+Y6MUbveFgJ9cQduqpxnmD7TjOblYu7M6zp
|
||||||
|
YGAUxh8DRKlIMn2QsA++DBYQ6ACZvwuY8qTDLkqPDo4WqM313dsMJbyGjDdVE7EM
|
||||||
|
PESS+RlABETpZXz8g/ycr6DIUNdlbPcmYlsBfHWDOuR2GFFTwmlv5slWS39dJv38
|
||||||
|
E0eIe1CwdxI801Se7t7dUUS/ZF8wb6GlmxOcqGbF8eko1Z0S64IAm7/h13MRQCxI
|
||||||
|
geQnHfGYVJ2FOimoCMEKwfa9x++RFTDW0u7spDC2uWvK/1viV8OfRppFhLr/kmKb
|
||||||
|
18lWXuAz80DAjUDUsVqEq2MvJBJGoCJUEyjuRsLkHYRM5jYk4v50LyyR0Om73nWF
|
||||||
|
nZBqmqNzdr7Xb9PHHdFhnEc0VvoYbrcM0RVYcEMW3YbmejM891j1d6Iv+/n/qND/
|
||||||
|
NdebGrfWJMmFLf/iEkzTZ3/v5inW9LpWoRc94ioCjJTaEo8Rib6ARRFaJVIsmNXi
|
||||||
|
YicFGO98D+zX+a2t9Yz6IpPajVslnOp6ScpmXgts/2XWD7oE+JgxSAqo/dLVsHgP
|
||||||
|
Ufo=
|
||||||
|
=pulM
|
||||||
|
-----END PGP MESSAGE-----
|
||||||
|
</pre></body></html>
|
||||||
|
--Y6fyGi9SoGeH8WwRaEdC6bbBcYOedDzrQ--
|
||||||
66
chatmaild/src/chatmaild/tests/mail-data/encrypted.eml
Normal file
66
chatmaild/src/chatmaild/tests/mail-data/encrypted.eml
Normal file
@@ -0,0 +1,66 @@
|
|||||||
|
From: {from_addr}
|
||||||
|
To: {to_addr}
|
||||||
|
Subject: {subject}
|
||||||
|
Date: Sun, 15 Oct 2023 16:43:21 +0000
|
||||||
|
Message-ID: <Mr.UVyJWZmkCKM.hGzNc6glBE_@c2.testrun.org>
|
||||||
|
In-Reply-To: <Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>
|
||||||
|
References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
|
<Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>
|
||||||
|
Chat-Version: 1.0
|
||||||
|
Autocrypt: addr={from_addr}; prefer-encrypt=mutual;
|
||||||
|
keydata=xjMEZSwWjhYJKwYBBAHaRw8BAQdAQBEhqeJh0GueHB6kF/DUQqYCxARNBVokg/AzT+7LqH
|
||||||
|
rNFzxiYXJiYXpAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUsFo4CGwMECwkIBwYVCAkKCwID
|
||||||
|
FgIBFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX9A4AEAnHWHp49eBCMHK5t66gYPiW
|
||||||
|
XQuB1mwUjzGfYWB+0RXUoA/0xcQ3FbUNlGKW7Blp6eMFfViv6Mv2d3kNSXACB6nmcMzjgEZSwWjhIK
|
||||||
|
KwYBBAGXVQEFAQEHQBpY5L2M1XHo0uxf8SX1wNLBp/OVvidoWHQF2Jz+kJsUAwEIB8J4BBgWCAAgBQ
|
||||||
|
JlLBaOAhsMFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX/INgEA37AJaNvruYsJVanP
|
||||||
|
IXnYw4CKd55UAwl8Zcy+M2diAbkA/0fHHcGV4r78hpbbL1Os52DPOdqYQRauIeJUeG+G6bQO
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: multipart/encrypted; protocol="application/pgp-encrypted";
|
||||||
|
boundary="YFrteb74qSXmggbOxZL9dRnhymywAi"
|
||||||
|
|
||||||
|
|
||||||
|
--YFrteb74qSXmggbOxZL9dRnhymywAi
|
||||||
|
Content-Description: PGP/MIME version identification
|
||||||
|
Content-Type: application/pgp-encrypted
|
||||||
|
|
||||||
|
Version: 1
|
||||||
|
|
||||||
|
|
||||||
|
--YFrteb74qSXmggbOxZL9dRnhymywAi
|
||||||
|
Content-Description: OpenPGP encrypted message
|
||||||
|
Content-Disposition: inline; filename="encrypted.asc";
|
||||||
|
Content-Type: application/octet-stream; name="encrypted.asc"
|
||||||
|
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
wU4DhW3gBZ/VvCYSAQdA8bMs2spwbKdGjVsL1ByPkNrqD7frpB73maeL6I6SzDYg
|
||||||
|
O5G53tv339RdKq3WRcCtEEvxjHlUx2XNwXzC04BpmfvBTgNfPUyLDzjXnxIBB0Ae
|
||||||
|
8ymwGvXMCCimHXN0Dg8Ui62KOi03h0UgheoHWovJSCDF4CKre/xtFr3nL7lq/PKI
|
||||||
|
JsjVNz7/RK9FSXF6WwfONtLCyQGEuVAsB/KXfCBEyfKhaMwGHvhujRidGW5uV1no
|
||||||
|
lMGl3ODmo29Lgeu2uSE7EpJRZoe6hU6ddmBkqxax61ZtkaFlGFFpdo2K8balNNdz
|
||||||
|
ZsJ/9mmI9x3oOJ4/l1nhQbUO9ADbs7gJhFdV5Qkp30b5fCI7bU+aoe1ccBbLe/WM
|
||||||
|
YUty1PqcuQT7XjA+XmYuL261tvW8pBetT+i33/E2d8PzzYt2IuK9qeevyS+yxdwA
|
||||||
|
kfwejFWzzsUlJaDxs1x4XOxkMgSj+jo+g12dFOb7fyClsAnq23iDb8AuaT/BScAI
|
||||||
|
+lO+gher69+6LmM7VGHLG5k762J1jTaQCaKt1s8TAWV99Eo4491vL6fyvk3l/Cfg
|
||||||
|
RXSwiWFgj19Pn0Rq7CD9v22UE2vdUMBTcV4aw79mClk1YQ23jbF0y5DCjPdJ62Zo
|
||||||
|
tskBgFt3NoWV80jZ76zIBLrrjLwCCll8JjJtFwSkt2GX5RFBsVa4A8IDht9RtEk7
|
||||||
|
rrHgbSZQfkauEi/mH3/6CDZoLqSHudUZ7d4MaJwun1TkFYGe2ORwGJd4OBj3oGJp
|
||||||
|
H8YBwCpk///L/fKjX0Gg3M8nrpM4wrRFhPKidAgO/kcm25X4+ZHlVkWBTCt5RWKI
|
||||||
|
fHh6oLDZCqCfcgMkE1KKmwfIHaUkhq5BPRigwy6i5dh1DM4+1UCLh3dxzVbqE9b9
|
||||||
|
61NB19nXdRtDA2sOUnj9ve6m/wEPyCb6/zBQZqvCBYb1/AjdXpUrFT+DbpfyxaXN
|
||||||
|
XfhDVb5mNqNM/IVj0V5fvTc6vOfYbzQtPm10H+FdWWfb+rJRfyC3MA2w2IqstFe3
|
||||||
|
w3bu2iE6CQvSqRvge+ZqLKt/NqYwOURiUmpuklbl3kPJ97+mfKWoiqk8Iz1VY+bb
|
||||||
|
NMUC7aoGv+jcoj+WS6PYO8N6BeRVUUB3ZJSf8nzjgxm1/BcM+UD3BPrlhT11ODRs
|
||||||
|
baifGbprMWwt3dhb8cQgRT8GPdpO1OsDkzL6iikMjLHWWiA99GV6ruiHsIPw6boW
|
||||||
|
A6/uSOskbDHOROotKmddGTBd0iiHXAoQsJFt1ZjUkt6EHrgWs+GAvrvKpXs1mrz8
|
||||||
|
uj3GwEFrHS+Xuf2UDgpszYT3hI2cL/kUtGakVR7m7vVMZqXBUbZdGAEb1PZNPwsI
|
||||||
|
E4aMK02+EVB+tSN4Fzj99N2YD0inVYt+oPjr2tHhUS6aSGBNS/48Ki47DOg4Sxkn
|
||||||
|
lkOWnEbCD+XTnbDd
|
||||||
|
=agR5
|
||||||
|
-----END PGP MESSAGE-----
|
||||||
|
|
||||||
|
|
||||||
|
--YFrteb74qSXmggbOxZL9dRnhymywAi--
|
||||||
|
|
||||||
|
|
||||||
25
chatmaild/src/chatmaild/tests/mail-data/fake-encrypted.eml
Normal file
25
chatmaild/src/chatmaild/tests/mail-data/fake-encrypted.eml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
Subject: =?utf-8?q?Message_from_foobar=40c2=2Etestrun=2Eorg?=
|
||||||
|
Chat-Disposition-Notification-To: foobar@c2.testrun.org
|
||||||
|
Chat-User-Avatar: 0
|
||||||
|
From: <{from_addr}>
|
||||||
|
To: <{to_addr}>
|
||||||
|
Date: Sun, 15 Oct 2023 16:41:44 +0000
|
||||||
|
Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
|
References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
|
Chat-Version: 1.0
|
||||||
|
Autocrypt: addr={from_addr}; prefer-encrypt=mutual;
|
||||||
|
keydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m
|
||||||
|
nNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID
|
||||||
|
FgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I
|
||||||
|
HjNLht7Qf6++mAhlJmtDcA/0C8VYJhsUpmiDjuZaMDWNv4FO2BJG6LH7gSm6n7ClMJzjgEZSrw3hIK
|
||||||
|
KwYBBAGXVQEFAQEHQAxGG/QW0owCfMp1A+vXEMwgzWcBpNFr58kX2eXuPpM6AwEIB8J4BBgWCAAgBQ
|
||||||
|
JlKvDeAhsMFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJDg1gEAwLf8KDoAAKyYgjyI
|
||||||
|
vYvO9VEgBni1C4Xx1VjcaEmlDK8BALoFuUCK+enw76TtDcAUKhlhUiM6SDRExkS4Nskp/BcK
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no
|
||||||
|
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
Hi!
|
||||||
|
-----END PGP MESSAGE-----
|
||||||
|
|
||||||
|
|
||||||
44
chatmaild/src/chatmaild/tests/mail-data/literal.eml
Normal file
44
chatmaild/src/chatmaild/tests/mail-data/literal.eml
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
From: {from_addr}
|
||||||
|
To: {to_addr}
|
||||||
|
Subject: ...
|
||||||
|
Date: Sun, 15 Oct 2023 16:43:21 +0000
|
||||||
|
Message-ID: <Mr.UVyJWZmkCKM.hGzNc6glBE_@c2.testrun.org>
|
||||||
|
In-Reply-To: <Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>
|
||||||
|
References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
|
<Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>
|
||||||
|
Chat-Version: 1.0
|
||||||
|
Autocrypt: addr={from_addr}; prefer-encrypt=mutual;
|
||||||
|
keydata=xjMEZSwWjhYJKwYBBAHaRw8BAQdAQBEhqeJh0GueHB6kF/DUQqYCxARNBVokg/AzT+7LqH
|
||||||
|
rNFzxiYXJiYXpAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUsFo4CGwMECwkIBwYVCAkKCwID
|
||||||
|
FgIBFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX9A4AEAnHWHp49eBCMHK5t66gYPiW
|
||||||
|
XQuB1mwUjzGfYWB+0RXUoA/0xcQ3FbUNlGKW7Blp6eMFfViv6Mv2d3kNSXACB6nmcMzjgEZSwWjhIK
|
||||||
|
KwYBBAGXVQEFAQEHQBpY5L2M1XHo0uxf8SX1wNLBp/OVvidoWHQF2Jz+kJsUAwEIB8J4BBgWCAAgBQ
|
||||||
|
JlLBaOAhsMFiEEFTfUNvVnY3b9F7yHnmme1PfUhX8ACgkQnmme1PfUhX/INgEA37AJaNvruYsJVanP
|
||||||
|
IXnYw4CKd55UAwl8Zcy+M2diAbkA/0fHHcGV4r78hpbbL1Os52DPOdqYQRauIeJUeG+G6bQO
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: multipart/encrypted; protocol="application/pgp-encrypted";
|
||||||
|
boundary="YFrteb74qSXmggbOxZL9dRnhymywAi"
|
||||||
|
|
||||||
|
|
||||||
|
--YFrteb74qSXmggbOxZL9dRnhymywAi
|
||||||
|
Content-Description: PGP/MIME version identification
|
||||||
|
Content-Type: application/pgp-encrypted
|
||||||
|
|
||||||
|
Version: 1
|
||||||
|
|
||||||
|
|
||||||
|
--YFrteb74qSXmggbOxZL9dRnhymywAi
|
||||||
|
Content-Description: OpenPGP encrypted message
|
||||||
|
Content-Disposition: inline; filename="encrypted.asc";
|
||||||
|
Content-Type: application/octet-stream; name="encrypted.asc"
|
||||||
|
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
yxJiAAAAAABIZWxsbyB3b3JsZCE=
|
||||||
|
=1I/B
|
||||||
|
-----END PGP MESSAGE-----
|
||||||
|
|
||||||
|
|
||||||
|
--YFrteb74qSXmggbOxZL9dRnhymywAi--
|
||||||
|
|
||||||
|
|
||||||
46
chatmaild/src/chatmaild/tests/mail-data/mailer-daemon.eml
Normal file
46
chatmaild/src/chatmaild/tests/mail-data/mailer-daemon.eml
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
Date: Fri, 8 Jul 1994 09:21:47 -0400
|
||||||
|
From: Mail Delivery Subsystem <MAILER-DAEMON@example.org>
|
||||||
|
Subject: Returned mail: User unknown
|
||||||
|
To: <owner-ups-mib@CS.UTK.EDU>
|
||||||
|
Auto-Submitted: auto-replied
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: multipart/report; report-type=delivery-status;
|
||||||
|
boundary="JAA13167.773673707/CS.UTK.EDU"
|
||||||
|
|
||||||
|
--JAA13167.773673707/CS.UTK.EDU
|
||||||
|
content-type: text/plain; charset=us-ascii
|
||||||
|
|
||||||
|
----- The following addresses had delivery problems -----
|
||||||
|
<arathib@vnet.ibm.com> (unrecoverable error)
|
||||||
|
<wsnell@sdcc13.ucsd.edu> (unrecoverable error)
|
||||||
|
|
||||||
|
--JAA13167.773673707/CS.UTK.EDU
|
||||||
|
content-type: message/delivery-status
|
||||||
|
|
||||||
|
Reporting-MTA: dns; cs.utk.edu
|
||||||
|
|
||||||
|
Original-Recipient: rfc822;arathib@vnet.ibm.com
|
||||||
|
Final-Recipient: rfc822;arathib@vnet.ibm.com
|
||||||
|
Action: failed
|
||||||
|
Status: 5.0.0 (permanent failure)
|
||||||
|
Diagnostic-Code: smtp;
|
||||||
|
550 'arathib@vnet.IBM.COM' is not a registered gateway user
|
||||||
|
Remote-MTA: dns; vnet.ibm.com
|
||||||
|
|
||||||
|
Original-Recipient: rfc822;johnh@hpnjld.njd.hp.com
|
||||||
|
Final-Recipient: rfc822;johnh@hpnjld.njd.hp.com
|
||||||
|
Action: delayed
|
||||||
|
Status: 4.0.0 (hpnjld.njd.jp.com: host name lookup failure)
|
||||||
|
|
||||||
|
Original-Recipient: rfc822;wsnell@sdcc13.ucsd.edu
|
||||||
|
Final-Recipient: rfc822;wsnell@sdcc13.ucsd.edu
|
||||||
|
Action: failed
|
||||||
|
Status: 5.0.0
|
||||||
|
Diagnostic-Code: smtp; 550 user unknown
|
||||||
|
Remote-MTA: dns; sdcc13.ucsd.edu
|
||||||
|
|
||||||
|
--JAA13167.773673707/CS.UTK.EDU
|
||||||
|
content-type: message/rfc822
|
||||||
|
|
||||||
|
[original message goes here]
|
||||||
|
--JAA13167.773673707/CS.UTK.EDU--
|
||||||
33
chatmaild/src/chatmaild/tests/mail-data/mdn.eml
Normal file
33
chatmaild/src/chatmaild/tests/mail-data/mdn.eml
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
Subject: Message opened
|
||||||
|
From: <{from_addr}>
|
||||||
|
To: <{to_addr}>
|
||||||
|
Date: Sun, 15 Oct 2023 16:43:25 +0000
|
||||||
|
Message-ID: <Mr.78MWtlV7RAi.goCFzBhCYfy@c2.testrun.org>
|
||||||
|
Auto-Submitted: auto-replied
|
||||||
|
Chat-Version: 1.0
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: multipart/report; report-type=disposition-notification;
|
||||||
|
boundary="Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi"
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi
|
||||||
|
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no
|
||||||
|
|
||||||
|
The "Hi!" message you sent was displayed on the screen of the recipient.
|
||||||
|
|
||||||
|
This is no guarantee the content was read.
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi
|
||||||
|
Content-Type: message/disposition-notification
|
||||||
|
|
||||||
|
Reporting-UA: Delta Chat 1.124.1
|
||||||
|
Original-Recipient: rfc822;barbaz@c2.testrun.org
|
||||||
|
Final-Recipient: rfc822;barbaz@c2.testrun.org
|
||||||
|
Original-Message-ID: <Mr.MvmCz-GQbi_.6FGRkhDf05c@c2.testrun.org>
|
||||||
|
Disposition: manual-action/MDN-sent-automatically; displayed
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi--
|
||||||
|
|
||||||
|
|
||||||
23
chatmaild/src/chatmaild/tests/mail-data/plain.eml
Normal file
23
chatmaild/src/chatmaild/tests/mail-data/plain.eml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
Subject: =?utf-8?q?Message_from_foobar=40c2=2Etestrun=2Eorg?=
|
||||||
|
Chat-Disposition-Notification-To: foobar@c2.testrun.org
|
||||||
|
Chat-User-Avatar: 0
|
||||||
|
From: <{from_addr}>
|
||||||
|
To: <{to_addr}>
|
||||||
|
Date: Sun, 15 Oct 2023 16:41:44 +0000
|
||||||
|
Message-ID: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
|
References: <Mr.3gckbNy5bch.uK3Hd2Ws6-w@c2.testrun.org>
|
||||||
|
Chat-Version: 1.0
|
||||||
|
Autocrypt: addr={from_addr}; prefer-encrypt=mutual;
|
||||||
|
keydata=xjMEZSrw3hYJKwYBBAHaRw8BAQdAiEKNQFU28c6qsx4vo/JHdt73RXdjMOmByf/XsGiJ7m
|
||||||
|
nNFzxmb29iYXJAYzIudGVzdHJ1bi5vcmc+wosEEBYIADMCGQEFAmUq8N4CGwMECwkIBwYVCAkKCwID
|
||||||
|
FgIBFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJCX3gEAhm0MehE5byBBU1avPczr/I
|
||||||
|
HjNLht7Qf6++mAhlJmtDcA/0C8VYJhsUpmiDjuZaMDWNv4FO2BJG6LH7gSm6n7ClMJzjgEZSrw3hIK
|
||||||
|
KwYBBAGXVQEFAQEHQAxGG/QW0owCfMp1A+vXEMwgzWcBpNFr58kX2eXuPpM6AwEIB8J4BBgWCAAgBQ
|
||||||
|
JlKvDeAhsMFiEEGil0OvTIa6RngmCLUYNnEa9leJAACgkQUYNnEa9leJDg1gEAwLf8KDoAAKyYgjyI
|
||||||
|
vYvO9VEgBni1C4Xx1VjcaEmlDK8BALoFuUCK+enw76TtDcAUKhlhUiM6SDRExkS4Nskp/BcK
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=no
|
||||||
|
|
||||||
|
Hi!
|
||||||
|
|
||||||
|
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
Subject: Message from {from_addr}
|
||||||
|
From: <{from_addr}>
|
||||||
|
To: <{to_addr}>
|
||||||
|
Date: Sun, 15 Oct 2023 16:43:25 +0000
|
||||||
|
Message-ID: <Mr.78MWtlV7RAi.goCFzBhCYfy@c2.testrun.org>
|
||||||
|
Chat-Version: 1.0
|
||||||
|
Secure-Join: vc-request
|
||||||
|
Secure-Join-Invitenumber: RANDOM-TOKEN
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: multipart/mixed; boundary="Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi"
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi
|
||||||
|
Content-Type: text/plain; charset=utf-8
|
||||||
|
|
||||||
|
Buy viagra!
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi--
|
||||||
|
|
||||||
|
|
||||||
21
chatmaild/src/chatmaild/tests/mail-data/securejoin-vc.eml
Normal file
21
chatmaild/src/chatmaild/tests/mail-data/securejoin-vc.eml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
Subject: Message from {from_addr}
|
||||||
|
From: <{from_addr}>
|
||||||
|
To: <{to_addr}>
|
||||||
|
Date: Sun, 15 Oct 2023 16:43:25 +0000
|
||||||
|
Message-ID: <Mr.78MWtlV7RAi.goCFzBhCYfy@c2.testrun.org>
|
||||||
|
Chat-Version: 1.0
|
||||||
|
Secure-Join: vc-request
|
||||||
|
Secure-Join-Invitenumber: RANDOM-TOKEN
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: multipart/mixed; boundary="Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi"
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi
|
||||||
|
Content-Type: text/plain; charset=utf-8
|
||||||
|
|
||||||
|
Secure-Join: vc-request
|
||||||
|
|
||||||
|
|
||||||
|
--Gl92xgZjOShJ5PGHntqYkoo2OK2Dvi--
|
||||||
|
|
||||||
|
|
||||||
97
chatmaild/src/chatmaild/tests/plugin.py
Normal file
97
chatmaild/src/chatmaild/tests/plugin.py
Normal file
@@ -0,0 +1,97 @@
|
|||||||
|
import importlib.resources
|
||||||
|
import itertools
|
||||||
|
import os
|
||||||
|
import random
|
||||||
|
from email import policy
|
||||||
|
from email.parser import BytesParser
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
from chatmaild.config import read_config, write_initial_config
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def make_config(tmp_path):
|
||||||
|
inipath = tmp_path.joinpath("chatmail.ini")
|
||||||
|
|
||||||
|
def make_conf(mail_domain, settings=None):
|
||||||
|
basedir = tmp_path.joinpath(f"vmail/{mail_domain}")
|
||||||
|
basedir.mkdir(parents=True, exist_ok=True)
|
||||||
|
overrides = settings.copy() if settings else {}
|
||||||
|
overrides["mailboxes_dir"] = str(basedir)
|
||||||
|
write_initial_config(inipath, mail_domain, overrides=overrides)
|
||||||
|
return read_config(inipath)
|
||||||
|
|
||||||
|
return make_conf
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def example_config(make_config):
|
||||||
|
return make_config("chat.example.org")
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def maildomain(example_config):
|
||||||
|
return example_config.mail_domain
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def testaddr(maildomain):
|
||||||
|
return f"user.name@{maildomain}"
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def gencreds(maildomain):
|
||||||
|
count = itertools.count()
|
||||||
|
next(count)
|
||||||
|
|
||||||
|
def gen(domain=None):
|
||||||
|
domain = domain if domain else maildomain
|
||||||
|
while 1:
|
||||||
|
num = next(count)
|
||||||
|
alphanumeric = "abcdefghijklmnopqrstuvwxyz1234567890"
|
||||||
|
user = "".join(random.choices(alphanumeric, k=10))
|
||||||
|
user = f"ac{num}_{user}"[:9]
|
||||||
|
password = "".join(random.choices(alphanumeric, k=12))
|
||||||
|
yield f"{user}@{domain}", f"{password}"
|
||||||
|
|
||||||
|
return lambda domain=None: next(gen(domain))
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def maildata(request):
|
||||||
|
try:
|
||||||
|
datadir = importlib.resources.files(__package__).joinpath("mail-data")
|
||||||
|
except TypeError:
|
||||||
|
# in python3.9 or lower, the above doesn't work, so we get datadir this way:
|
||||||
|
datadir = Path(os.getcwd()).joinpath("chatmaild/src/chatmaild/tests/mail-data")
|
||||||
|
|
||||||
|
assert datadir.exists(), datadir
|
||||||
|
|
||||||
|
def maildata(name, from_addr, to_addr, subject="[...]"):
|
||||||
|
# Using `.read_bytes().decode()` instead of `.read_text()` to preserve newlines.
|
||||||
|
data = datadir.joinpath(name).read_bytes().decode()
|
||||||
|
text = data.format(from_addr=from_addr, to_addr=to_addr, subject=subject)
|
||||||
|
return BytesParser(policy=policy.SMTP).parsebytes(text.encode())
|
||||||
|
|
||||||
|
return maildata
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def mockout():
|
||||||
|
class MockOut:
|
||||||
|
captured_red = []
|
||||||
|
captured_green = []
|
||||||
|
captured_plain = []
|
||||||
|
|
||||||
|
def red(self, msg):
|
||||||
|
self.captured_red.append(msg)
|
||||||
|
|
||||||
|
def green(self, msg):
|
||||||
|
self.captured_green.append(msg)
|
||||||
|
|
||||||
|
def __call__(self, msg):
|
||||||
|
self.captured_plain.append(msg)
|
||||||
|
|
||||||
|
return MockOut()
|
||||||
74
chatmaild/src/chatmaild/tests/test_config.py
Normal file
74
chatmaild/src/chatmaild/tests/test_config.py
Normal file
@@ -0,0 +1,74 @@
|
|||||||
|
import pytest
|
||||||
|
|
||||||
|
from chatmaild.config import read_config
|
||||||
|
|
||||||
|
|
||||||
|
def test_read_config_basic(example_config):
|
||||||
|
assert example_config.mail_domain == "chat.example.org"
|
||||||
|
assert not example_config.privacy_supervisor and not example_config.privacy_mail
|
||||||
|
assert not example_config.privacy_pdo and not example_config.privacy_postal
|
||||||
|
|
||||||
|
inipath = example_config._inipath
|
||||||
|
inipath.write_text(inipath.read_text().replace("60", "37"))
|
||||||
|
example_config = read_config(inipath)
|
||||||
|
assert example_config.max_user_send_per_minute == 37
|
||||||
|
assert example_config.mail_domain == "chat.example.org"
|
||||||
|
|
||||||
|
|
||||||
|
def test_read_config_basic_using_defaults(tmp_path, maildomain):
|
||||||
|
inipath = tmp_path.joinpath("chatmail.ini")
|
||||||
|
inipath.write_text(f"[params]\nmail_domain = {maildomain}")
|
||||||
|
example_config = read_config(inipath)
|
||||||
|
assert example_config.max_user_send_per_minute == 60
|
||||||
|
assert example_config.filtermail_smtp_port_incoming == 10081
|
||||||
|
|
||||||
|
|
||||||
|
def test_read_config_testrun(make_config):
|
||||||
|
config = make_config("something.testrun.org")
|
||||||
|
assert config.mail_domain == "something.testrun.org"
|
||||||
|
assert len(config.privacy_postal.split("\n")) > 1
|
||||||
|
assert len(config.privacy_supervisor.split("\n")) > 1
|
||||||
|
assert len(config.privacy_pdo.split("\n")) > 1
|
||||||
|
assert config.privacy_mail == "privacy@testrun.org"
|
||||||
|
assert config.filtermail_smtp_port == 10080
|
||||||
|
assert config.postfix_reinject_port == 10025
|
||||||
|
assert config.max_user_send_per_minute == 60
|
||||||
|
assert config.max_mailbox_size == "100M"
|
||||||
|
assert config.delete_mails_after == "20"
|
||||||
|
assert config.username_min_length == 9
|
||||||
|
assert config.username_max_length == 9
|
||||||
|
assert config.password_min_length == 9
|
||||||
|
assert "privacy@testrun.org" in config.passthrough_recipients
|
||||||
|
assert config.passthrough_senders == []
|
||||||
|
|
||||||
|
|
||||||
|
def test_config_userstate_paths(make_config, tmp_path):
|
||||||
|
config = make_config("something.testrun.org")
|
||||||
|
mailboxes_dir = config.mailboxes_dir
|
||||||
|
passdb_path = config.passdb_path
|
||||||
|
assert mailboxes_dir.name == "something.testrun.org"
|
||||||
|
assert str(passdb_path) == "/home/vmail/passdb.sqlite"
|
||||||
|
assert config.mail_domain == "something.testrun.org"
|
||||||
|
path = config.get_user("user1@something.testrun.org").maildir
|
||||||
|
assert not path.exists()
|
||||||
|
assert path == mailboxes_dir.joinpath("user1@something.testrun.org")
|
||||||
|
|
||||||
|
with pytest.raises(ValueError):
|
||||||
|
config.get_user("")
|
||||||
|
|
||||||
|
with pytest.raises(ValueError):
|
||||||
|
config.get_user(None)
|
||||||
|
|
||||||
|
with pytest.raises(ValueError):
|
||||||
|
config.get_user("../some@something.testrun.org").maildir
|
||||||
|
|
||||||
|
with pytest.raises(ValueError):
|
||||||
|
config.get_user("..").maildir
|
||||||
|
|
||||||
|
with pytest.raises(ValueError):
|
||||||
|
config.get_user(".")
|
||||||
|
|
||||||
|
|
||||||
|
def test_config_max_message_size(make_config, tmp_path):
|
||||||
|
config = make_config("something.testrun.org", dict(max_message_size="10000"))
|
||||||
|
assert config.max_message_size == 10000
|
||||||
59
chatmaild/src/chatmaild/tests/test_delete_inactive_users.py
Normal file
59
chatmaild/src/chatmaild/tests/test_delete_inactive_users.py
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
import time
|
||||||
|
|
||||||
|
from chatmaild.delete_inactive_users import delete_inactive_users
|
||||||
|
from chatmaild.doveauth import AuthDictProxy
|
||||||
|
|
||||||
|
|
||||||
|
def test_login_timestamps(example_config):
|
||||||
|
testaddr = "someuser@chat.example.org"
|
||||||
|
user = example_config.get_user(testaddr)
|
||||||
|
|
||||||
|
# password file needs to be set because it's mtime tracks last-login time
|
||||||
|
user.set_password("1l2k3j1l2k3j123")
|
||||||
|
for i in range(10):
|
||||||
|
user.set_last_login_timestamp(86400 * 4 + i)
|
||||||
|
assert user.get_last_login_timestamp() == 86400 * 4
|
||||||
|
|
||||||
|
|
||||||
|
def test_delete_inactive_users(example_config):
|
||||||
|
new = time.time()
|
||||||
|
old = new - (example_config.delete_inactive_users_after * 86400) - 1
|
||||||
|
dictproxy = AuthDictProxy(example_config)
|
||||||
|
|
||||||
|
def create_user(addr, last_login):
|
||||||
|
dictproxy.lookup_passdb(addr, "q9mr3faue")
|
||||||
|
user = example_config.get_user(addr)
|
||||||
|
user.maildir.joinpath("cur").mkdir()
|
||||||
|
user.maildir.joinpath("cur", "something").mkdir()
|
||||||
|
user.set_last_login_timestamp(timestamp=last_login)
|
||||||
|
|
||||||
|
# create some stale and some new accounts
|
||||||
|
to_remove = []
|
||||||
|
for i in range(150):
|
||||||
|
addr = f"oldold{i:03}@chat.example.org"
|
||||||
|
create_user(addr, last_login=old)
|
||||||
|
to_remove.append(addr)
|
||||||
|
|
||||||
|
remain = []
|
||||||
|
for i in range(5):
|
||||||
|
addr = f"newnew{i:03}@chat.example.org"
|
||||||
|
create_user(addr, last_login=new)
|
||||||
|
remain.append(addr)
|
||||||
|
|
||||||
|
# check pre and post-conditions for delete_inactive_users()
|
||||||
|
|
||||||
|
for addr in to_remove:
|
||||||
|
assert example_config.get_user(addr).maildir.exists()
|
||||||
|
|
||||||
|
delete_inactive_users(example_config)
|
||||||
|
|
||||||
|
for p in example_config.mailboxes_dir.iterdir():
|
||||||
|
assert not p.name.startswith("old")
|
||||||
|
|
||||||
|
for addr in to_remove:
|
||||||
|
assert not example_config.get_user(addr).maildir.exists()
|
||||||
|
|
||||||
|
for addr in remain:
|
||||||
|
userdir = example_config.get_user(addr).maildir
|
||||||
|
assert userdir.exists()
|
||||||
|
assert userdir.joinpath("password").read_text()
|
||||||
150
chatmaild/src/chatmaild/tests/test_doveauth.py
Normal file
150
chatmaild/src/chatmaild/tests/test_doveauth.py
Normal file
@@ -0,0 +1,150 @@
|
|||||||
|
import io
|
||||||
|
import json
|
||||||
|
import queue
|
||||||
|
import threading
|
||||||
|
import traceback
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
import chatmaild.doveauth
|
||||||
|
from chatmaild.doveauth import (
|
||||||
|
AuthDictProxy,
|
||||||
|
is_allowed_to_create,
|
||||||
|
)
|
||||||
|
from chatmaild.newemail import create_newemail_dict
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def dictproxy(example_config):
|
||||||
|
return AuthDictProxy(config=example_config)
|
||||||
|
|
||||||
|
|
||||||
|
def test_basic(dictproxy, gencreds):
|
||||||
|
addr, password = gencreds()
|
||||||
|
dictproxy.lookup_passdb(addr, password)
|
||||||
|
data = dictproxy.lookup_userdb(addr)
|
||||||
|
assert data
|
||||||
|
data2 = dictproxy.lookup_passdb(addr, password)
|
||||||
|
assert data == data2
|
||||||
|
|
||||||
|
|
||||||
|
def test_iterate_addresses(dictproxy):
|
||||||
|
addresses = []
|
||||||
|
|
||||||
|
for i in range(10):
|
||||||
|
addresses.append(f"asdf1234{i}@chat.example.org")
|
||||||
|
dictproxy.lookup_passdb(addresses[-1], "q9mr3faue")
|
||||||
|
|
||||||
|
res = dictproxy.iter_userdb()
|
||||||
|
assert set(res) == set(addresses)
|
||||||
|
|
||||||
|
|
||||||
|
def test_invalid_username_length(example_config):
|
||||||
|
config = example_config
|
||||||
|
config.username_min_length = 6
|
||||||
|
config.username_max_length = 10
|
||||||
|
password = create_newemail_dict(config)["password"]
|
||||||
|
assert not is_allowed_to_create(config, f"a1234@{config.mail_domain}", password)
|
||||||
|
assert is_allowed_to_create(config, f"012345@{config.mail_domain}", password)
|
||||||
|
assert is_allowed_to_create(config, f"0123456@{config.mail_domain}", password)
|
||||||
|
assert is_allowed_to_create(config, f"0123456789@{config.mail_domain}", password)
|
||||||
|
assert not is_allowed_to_create(
|
||||||
|
config, f"0123456789x@{config.mail_domain}", password
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def test_dont_overwrite_password_on_wrong_login(dictproxy):
|
||||||
|
"""Test that logging in with a different password doesn't create a new user"""
|
||||||
|
res = dictproxy.lookup_passdb(
|
||||||
|
"newuser12@chat.example.org", "kajdlkajsldk12l3kj1983"
|
||||||
|
)
|
||||||
|
assert res["password"]
|
||||||
|
res2 = dictproxy.lookup_passdb("newuser12@chat.example.org", "kajdslqwe")
|
||||||
|
# this function always returns a password hash, which is actually compared by dovecot.
|
||||||
|
assert res["password"] == res2["password"]
|
||||||
|
|
||||||
|
|
||||||
|
def test_nocreate_file(monkeypatch, tmpdir, dictproxy):
|
||||||
|
p = tmpdir.join("nocreate")
|
||||||
|
p.write("")
|
||||||
|
monkeypatch.setattr(chatmaild.doveauth, "NOCREATE_FILE", str(p))
|
||||||
|
dictproxy.lookup_passdb("newuser12@chat.example.org", "zequ0Aimuchoodaechik")
|
||||||
|
assert not dictproxy.lookup_userdb("newuser12@chat.example.org")
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_request(dictproxy):
|
||||||
|
transactions = {}
|
||||||
|
# Test that password can contain ", ', \ and /
|
||||||
|
msg = (
|
||||||
|
'Lshared/passdb/laksjdlaksjdlak\\\\sjdlk\\"12j\\\'3l1/k2j3123"'
|
||||||
|
"some42123@chat.example.org\tsome42123@chat.example.org"
|
||||||
|
)
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, transactions)
|
||||||
|
assert res
|
||||||
|
assert res[0] == "O" and res.endswith("\n")
|
||||||
|
userdata = json.loads(res[1:].strip())
|
||||||
|
assert userdata["home"].endswith("chat.example.org/some42123@chat.example.org")
|
||||||
|
assert userdata["uid"] == userdata["gid"] == "vmail"
|
||||||
|
assert userdata["password"].startswith("{SHA512-CRYPT}")
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_protocol_hello_is_skipped(example_config, caplog):
|
||||||
|
dictproxy = AuthDictProxy(config=example_config)
|
||||||
|
rfile = io.BytesIO(b"H3\t2\t0\t\tauth\n")
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert wfile.getvalue() == b""
|
||||||
|
assert not caplog.messages
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_protocol_user_not_exists(example_config):
|
||||||
|
dictproxy = AuthDictProxy(config=example_config)
|
||||||
|
rfile = io.BytesIO(
|
||||||
|
b"H3\t2\t0\t\tauth\nLshared/userdb/foobar@chat.example.org\tfoobar@chat.example.org\n"
|
||||||
|
)
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert wfile.getvalue() == b"N\n"
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_protocol_iterate(gencreds, example_config):
|
||||||
|
dictproxy = AuthDictProxy(config=example_config)
|
||||||
|
dictproxy.lookup_passdb("asdf00000@chat.example.org", "q9mr3faue")
|
||||||
|
dictproxy.lookup_passdb("asdf11111@chat.example.org", "q9mr3faue")
|
||||||
|
rfile = io.BytesIO(b"H3\t2\t0\t\tauth\nI0\t0\tshared/userdb/")
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
lines = wfile.getvalue().decode("ascii").split("\n")
|
||||||
|
assert "Oshared/userdb/asdf00000@chat.example.org\t" in lines
|
||||||
|
assert "Oshared/userdb/asdf11111@chat.example.org\t" in lines
|
||||||
|
assert not lines[2]
|
||||||
|
|
||||||
|
|
||||||
|
def test_50_concurrent_lookups_different_accounts(gencreds, dictproxy):
|
||||||
|
num_threads = 50
|
||||||
|
req_per_thread = 5
|
||||||
|
results = queue.Queue()
|
||||||
|
|
||||||
|
def lookup():
|
||||||
|
for i in range(req_per_thread):
|
||||||
|
addr, password = gencreds()
|
||||||
|
try:
|
||||||
|
dictproxy.lookup_passdb(addr, password)
|
||||||
|
except Exception:
|
||||||
|
results.put(traceback.format_exc())
|
||||||
|
else:
|
||||||
|
results.put(None)
|
||||||
|
|
||||||
|
threads = []
|
||||||
|
for i in range(num_threads):
|
||||||
|
thread = threading.Thread(target=lookup, daemon=True)
|
||||||
|
threads.append(thread)
|
||||||
|
|
||||||
|
print(f"created {num_threads} threads, starting them and waiting for results")
|
||||||
|
for thread in threads:
|
||||||
|
thread.start()
|
||||||
|
|
||||||
|
for i in range(num_threads * req_per_thread):
|
||||||
|
res = results.get()
|
||||||
|
if res is not None:
|
||||||
|
pytest.fail(f"concurrent lookup failed\n{res}")
|
||||||
39
chatmaild/src/chatmaild/tests/test_filedict.py
Normal file
39
chatmaild/src/chatmaild/tests/test_filedict.py
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
import threading
|
||||||
|
|
||||||
|
from chatmaild.filedict import FileDict, write_bytes_atomic
|
||||||
|
|
||||||
|
|
||||||
|
def test_basic(tmp_path):
|
||||||
|
fdict = FileDict(tmp_path.joinpath("metadata"))
|
||||||
|
assert fdict.read() == {}
|
||||||
|
with fdict.modify() as d:
|
||||||
|
d["devicetoken"] = [1, 2, 3]
|
||||||
|
d["456"] = 4.2
|
||||||
|
new = fdict.read()
|
||||||
|
assert new["devicetoken"] == [1, 2, 3]
|
||||||
|
assert new["456"] == 4.2
|
||||||
|
|
||||||
|
|
||||||
|
def test_bad_marshal_file(tmp_path, caplog):
|
||||||
|
fdict1 = FileDict(tmp_path.joinpath("metadata"))
|
||||||
|
fdict1.path.write_bytes(b"l12k3l12k3l")
|
||||||
|
assert fdict1.read() == {}
|
||||||
|
assert "corrupt" in caplog.records[0].msg
|
||||||
|
|
||||||
|
|
||||||
|
def test_write_bytes_atomic_concurrent(tmp_path):
|
||||||
|
p = tmp_path.joinpath("somefile.ext")
|
||||||
|
write_bytes_atomic(p, b"hello")
|
||||||
|
|
||||||
|
threads = []
|
||||||
|
for i in range(30):
|
||||||
|
content = f"hello{i}".encode("ascii")
|
||||||
|
t = threading.Thread(target=lambda: write_bytes_atomic(p, content))
|
||||||
|
t.start()
|
||||||
|
threads.append(t)
|
||||||
|
|
||||||
|
for t in threads:
|
||||||
|
t.join()
|
||||||
|
|
||||||
|
assert p.read_text().strip() != "hello"
|
||||||
|
assert len(list(p.parent.iterdir())) == 1
|
||||||
306
chatmaild/src/chatmaild/tests/test_filtermail.py
Normal file
306
chatmaild/src/chatmaild/tests/test_filtermail.py
Normal file
@@ -0,0 +1,306 @@
|
|||||||
|
import pytest
|
||||||
|
|
||||||
|
from chatmaild.filtermail import (
|
||||||
|
IncomingBeforeQueueHandler,
|
||||||
|
OutgoingBeforeQueueHandler,
|
||||||
|
SendRateLimiter,
|
||||||
|
check_armored_payload,
|
||||||
|
check_encrypted,
|
||||||
|
is_securejoin,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def maildomain():
|
||||||
|
# let's not depend on a real chatmail instance for the offline tests below
|
||||||
|
return "chatmail.example.org"
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def handler(make_config, maildomain):
|
||||||
|
config = make_config(maildomain)
|
||||||
|
return OutgoingBeforeQueueHandler(config)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def inhandler(make_config, maildomain):
|
||||||
|
config = make_config(maildomain)
|
||||||
|
return IncomingBeforeQueueHandler(config)
|
||||||
|
|
||||||
|
|
||||||
|
def test_reject_forged_from(maildata, gencreds, handler):
|
||||||
|
class env:
|
||||||
|
mail_from = gencreds()[0]
|
||||||
|
rcpt_tos = [gencreds()[0]]
|
||||||
|
|
||||||
|
# test that the filter lets good mail through
|
||||||
|
to_addr = gencreds()[0]
|
||||||
|
env.content = maildata(
|
||||||
|
"encrypted.eml", from_addr=env.mail_from, to_addr=to_addr
|
||||||
|
).as_bytes()
|
||||||
|
|
||||||
|
assert not handler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
# test that the filter rejects forged mail
|
||||||
|
env.content = maildata(
|
||||||
|
"encrypted.eml", from_addr="forged@c3.testrun.org", to_addr=to_addr
|
||||||
|
).as_bytes()
|
||||||
|
error = handler.check_DATA(envelope=env)
|
||||||
|
assert "500" in error
|
||||||
|
|
||||||
|
|
||||||
|
def test_filtermail_no_encryption_detection(maildata):
|
||||||
|
msg = maildata(
|
||||||
|
"plain.eml", from_addr="some@example.org", to_addr="other@example.org"
|
||||||
|
)
|
||||||
|
assert not check_encrypted(msg)
|
||||||
|
|
||||||
|
# https://xkcd.com/1181/
|
||||||
|
msg = maildata(
|
||||||
|
"fake-encrypted.eml", from_addr="some@example.org", to_addr="other@example.org"
|
||||||
|
)
|
||||||
|
assert not check_encrypted(msg)
|
||||||
|
|
||||||
|
|
||||||
|
def test_filtermail_securejoin_detection(maildata):
|
||||||
|
msg = maildata(
|
||||||
|
"securejoin-vc.eml", from_addr="some@example.org", to_addr="other@example.org"
|
||||||
|
)
|
||||||
|
assert is_securejoin(msg)
|
||||||
|
|
||||||
|
msg = maildata(
|
||||||
|
"securejoin-vc-fake.eml",
|
||||||
|
from_addr="some@example.org",
|
||||||
|
to_addr="other@example.org",
|
||||||
|
)
|
||||||
|
assert not is_securejoin(msg)
|
||||||
|
|
||||||
|
|
||||||
|
def test_filtermail_encryption_detection(maildata):
|
||||||
|
msg = maildata(
|
||||||
|
"encrypted.eml",
|
||||||
|
from_addr="1@example.org",
|
||||||
|
to_addr="2@example.org",
|
||||||
|
subject="Subject does not matter, will be replaced anyway",
|
||||||
|
)
|
||||||
|
assert check_encrypted(msg)
|
||||||
|
|
||||||
|
|
||||||
|
def test_filtermail_no_literal_packets(maildata):
|
||||||
|
"""Test that literal OpenPGP packet is not considered an encrypted mail."""
|
||||||
|
msg = maildata("literal.eml", from_addr="1@example.org", to_addr="2@example.org")
|
||||||
|
assert not check_encrypted(msg)
|
||||||
|
|
||||||
|
|
||||||
|
def test_filtermail_unencrypted_mdn(maildata, gencreds):
|
||||||
|
"""Unencrypted MDNs should not pass."""
|
||||||
|
from_addr = gencreds()[0]
|
||||||
|
to_addr = gencreds()[0] + ".other"
|
||||||
|
msg = maildata("mdn.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
assert not check_encrypted(msg)
|
||||||
|
|
||||||
|
|
||||||
|
def test_send_rate_limiter():
|
||||||
|
limiter = SendRateLimiter()
|
||||||
|
for i in range(100):
|
||||||
|
if limiter.is_sending_allowed("some@example.org", 10):
|
||||||
|
if i <= 10:
|
||||||
|
continue
|
||||||
|
pytest.fail("limiter didn't work")
|
||||||
|
else:
|
||||||
|
assert i == 11
|
||||||
|
break
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_excempt_privacy(maildata, gencreds, handler):
|
||||||
|
from_addr = gencreds()[0]
|
||||||
|
to_addr = "privacy@testrun.org"
|
||||||
|
handler.config.passthrough_recipients = [to_addr]
|
||||||
|
false_to = "privacy@something.org"
|
||||||
|
|
||||||
|
msg = maildata("plain.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
# assert that None/no error is returned
|
||||||
|
assert not handler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
class env2:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr, false_to]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
assert "523" in handler.check_DATA(envelope=env2)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_self_send_autocrypt_setup_message(maildata, gencreds, handler):
|
||||||
|
from_addr = gencreds()[0]
|
||||||
|
to_addr = from_addr
|
||||||
|
|
||||||
|
msg = maildata("asm.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
assert not handler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_send_fails(maildata, gencreds, handler):
|
||||||
|
from_addr = gencreds()[0]
|
||||||
|
to_addr = gencreds()[0]
|
||||||
|
|
||||||
|
msg = maildata("plain.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
res = handler.check_DATA(envelope=env)
|
||||||
|
assert "523 Encryption Needed" in res
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_incoming_fails(maildata, gencreds, inhandler):
|
||||||
|
from_addr = gencreds()[0]
|
||||||
|
to_addr, password = gencreds()
|
||||||
|
|
||||||
|
msg = maildata("plain.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
user = inhandler.config.get_user(to_addr)
|
||||||
|
user.set_password(password)
|
||||||
|
res = inhandler.check_DATA(envelope=env)
|
||||||
|
assert "523 Encryption Needed" in res
|
||||||
|
|
||||||
|
user.allow_incoming_cleartext()
|
||||||
|
assert not inhandler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_incoming_mailer_daemon(maildata, gencreds, inhandler):
|
||||||
|
from_addr = "mailer-daemon@example.org"
|
||||||
|
to_addr = gencreds()[0]
|
||||||
|
|
||||||
|
msg = maildata("mailer-daemon.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
assert not inhandler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_passthrough_domains(maildata, gencreds, handler):
|
||||||
|
from_addr = gencreds()[0]
|
||||||
|
to_addr = "privacy@x.y.z"
|
||||||
|
handler.config.passthrough_recipients = ["@x.y.z"]
|
||||||
|
false_to = "something@x.y"
|
||||||
|
|
||||||
|
msg = maildata("plain.eml", from_addr=from_addr, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
# assert that None/no error is returned
|
||||||
|
assert not handler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
class env2:
|
||||||
|
mail_from = from_addr
|
||||||
|
rcpt_tos = [to_addr, false_to]
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
assert "523" in handler.check_DATA(envelope=env2)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cleartext_passthrough_senders(gencreds, handler, maildata):
|
||||||
|
acc1 = gencreds()[0]
|
||||||
|
to_addr = "recipient@something.org"
|
||||||
|
handler.config.passthrough_senders = [acc1]
|
||||||
|
|
||||||
|
msg = maildata("plain.eml", from_addr=acc1, to_addr=to_addr)
|
||||||
|
|
||||||
|
class env:
|
||||||
|
mail_from = acc1
|
||||||
|
rcpt_tos = to_addr
|
||||||
|
content = msg.as_bytes()
|
||||||
|
|
||||||
|
# assert that None/no error is returned
|
||||||
|
assert not handler.check_DATA(envelope=env)
|
||||||
|
|
||||||
|
|
||||||
|
def test_check_armored_payload():
|
||||||
|
payload = """-----BEGIN PGP MESSAGE-----\r
|
||||||
|
\r
|
||||||
|
wU4DSqFx0d1yqAoSAQdAYkX/ZN/Az4B0k7X47zKyWrXxlDEdS3WOy0Yf2+GJTFgg\r
|
||||||
|
Zk5ql0mLG8Ze+ZifCS0XMO4otlemSyJ0K1ZPdFMGzUDBTgNqzkFabxXoXRIBB0AM\r
|
||||||
|
755wlX41X6Ay3KhnwBq7yEqSykVH6F3x11iHPKraLCAGZoaS8bKKNy/zg5slda1X\r
|
||||||
|
pt14b4aC1VwtSnYhcRRELNLD/wE2TFif+g7poMmFY50VyMPLYjVP96Z5QCT4+z4H\r
|
||||||
|
Ikh/pRRN8S3JNMrRJHc6prooSJmLcx47Y5un7VFy390MsJ+LiUJuQMDdYWRAinfs\r
|
||||||
|
Ebm89Ezjm7F03qbFPXE0X4ZNzVXS/eKO0uhJQdiov/vmbn41rNtHmNpqjaO0vi5+\r
|
||||||
|
sS9tR7yDUrIXiCUCN78eBLVioxtktsPZm5cDORbQWzv+7nmCEz9/JowCUcBVdCGn\r
|
||||||
|
1ofOaH82JCAX/cRx08pLaDNj6iolVBsi56Dd+2bGxJOZOG2AMcEyz0pXY0dOAJCD\r
|
||||||
|
iUThcQeGIdRnU3j8UBcnIEsjLu2+C+rrwMZQESMWKnJ0rnqTk0pK5kXScr6F/L0L\r
|
||||||
|
UE49ccIexNm3xZvYr5drszr6wz3Tv5fdue87P4etBt90gF/Vzknck+g1LLlkzZkp\r
|
||||||
|
d8dI0k2tOSPjUbDPnSy1x+X73WGpPZmj0kWT+RGvq0nH6UkJj3AQTG2qf1T8jK+3\r
|
||||||
|
rTp3LR9vDkMwDjX4R8SA9c0wdnUzzr79OYQC9lTnzcx+fM6BBmgQ2GrS33jaFLp7\r
|
||||||
|
L6/DFpCl5zhnPjM/2dKvMkw/Kd6XS/vjwsO405FQdjSDiQEEAZA+ZvAfcjdccbbU\r
|
||||||
|
yCO+x0QNdeBsufDVnh3xvzuWy4CICdTQT4s1AWRPCzjOj+SGmx5WqCLWfsd8Ma0+\r
|
||||||
|
w/C7SfTYu1FDQILLM+llpq1M/9GPley4QZ8JQjo262AyPXsPF/OW48uuZz0Db1xT\r
|
||||||
|
Yh4iHBztj4VSdy7l2+IyaIf7cnL4EEBFxv/MwmVDXvDlxyvfAfIsd3D9SvJESzKZ\r
|
||||||
|
VWDYwaocgeCN+ojKu1p885lu1EfRbX3fr3YO02K5/c2JYDkc0Py0W3wUP/J1XUax\r
|
||||||
|
pbKpzwlkxEgtmzsGqsOfMJqBV3TNDrOA2uBsa+uBqP5MGYLZ49S/4v/bW9I01Cr1\r
|
||||||
|
D2ZkV510Y1Vgo66WlP8mRqOTyt/5WRhPD+MxXdk67BNN/PmO6tMlVoJDuk+XwWPR\r
|
||||||
|
t2TvNaND/yabT9eYI55Og4fzKD6RIjouUX8DvKLkm+7aXxVs2uuLQ3Jco3O82z55\r
|
||||||
|
dbShU1jYsrw9oouXUz06MHPbkdhNbF/2hfhZ2qA31sNeovJw65iUv7sDKX3LVWgJ\r
|
||||||
|
10jlywcDwqlU8CO7WC9lGixYTbnOkYZpXCGEl8e6Jbs79l42YFo4ogYpFK1NXFhV\r
|
||||||
|
kOXRmDf/wmfj+c/ld3L2PkvwlgofhCudOQknZbo3ub1gjiTn7L+lMGHIj/3suMIl\r
|
||||||
|
ID4EUxAXScIM1ZEz2fjtW5jATlqYcLjLTbf/olw6HFyPNH+9IssqXeZNKnGwPUB9\r
|
||||||
|
3lTXsg0tpzl+x7F/2WjEw1DSNhjC0KnHt1vEYNMkUGDGFdN9y3ERLqX/FIgiASUb\r
|
||||||
|
bTvAVupnAK3raBezGmhrs6LsQtLS9P0VvQiLU3uDhMqw8Z4SISLpcD+NnVBHzQqm\r
|
||||||
|
6W5Qn/8xsCL6av18yUVTi2G3igt3QCNoYx9evt2ZcIkNoyyagUVjfZe5GHXh8Dnz\r
|
||||||
|
GaBXW/hg3HlXLRGaQu4RYCzBMJILcO25OhZOg6jbkCLiEexQlm2e9krB5cXR49Al\r
|
||||||
|
UN4fiB0KR9JyG2ayUdNJVkXZSZLnHyRgiaadlpUo16LVvw==\r
|
||||||
|
=b5Kp\r
|
||||||
|
-----END PGP MESSAGE-----\r
|
||||||
|
\r
|
||||||
|
\r
|
||||||
|
"""
|
||||||
|
|
||||||
|
assert check_armored_payload(payload) == True
|
||||||
|
|
||||||
|
payload = payload.removesuffix("\r\n")
|
||||||
|
assert check_armored_payload(payload) == True
|
||||||
|
|
||||||
|
payload = payload.removesuffix("\r\n")
|
||||||
|
assert check_armored_payload(payload) == True
|
||||||
|
|
||||||
|
payload = payload.removesuffix("\r\n")
|
||||||
|
assert check_armored_payload(payload) == True
|
||||||
|
|
||||||
|
payload = """-----BEGIN PGP MESSAGE-----\r
|
||||||
|
\r
|
||||||
|
HELLOWORLD
|
||||||
|
-----END PGP MESSAGE-----\r
|
||||||
|
\r
|
||||||
|
"""
|
||||||
|
assert check_armored_payload(payload) == False
|
||||||
|
|
||||||
|
payload = """-----BEGIN PGP MESSAGE-----\r
|
||||||
|
\r
|
||||||
|
=njUN
|
||||||
|
-----END PGP MESSAGE-----\r
|
||||||
|
\r
|
||||||
|
"""
|
||||||
|
assert check_armored_payload(payload) == False
|
||||||
64
chatmaild/src/chatmaild/tests/test_lastlogin.py
Normal file
64
chatmaild/src/chatmaild/tests/test_lastlogin.py
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
import time
|
||||||
|
|
||||||
|
from chatmaild.doveauth import AuthDictProxy
|
||||||
|
from chatmaild.lastlogin import (
|
||||||
|
LastLoginDictProxy,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_request_last_login(testaddr, example_config):
|
||||||
|
dictproxy = LastLoginDictProxy(config=example_config)
|
||||||
|
|
||||||
|
authproxy = AuthDictProxy(config=example_config)
|
||||||
|
authproxy.lookup_passdb(testaddr, "1l2k3j1l2k3jl123")
|
||||||
|
|
||||||
|
dictproxy_transactions = {}
|
||||||
|
|
||||||
|
# Begin transaction
|
||||||
|
tx = "1111"
|
||||||
|
msg = f"B{tx}\t{testaddr}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, dictproxy_transactions)
|
||||||
|
assert not res
|
||||||
|
assert dictproxy_transactions == {tx: dict(addr=testaddr, res="O\n")}
|
||||||
|
|
||||||
|
# set last-login info for user
|
||||||
|
user = dictproxy.config.get_user(testaddr)
|
||||||
|
timestamp = int(time.time())
|
||||||
|
msg = f"S{tx}\tshared/last-login/{testaddr}\t{timestamp}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, dictproxy_transactions)
|
||||||
|
assert not res
|
||||||
|
assert len(dictproxy_transactions) == 1
|
||||||
|
read_timestamp = user.get_last_login_timestamp()
|
||||||
|
assert read_timestamp == timestamp // 86400 * 86400
|
||||||
|
|
||||||
|
# finish transaction
|
||||||
|
msg = f"C{tx}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, dictproxy_transactions)
|
||||||
|
assert res == "O\n"
|
||||||
|
assert len(dictproxy_transactions) == 0
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_request_last_login_echobot(example_config):
|
||||||
|
dictproxy = LastLoginDictProxy(config=example_config)
|
||||||
|
|
||||||
|
authproxy = AuthDictProxy(config=example_config)
|
||||||
|
testaddr = f"echo@{example_config.mail_domain}"
|
||||||
|
authproxy.lookup_passdb(testaddr, "ignore")
|
||||||
|
user = dictproxy.config.get_user(testaddr)
|
||||||
|
|
||||||
|
transactions = {}
|
||||||
|
|
||||||
|
# set last-login info for user
|
||||||
|
tx = "1111"
|
||||||
|
msg = f"B{tx}\t{testaddr}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, transactions)
|
||||||
|
assert not res
|
||||||
|
assert transactions == {tx: dict(addr=testaddr, res="O\n")}
|
||||||
|
|
||||||
|
timestamp = int(time.time())
|
||||||
|
msg = f"S{tx}\tshared/last-login/{testaddr}\t{timestamp}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, transactions)
|
||||||
|
assert not res
|
||||||
|
assert len(transactions) == 1
|
||||||
|
read_timestamp = user.get_last_login_timestamp()
|
||||||
|
assert read_timestamp is None
|
||||||
313
chatmaild/src/chatmaild/tests/test_metadata.py
Normal file
313
chatmaild/src/chatmaild/tests/test_metadata.py
Normal file
@@ -0,0 +1,313 @@
|
|||||||
|
import io
|
||||||
|
import time
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
import requests
|
||||||
|
|
||||||
|
from chatmaild.metadata import (
|
||||||
|
Metadata,
|
||||||
|
MetadataDictProxy,
|
||||||
|
)
|
||||||
|
from chatmaild.notifier import (
|
||||||
|
Notifier,
|
||||||
|
NotifyThread,
|
||||||
|
PersistentQueueItem,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def notifier(metadata):
|
||||||
|
queue_dir = metadata.vmail_dir.joinpath("pending_notifications")
|
||||||
|
queue_dir.mkdir()
|
||||||
|
return Notifier(queue_dir)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def metadata(tmp_path):
|
||||||
|
vmail_dir = tmp_path.joinpath("vmaildir")
|
||||||
|
vmail_dir.mkdir()
|
||||||
|
return Metadata(vmail_dir)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def dictproxy(notifier, metadata):
|
||||||
|
return MetadataDictProxy(notifier=notifier, metadata=metadata)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def testaddr2():
|
||||||
|
return "user2@example.org"
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def token():
|
||||||
|
return "01234"
|
||||||
|
|
||||||
|
|
||||||
|
def get_mocked_requests(statuslist):
|
||||||
|
class ReqMock:
|
||||||
|
requests = []
|
||||||
|
|
||||||
|
def post(self, url, data, timeout):
|
||||||
|
self.requests.append((url, data, timeout))
|
||||||
|
res = statuslist.pop(0)
|
||||||
|
if isinstance(res, Exception):
|
||||||
|
raise res
|
||||||
|
|
||||||
|
class Result:
|
||||||
|
status_code = res
|
||||||
|
|
||||||
|
return Result()
|
||||||
|
|
||||||
|
return ReqMock()
|
||||||
|
|
||||||
|
|
||||||
|
def test_metadata_persistence(tmp_path, testaddr, testaddr2):
|
||||||
|
metadata1 = Metadata(tmp_path)
|
||||||
|
metadata2 = Metadata(tmp_path)
|
||||||
|
assert not metadata1.get_tokens_for_addr(testaddr)
|
||||||
|
assert not metadata2.get_tokens_for_addr(testaddr)
|
||||||
|
|
||||||
|
metadata1.add_token_to_addr(testaddr, "01234")
|
||||||
|
metadata1.add_token_to_addr(testaddr2, "456")
|
||||||
|
assert metadata2.get_tokens_for_addr(testaddr) == ["01234"]
|
||||||
|
assert metadata2.get_tokens_for_addr(testaddr2) == ["456"]
|
||||||
|
metadata2.remove_token_from_addr(testaddr, "01234")
|
||||||
|
assert not metadata1.get_tokens_for_addr(testaddr)
|
||||||
|
assert metadata1.get_tokens_for_addr(testaddr2) == ["456"]
|
||||||
|
|
||||||
|
|
||||||
|
def test_remove_nonexisting(metadata, tmp_path, testaddr):
|
||||||
|
metadata.add_token_to_addr(testaddr, "123")
|
||||||
|
metadata.remove_token_from_addr(testaddr, "1l23k1l2k3")
|
||||||
|
assert metadata.get_tokens_for_addr(testaddr) == ["123"]
|
||||||
|
|
||||||
|
|
||||||
|
def test_notifier_remove_without_set(metadata, testaddr):
|
||||||
|
metadata.remove_token_from_addr(testaddr, "123")
|
||||||
|
assert not metadata.get_tokens_for_addr(testaddr)
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_request_lookup_fails(dictproxy, testaddr):
|
||||||
|
transactions = {}
|
||||||
|
res = dictproxy.handle_dovecot_request(
|
||||||
|
f"Lpriv/123/chatmail\t{testaddr}", transactions
|
||||||
|
)
|
||||||
|
assert res == "N\n"
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_request_happy_path(dictproxy, testaddr, token):
|
||||||
|
metadata = dictproxy.metadata
|
||||||
|
transactions = {}
|
||||||
|
notifier = dictproxy.notifier
|
||||||
|
|
||||||
|
# set device token in a transaction
|
||||||
|
tx = "1111"
|
||||||
|
msg = f"B{tx}\t{testaddr}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, transactions)
|
||||||
|
assert not res and not metadata.get_tokens_for_addr(testaddr)
|
||||||
|
assert transactions == {tx: dict(addr=testaddr, res="O\n")}
|
||||||
|
|
||||||
|
msg = f"S{tx}\tpriv/guid00/devicetoken\t{token}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, transactions)
|
||||||
|
assert not res
|
||||||
|
assert len(transactions) == 1
|
||||||
|
assert metadata.get_tokens_for_addr(testaddr) == [token]
|
||||||
|
|
||||||
|
msg = f"C{tx}"
|
||||||
|
res = dictproxy.handle_dovecot_request(msg, transactions)
|
||||||
|
assert res == "O\n"
|
||||||
|
assert len(transactions) == 0
|
||||||
|
assert metadata.get_tokens_for_addr(testaddr) == [token]
|
||||||
|
|
||||||
|
# trigger notification for incoming message
|
||||||
|
tx2 = "2222"
|
||||||
|
assert dictproxy.handle_dovecot_request(f"B{tx2}\t{testaddr}", transactions) is None
|
||||||
|
msg = f"S{tx2}\tpriv/guid00/messagenew"
|
||||||
|
assert dictproxy.handle_dovecot_request(msg, transactions) is None
|
||||||
|
queue_item = notifier.retry_queues[0].get()[1]
|
||||||
|
assert queue_item.token == token
|
||||||
|
assert dictproxy.handle_dovecot_request(f"C{tx2}", transactions) == "O\n"
|
||||||
|
assert not transactions
|
||||||
|
assert queue_item.path.exists()
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_protocol_set_devicetoken(dictproxy):
|
||||||
|
rfile = io.BytesIO(
|
||||||
|
b"\n".join(
|
||||||
|
[
|
||||||
|
b"HELLO",
|
||||||
|
b"Btx00\tuser@example.org",
|
||||||
|
b"Stx00\tpriv/guid00/devicetoken\t01234",
|
||||||
|
b"Ctx00",
|
||||||
|
]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert wfile.getvalue() == b"O\n"
|
||||||
|
assert dictproxy.metadata.get_tokens_for_addr("user@example.org") == ["01234"]
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_protocol_set_get_devicetoken(dictproxy):
|
||||||
|
rfile = io.BytesIO(
|
||||||
|
b"\n".join(
|
||||||
|
[
|
||||||
|
b"HELLO",
|
||||||
|
b"Btx00\tuser@example.org",
|
||||||
|
b"Stx00\tpriv/guid00/devicetoken\t01234",
|
||||||
|
b"Ctx00",
|
||||||
|
]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert dictproxy.metadata.get_tokens_for_addr("user@example.org") == ["01234"]
|
||||||
|
assert wfile.getvalue() == b"O\n"
|
||||||
|
|
||||||
|
rfile = io.BytesIO(
|
||||||
|
b"\n".join([b"HELLO", b"Lpriv/0123/devicetoken\tuser@example.org"])
|
||||||
|
)
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert wfile.getvalue() == b"O01234\n"
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_dovecot_protocol_iterate(dictproxy):
|
||||||
|
rfile = io.BytesIO(
|
||||||
|
b"\n".join(
|
||||||
|
[
|
||||||
|
b"H",
|
||||||
|
b"I9\t0\tpriv/5cbe730f146fea6535be0d003dd4fc98/\tci-2dzsrs@nine.testrun.org",
|
||||||
|
]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert wfile.getvalue() == b"\n"
|
||||||
|
|
||||||
|
|
||||||
|
def test_notifier_thread_deletes_persistent_file(metadata, notifier, testaddr):
|
||||||
|
reqmock = get_mocked_requests([200])
|
||||||
|
metadata.add_token_to_addr(testaddr, "01234")
|
||||||
|
notifier.new_message_for_addr(testaddr, metadata)
|
||||||
|
NotifyThread(notifier, 0, None).retry_one(reqmock)
|
||||||
|
url, data, timeout = reqmock.requests[0]
|
||||||
|
assert data == "01234"
|
||||||
|
assert metadata.get_tokens_for_addr(testaddr) == ["01234"]
|
||||||
|
notifier.requeue_persistent_queue_items()
|
||||||
|
assert notifier.retry_queues[0].qsize() == 0
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.parametrize("status", [requests.exceptions.RequestException(), 404, 500])
|
||||||
|
def test_notifier_thread_connection_failures(
|
||||||
|
metadata, notifier, testaddr, status, caplog
|
||||||
|
):
|
||||||
|
"""test that tokens keep getting retried until they are given up."""
|
||||||
|
metadata.add_token_to_addr(testaddr, "01234")
|
||||||
|
notifier.new_message_for_addr(testaddr, metadata)
|
||||||
|
notifier.NOTIFICATION_RETRY_DELAY = 5
|
||||||
|
max_tries = len(notifier.retry_queues)
|
||||||
|
for i in range(max_tries):
|
||||||
|
caplog.clear()
|
||||||
|
reqmock = get_mocked_requests([status])
|
||||||
|
sleep_calls = []
|
||||||
|
NotifyThread(notifier, i, None).retry_one(reqmock, sleep=sleep_calls.append)
|
||||||
|
assert notifier.retry_queues[i].qsize() == 0
|
||||||
|
assert "request failed" in caplog.records[0].msg
|
||||||
|
if i > 0:
|
||||||
|
assert len(sleep_calls) == 1
|
||||||
|
if i + 1 < max_tries:
|
||||||
|
assert notifier.retry_queues[i + 1].qsize() == 1
|
||||||
|
assert len(caplog.records) == 1
|
||||||
|
else:
|
||||||
|
assert len(caplog.records) == 2
|
||||||
|
assert "deadline" in caplog.records[1].msg
|
||||||
|
notifier.requeue_persistent_queue_items()
|
||||||
|
assert notifier.retry_queues[0].qsize() == 0
|
||||||
|
|
||||||
|
|
||||||
|
def test_requeue_removes_tmp_files(notifier, metadata, testaddr, caplog):
|
||||||
|
metadata.add_token_to_addr(testaddr, "01234")
|
||||||
|
notifier.new_message_for_addr(testaddr, metadata)
|
||||||
|
p = notifier.queue_dir.joinpath("1203981203.tmp")
|
||||||
|
p.touch()
|
||||||
|
notifier2 = notifier.__class__(notifier.queue_dir)
|
||||||
|
notifier2.requeue_persistent_queue_items()
|
||||||
|
assert "spurious" in caplog.records[0].msg
|
||||||
|
assert not p.exists()
|
||||||
|
assert notifier2.retry_queues[0].qsize() == 1
|
||||||
|
when, queue_item = notifier2.retry_queues[0].get()
|
||||||
|
assert when <= int(time.time())
|
||||||
|
assert queue_item.addr == testaddr
|
||||||
|
|
||||||
|
|
||||||
|
def test_start_and_stop_notification_threads(notifier, testaddr):
|
||||||
|
threads = notifier.start_notification_threads(None)
|
||||||
|
for retry_num, threadlist in threads.items():
|
||||||
|
for t in threadlist:
|
||||||
|
t.stop()
|
||||||
|
t.join()
|
||||||
|
|
||||||
|
|
||||||
|
def test_multi_device_notifier(metadata, notifier, testaddr):
|
||||||
|
metadata.add_token_to_addr(testaddr, "01234")
|
||||||
|
metadata.add_token_to_addr(testaddr, "56789")
|
||||||
|
notifier.new_message_for_addr(testaddr, metadata)
|
||||||
|
reqmock = get_mocked_requests([200, 200])
|
||||||
|
NotifyThread(notifier, 0, None).retry_one(reqmock)
|
||||||
|
NotifyThread(notifier, 0, None).retry_one(reqmock)
|
||||||
|
assert notifier.retry_queues[0].qsize() == 0
|
||||||
|
assert notifier.retry_queues[1].qsize() == 0
|
||||||
|
url, data, timeout = reqmock.requests[0]
|
||||||
|
assert data == "01234"
|
||||||
|
url, data, timeout = reqmock.requests[1]
|
||||||
|
assert data == "56789"
|
||||||
|
assert metadata.get_tokens_for_addr(testaddr) == ["01234", "56789"]
|
||||||
|
|
||||||
|
|
||||||
|
def test_notifier_thread_run_gone_removes_token(metadata, notifier, testaddr):
|
||||||
|
metadata.add_token_to_addr(testaddr, "01234")
|
||||||
|
metadata.add_token_to_addr(testaddr, "45678")
|
||||||
|
notifier.new_message_for_addr(testaddr, metadata)
|
||||||
|
|
||||||
|
reqmock = get_mocked_requests([410, 200])
|
||||||
|
NotifyThread(notifier, 0, metadata.remove_token_from_addr).retry_one(reqmock)
|
||||||
|
NotifyThread(notifier, 0, None).retry_one(reqmock)
|
||||||
|
url, data, timeout = reqmock.requests[0]
|
||||||
|
assert data == "01234"
|
||||||
|
url, data, timeout = reqmock.requests[1]
|
||||||
|
assert data == "45678"
|
||||||
|
assert metadata.get_tokens_for_addr(testaddr) == ["45678"]
|
||||||
|
assert notifier.retry_queues[0].qsize() == 0
|
||||||
|
assert notifier.retry_queues[1].qsize() == 0
|
||||||
|
|
||||||
|
|
||||||
|
def test_persistent_queue_items(tmp_path, testaddr, token):
|
||||||
|
queue_item = PersistentQueueItem.create(tmp_path, testaddr, 432, token)
|
||||||
|
assert queue_item.addr == testaddr
|
||||||
|
assert queue_item.start_ts == 432
|
||||||
|
assert queue_item.token == token
|
||||||
|
item2 = PersistentQueueItem.read_from_path(queue_item.path)
|
||||||
|
assert item2.addr == testaddr
|
||||||
|
assert item2.start_ts == 432
|
||||||
|
assert item2.token == token
|
||||||
|
assert item2 == queue_item
|
||||||
|
item2.delete()
|
||||||
|
assert not item2.path.exists()
|
||||||
|
assert not queue_item < item2 and not item2 < queue_item
|
||||||
|
|
||||||
|
|
||||||
|
def test_iroh_relay(dictproxy):
|
||||||
|
rfile = io.BytesIO(
|
||||||
|
b"\n".join(
|
||||||
|
[
|
||||||
|
b"H",
|
||||||
|
b"Lshared/0123/vendor/vendor.dovecot/pvt/server/vendor/deltachat/irohrelay\tuser@example.org",
|
||||||
|
]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
wfile = io.BytesIO()
|
||||||
|
dictproxy.iroh_relay = "https://example.org/"
|
||||||
|
dictproxy.loop_forever(rfile, wfile)
|
||||||
|
assert wfile.getvalue() == b"Ohttps://example.org/\n"
|
||||||
24
chatmaild/src/chatmaild/tests/test_metrics.py
Normal file
24
chatmaild/src/chatmaild/tests/test_metrics.py
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
from chatmaild.metrics import main
|
||||||
|
|
||||||
|
|
||||||
|
def test_main(tmp_path, capsys):
|
||||||
|
paths = []
|
||||||
|
for x in ("ci-asllkj", "ac_12l3kj", "qweqwe", "ci-l1k2j31l2k3"):
|
||||||
|
p = tmp_path.joinpath(x)
|
||||||
|
p.mkdir()
|
||||||
|
p.joinpath("cur").mkdir()
|
||||||
|
paths.append(p)
|
||||||
|
|
||||||
|
tmp_path.joinpath("nomailbox").mkdir()
|
||||||
|
|
||||||
|
main(tmp_path)
|
||||||
|
out, _ = capsys.readouterr()
|
||||||
|
d = {}
|
||||||
|
for line in out.split("\n"):
|
||||||
|
if line.strip() and not line.startswith("#"):
|
||||||
|
name, num = line.split()
|
||||||
|
d[name] = int(num)
|
||||||
|
|
||||||
|
assert d["accounts"] == 4
|
||||||
|
assert d["ci_accounts"] == 3
|
||||||
|
assert d["nonci_accounts"] == 1
|
||||||
67
chatmaild/src/chatmaild/tests/test_migrate_db.py
Normal file
67
chatmaild/src/chatmaild/tests/test_migrate_db.py
Normal file
@@ -0,0 +1,67 @@
|
|||||||
|
import sqlite3
|
||||||
|
|
||||||
|
from chatmaild.migrate_db import migrate_from_db_to_maildir
|
||||||
|
|
||||||
|
|
||||||
|
def test_migration_not_exists(tmp_path, example_config):
|
||||||
|
example_config.passdb_path = tmp_path.joinpath("sqlite")
|
||||||
|
|
||||||
|
|
||||||
|
def test_migration(tmp_path, example_config, caplog):
|
||||||
|
passdb_path = tmp_path.joinpath("passdb.sqlite")
|
||||||
|
uri = f"file:{passdb_path}?mode=rwc"
|
||||||
|
sqlconn = sqlite3.connect(uri, timeout=60, uri=True)
|
||||||
|
sqlconn.execute(
|
||||||
|
"""
|
||||||
|
CREATE TABLE users (
|
||||||
|
addr TEXT PRIMARY KEY,
|
||||||
|
password TEXT,
|
||||||
|
last_login INTEGER
|
||||||
|
)
|
||||||
|
"""
|
||||||
|
)
|
||||||
|
all = {}
|
||||||
|
|
||||||
|
for i in range(500):
|
||||||
|
values = (f"somsom{i:03}@example.org", f"passwo{i:03}", i * 86400)
|
||||||
|
sqlconn.execute(
|
||||||
|
"""
|
||||||
|
INSERT INTO users (addr, password, last_login)
|
||||||
|
VALUES (?, ?, ?)""",
|
||||||
|
values,
|
||||||
|
)
|
||||||
|
all[values[0]] = values[1:]
|
||||||
|
|
||||||
|
for i in range(500):
|
||||||
|
values = (f"pompom{i:03}@example.org", f"wopass{i:03}", "")
|
||||||
|
sqlconn.execute(
|
||||||
|
"""
|
||||||
|
INSERT INTO users (addr, password, last_login)
|
||||||
|
VALUES (?, ?, ?)""",
|
||||||
|
values,
|
||||||
|
)
|
||||||
|
all[values[0]] = values[1:]
|
||||||
|
|
||||||
|
sqlconn.commit()
|
||||||
|
sqlconn.close()
|
||||||
|
|
||||||
|
assert passdb_path.stat().st_size > 10000
|
||||||
|
|
||||||
|
example_config.passdb_path = passdb_path
|
||||||
|
|
||||||
|
assert not caplog.records
|
||||||
|
|
||||||
|
migrate_from_db_to_maildir(example_config, chunking=500)
|
||||||
|
assert len(caplog.records) > 3
|
||||||
|
|
||||||
|
for path in example_config.mailboxes_dir.iterdir():
|
||||||
|
if "@" not in path.name:
|
||||||
|
continue
|
||||||
|
password, last_login = all.pop(path.name)
|
||||||
|
user = example_config.get_user(path.name)
|
||||||
|
if last_login:
|
||||||
|
assert user.get_last_login_timestamp() == last_login
|
||||||
|
assert password == user.get_userdb_dict()["password"]
|
||||||
|
|
||||||
|
assert not all
|
||||||
|
assert not example_config.passdb_path.exists()
|
||||||
27
chatmaild/src/chatmaild/tests/test_newmail.py
Normal file
27
chatmaild/src/chatmaild/tests/test_newmail.py
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
import json
|
||||||
|
|
||||||
|
import chatmaild
|
||||||
|
from chatmaild.newemail import create_newemail_dict, print_new_account
|
||||||
|
|
||||||
|
|
||||||
|
def test_create_newemail_dict(example_config):
|
||||||
|
ac1 = create_newemail_dict(example_config)
|
||||||
|
assert "@" in ac1["email"]
|
||||||
|
assert len(ac1["password"]) >= 10
|
||||||
|
|
||||||
|
ac2 = create_newemail_dict(example_config)
|
||||||
|
|
||||||
|
assert ac1["email"] != ac2["email"]
|
||||||
|
assert ac1["password"] != ac2["password"]
|
||||||
|
|
||||||
|
|
||||||
|
def test_print_new_account(capsys, monkeypatch, maildomain, tmpdir, example_config):
|
||||||
|
monkeypatch.setattr(chatmaild.newemail, "CONFIG_PATH", str(example_config._inipath))
|
||||||
|
print_new_account()
|
||||||
|
out, err = capsys.readouterr()
|
||||||
|
lines = out.split("\n")
|
||||||
|
assert lines[0] == "Content-Type: application/json"
|
||||||
|
assert not lines[1]
|
||||||
|
dic = json.loads(lines[2])
|
||||||
|
assert dic["email"].endswith(f"@{example_config.mail_domain}")
|
||||||
|
assert len(dic["password"]) >= 10
|
||||||
56
chatmaild/src/chatmaild/tests/test_user.py
Normal file
56
chatmaild/src/chatmaild/tests/test_user.py
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
def test_login_timestamp(testaddr, example_config):
|
||||||
|
user = example_config.get_user(testaddr)
|
||||||
|
user.set_password("someeqkjwelkqwjleqwe")
|
||||||
|
user.set_last_login_timestamp(100000)
|
||||||
|
assert user.get_last_login_timestamp() == 86400
|
||||||
|
|
||||||
|
user.set_last_login_timestamp(200000)
|
||||||
|
assert user.get_last_login_timestamp() == 86400 * 2
|
||||||
|
|
||||||
|
|
||||||
|
def test_get_user_dict_not_set(testaddr, example_config, caplog):
|
||||||
|
user = example_config.get_user(testaddr)
|
||||||
|
assert not caplog.records
|
||||||
|
assert user.get_userdb_dict() == {}
|
||||||
|
assert len(caplog.records) == 0
|
||||||
|
|
||||||
|
user.set_password("")
|
||||||
|
assert user.get_userdb_dict() == {}
|
||||||
|
assert len(caplog.records) == 1
|
||||||
|
|
||||||
|
|
||||||
|
def test_get_user_dict(make_config, tmp_path):
|
||||||
|
config = make_config("something.testrun.org")
|
||||||
|
addr = "user1@something.org"
|
||||||
|
user = config.get_user(addr)
|
||||||
|
enc_password = "l1k2j31lk2j3l1k23j123"
|
||||||
|
user.set_password(enc_password)
|
||||||
|
data = user.get_userdb_dict()
|
||||||
|
assert addr in str(data["home"])
|
||||||
|
assert data["uid"] == "vmail"
|
||||||
|
assert data["gid"] == "vmail"
|
||||||
|
assert data["password"] == enc_password
|
||||||
|
|
||||||
|
|
||||||
|
def test_no_mailboxes_dir(testaddr, example_config, tmp_path):
|
||||||
|
p = tmp_path.joinpath("a", "mailboxes")
|
||||||
|
example_config.mailboxes_dir = p
|
||||||
|
|
||||||
|
user = example_config.get_user(testaddr)
|
||||||
|
user.set_password("someeqkjwelkqwjleqwe")
|
||||||
|
user.set_last_login_timestamp(100000)
|
||||||
|
assert user.get_last_login_timestamp() == 86400
|
||||||
|
|
||||||
|
|
||||||
|
def test_set_get_cleartext_flag(testaddr, example_config, tmp_path):
|
||||||
|
p = tmp_path.joinpath("a", "mailboxes")
|
||||||
|
example_config.mailboxes_dir = p
|
||||||
|
|
||||||
|
user = example_config.get_user(testaddr)
|
||||||
|
user.set_password("someeqkjwelkqwjleqwe")
|
||||||
|
user.set_last_login_timestamp(100000)
|
||||||
|
assert user.get_last_login_timestamp() == 86400
|
||||||
|
|
||||||
|
assert not user.is_incoming_cleartext_ok()
|
||||||
|
user.allow_incoming_cleartext()
|
||||||
|
assert user.is_incoming_cleartext_ok()
|
||||||
83
chatmaild/src/chatmaild/user.py
Normal file
83
chatmaild/src/chatmaild/user.py
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
import logging
|
||||||
|
import os
|
||||||
|
|
||||||
|
from chatmaild.filedict import write_bytes_atomic
|
||||||
|
|
||||||
|
|
||||||
|
def get_daytimestamp(timestamp) -> int:
|
||||||
|
return int(timestamp) // 86400 * 86400
|
||||||
|
|
||||||
|
|
||||||
|
class User:
|
||||||
|
def __init__(self, maildir, addr, password_path, uid, gid):
|
||||||
|
self.maildir = maildir
|
||||||
|
self.addr = addr
|
||||||
|
self.password_path = password_path
|
||||||
|
self.enforce_E2EE_path = maildir.joinpath("enforceE2EEincoming")
|
||||||
|
self.uid = uid
|
||||||
|
self.gid = gid
|
||||||
|
|
||||||
|
@property
|
||||||
|
def can_track(self):
|
||||||
|
return "@" in self.addr and not self.addr.startswith("echo@")
|
||||||
|
|
||||||
|
def get_userdb_dict(self):
|
||||||
|
"""Return a non-empty dovecot 'userdb' style dict
|
||||||
|
if the user has an existing non-empty password"""
|
||||||
|
try:
|
||||||
|
pw = self.password_path.read_text()
|
||||||
|
except FileNotFoundError:
|
||||||
|
return {}
|
||||||
|
|
||||||
|
if not pw:
|
||||||
|
logging.error(f"password is empty for: {self.addr}")
|
||||||
|
return {}
|
||||||
|
|
||||||
|
home = str(self.maildir)
|
||||||
|
return dict(addr=self.addr, home=home, uid=self.uid, gid=self.gid, password=pw)
|
||||||
|
|
||||||
|
def is_incoming_cleartext_ok(self):
|
||||||
|
return not self.enforce_E2EE_path.exists()
|
||||||
|
|
||||||
|
def allow_incoming_cleartext(self):
|
||||||
|
if self.enforce_E2EE_path.exists():
|
||||||
|
self.enforce_E2EE_path.unlink()
|
||||||
|
|
||||||
|
def set_password(self, enc_password):
|
||||||
|
"""Set the specified password for this user.
|
||||||
|
|
||||||
|
This method can be called concurrently
|
||||||
|
but there is no guarantee which of the password-set calls will win.
|
||||||
|
"""
|
||||||
|
self.maildir.mkdir(exist_ok=True, parents=True)
|
||||||
|
password = enc_password.encode("ascii")
|
||||||
|
|
||||||
|
try:
|
||||||
|
write_bytes_atomic(self.password_path, password)
|
||||||
|
except PermissionError:
|
||||||
|
if not self.addr.startswith("echo@"):
|
||||||
|
logging.error(f"could not write password for: {self.addr}")
|
||||||
|
raise
|
||||||
|
self.enforce_E2EE_path.touch()
|
||||||
|
|
||||||
|
def set_last_login_timestamp(self, timestamp):
|
||||||
|
"""Track login time with daily granularity
|
||||||
|
to minimize touching files and to minimize metadata leakage."""
|
||||||
|
if not self.can_track:
|
||||||
|
return
|
||||||
|
try:
|
||||||
|
mtime = int(os.stat(self.password_path).st_mtime)
|
||||||
|
except FileNotFoundError:
|
||||||
|
logging.error(f"Can not get last login timestamp for {self.addr}")
|
||||||
|
return
|
||||||
|
|
||||||
|
timestamp = get_daytimestamp(timestamp)
|
||||||
|
if mtime != timestamp:
|
||||||
|
os.utime(self.password_path, (timestamp, timestamp))
|
||||||
|
|
||||||
|
def get_last_login_timestamp(self):
|
||||||
|
if self.can_track:
|
||||||
|
try:
|
||||||
|
return int(self.password_path.stat().st_mtime)
|
||||||
|
except FileNotFoundError:
|
||||||
|
pass
|
||||||
43
cmdeploy/pyproject.toml
Normal file
43
cmdeploy/pyproject.toml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
[build-system]
|
||||||
|
requires = ["setuptools>=68"]
|
||||||
|
build-backend = "setuptools.build_meta"
|
||||||
|
|
||||||
|
[project]
|
||||||
|
name = "cmdeploy"
|
||||||
|
version = "0.2"
|
||||||
|
dependencies = [
|
||||||
|
"pyinfra>=3",
|
||||||
|
"pillow",
|
||||||
|
"qrcode",
|
||||||
|
"markdown",
|
||||||
|
"pytest",
|
||||||
|
"setuptools>=68",
|
||||||
|
"termcolor",
|
||||||
|
"build",
|
||||||
|
"tox",
|
||||||
|
"ruff",
|
||||||
|
"pytest",
|
||||||
|
"pytest-xdist",
|
||||||
|
"execnet",
|
||||||
|
"imap_tools",
|
||||||
|
]
|
||||||
|
|
||||||
|
[project.scripts]
|
||||||
|
cmdeploy = "cmdeploy.cmdeploy:main"
|
||||||
|
|
||||||
|
[project.entry-points.pytest11]
|
||||||
|
"chatmaild.testplugin" = "chatmaild.tests.plugin"
|
||||||
|
"cmdeploy.testplugin" = "cmdeploy.tests.plugin"
|
||||||
|
|
||||||
|
[tool.pytest.ini_options]
|
||||||
|
addopts = "-v -ra --strict-markers"
|
||||||
|
|
||||||
|
[tool.ruff]
|
||||||
|
lint.select = [
|
||||||
|
"F", # Pyflakes
|
||||||
|
"I", # isort
|
||||||
|
|
||||||
|
"PLC", # Pylint Convention
|
||||||
|
"PLE", # Pylint Error
|
||||||
|
"PLW", # Pylint Warning
|
||||||
|
]
|
||||||
729
cmdeploy/src/cmdeploy/__init__.py
Normal file
729
cmdeploy/src/cmdeploy/__init__.py
Normal file
@@ -0,0 +1,729 @@
|
|||||||
|
"""
|
||||||
|
Chat Mail pyinfra deploy.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import importlib.resources
|
||||||
|
import io
|
||||||
|
import shutil
|
||||||
|
import subprocess
|
||||||
|
import sys
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
from chatmaild.config import Config, read_config
|
||||||
|
from pyinfra import facts, host
|
||||||
|
from pyinfra.facts.files import File
|
||||||
|
from pyinfra.facts.systemd import SystemdEnabled
|
||||||
|
from pyinfra.operations import apt, files, pip, server, systemd
|
||||||
|
|
||||||
|
from .acmetool import deploy_acmetool
|
||||||
|
|
||||||
|
|
||||||
|
def _build_chatmaild(dist_dir) -> None:
|
||||||
|
dist_dir = Path(dist_dir).resolve()
|
||||||
|
if dist_dir.exists():
|
||||||
|
shutil.rmtree(dist_dir)
|
||||||
|
dist_dir.mkdir()
|
||||||
|
subprocess.check_output(
|
||||||
|
[sys.executable, "-m", "build", "-n"]
|
||||||
|
+ ["--sdist", "chatmaild", "--outdir", str(dist_dir)]
|
||||||
|
)
|
||||||
|
entries = list(dist_dir.iterdir())
|
||||||
|
assert len(entries) == 1
|
||||||
|
return entries[0]
|
||||||
|
|
||||||
|
|
||||||
|
def remove_legacy_artifacts():
|
||||||
|
# disable legacy doveauth-dictproxy.service
|
||||||
|
if host.get_fact(SystemdEnabled).get("doveauth-dictproxy.service"):
|
||||||
|
systemd.service(
|
||||||
|
name="Disable legacy doveauth-dictproxy.service",
|
||||||
|
service="doveauth-dictproxy.service",
|
||||||
|
running=False,
|
||||||
|
enabled=False,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def _install_remote_venv_with_chatmaild(config) -> None:
|
||||||
|
remove_legacy_artifacts()
|
||||||
|
dist_file = _build_chatmaild(dist_dir=Path("chatmaild/dist"))
|
||||||
|
remote_base_dir = "/usr/local/lib/chatmaild"
|
||||||
|
remote_dist_file = f"{remote_base_dir}/dist/{dist_file.name}"
|
||||||
|
remote_venv_dir = f"{remote_base_dir}/venv"
|
||||||
|
remote_chatmail_inipath = f"{remote_base_dir}/chatmail.ini"
|
||||||
|
root_owned = dict(user="root", group="root", mode="644")
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="apt install python3-virtualenv",
|
||||||
|
packages=["python3-virtualenv"],
|
||||||
|
)
|
||||||
|
|
||||||
|
files.put(
|
||||||
|
name="Upload chatmaild source package",
|
||||||
|
src=dist_file.open("rb"),
|
||||||
|
dest=remote_dist_file,
|
||||||
|
create_remote_dir=True,
|
||||||
|
**root_owned,
|
||||||
|
)
|
||||||
|
|
||||||
|
files.put(
|
||||||
|
name=f"Upload {remote_chatmail_inipath}",
|
||||||
|
src=config._getbytefile(),
|
||||||
|
dest=remote_chatmail_inipath,
|
||||||
|
**root_owned,
|
||||||
|
)
|
||||||
|
|
||||||
|
pip.virtualenv(
|
||||||
|
name=f"chatmaild virtualenv {remote_venv_dir}",
|
||||||
|
path=remote_venv_dir,
|
||||||
|
always_copy=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="install gcc and headers to build crypt_r source package",
|
||||||
|
packages=["gcc", "python3-dev"],
|
||||||
|
)
|
||||||
|
|
||||||
|
server.shell(
|
||||||
|
name=f"forced pip-install {dist_file.name}",
|
||||||
|
commands=[
|
||||||
|
f"{remote_venv_dir}/bin/pip install --force-reinstall {remote_dist_file}"
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("metrics.cron.j2"),
|
||||||
|
dest="/etc/cron.d/chatmail-metrics",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config={
|
||||||
|
"mailboxes_dir": config.mailboxes_dir,
|
||||||
|
"execpath": f"{remote_venv_dir}/bin/chatmail-metrics",
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
# install systemd units
|
||||||
|
for fn in (
|
||||||
|
"doveauth",
|
||||||
|
"filtermail",
|
||||||
|
"filtermail-incoming",
|
||||||
|
"echobot",
|
||||||
|
"chatmail-metadata",
|
||||||
|
"lastlogin",
|
||||||
|
):
|
||||||
|
execpath = fn if fn != "filtermail-incoming" else "filtermail"
|
||||||
|
params = dict(
|
||||||
|
execpath=f"{remote_venv_dir}/bin/{execpath}",
|
||||||
|
config_path=remote_chatmail_inipath,
|
||||||
|
remote_venv_dir=remote_venv_dir,
|
||||||
|
mail_domain=config.mail_domain,
|
||||||
|
)
|
||||||
|
source_path = importlib.resources.files(__package__).joinpath(
|
||||||
|
"service", f"{fn}.service.f"
|
||||||
|
)
|
||||||
|
content = source_path.read_text().format(**params).encode()
|
||||||
|
|
||||||
|
files.put(
|
||||||
|
name=f"Upload {fn}.service",
|
||||||
|
src=io.BytesIO(content),
|
||||||
|
dest=f"/etc/systemd/system/{fn}.service",
|
||||||
|
**root_owned,
|
||||||
|
)
|
||||||
|
systemd.service(
|
||||||
|
name=f"Setup {fn} service",
|
||||||
|
service=f"{fn}.service",
|
||||||
|
running=True,
|
||||||
|
enabled=True,
|
||||||
|
restarted=True,
|
||||||
|
daemon_reload=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def _configure_opendkim(domain: str, dkim_selector: str = "dkim") -> bool:
|
||||||
|
"""Configures OpenDKIM"""
|
||||||
|
need_restart = False
|
||||||
|
|
||||||
|
main_config = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("opendkim/opendkim.conf"),
|
||||||
|
dest="/etc/opendkim.conf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config={"domain_name": domain, "opendkim_selector": dkim_selector},
|
||||||
|
)
|
||||||
|
need_restart |= main_config.changed
|
||||||
|
|
||||||
|
screen_script = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("opendkim/screen.lua"),
|
||||||
|
dest="/etc/opendkim/screen.lua",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= screen_script.changed
|
||||||
|
|
||||||
|
final_script = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("opendkim/final.lua"),
|
||||||
|
dest="/etc/opendkim/final.lua",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= final_script.changed
|
||||||
|
|
||||||
|
files.directory(
|
||||||
|
name="Add opendkim directory to /etc",
|
||||||
|
path="/etc/opendkim",
|
||||||
|
user="opendkim",
|
||||||
|
group="opendkim",
|
||||||
|
mode="750",
|
||||||
|
present=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
keytable = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("opendkim/KeyTable"),
|
||||||
|
dest="/etc/dkimkeys/KeyTable",
|
||||||
|
user="opendkim",
|
||||||
|
group="opendkim",
|
||||||
|
mode="644",
|
||||||
|
config={"domain_name": domain, "opendkim_selector": dkim_selector},
|
||||||
|
)
|
||||||
|
need_restart |= keytable.changed
|
||||||
|
|
||||||
|
signing_table = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("opendkim/SigningTable"),
|
||||||
|
dest="/etc/dkimkeys/SigningTable",
|
||||||
|
user="opendkim",
|
||||||
|
group="opendkim",
|
||||||
|
mode="644",
|
||||||
|
config={"domain_name": domain, "opendkim_selector": dkim_selector},
|
||||||
|
)
|
||||||
|
need_restart |= signing_table.changed
|
||||||
|
files.directory(
|
||||||
|
name="Add opendkim socket directory to /var/spool/postfix",
|
||||||
|
path="/var/spool/postfix/opendkim",
|
||||||
|
user="opendkim",
|
||||||
|
group="opendkim",
|
||||||
|
mode="750",
|
||||||
|
present=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="apt install opendkim opendkim-tools",
|
||||||
|
packages=["opendkim", "opendkim-tools"],
|
||||||
|
)
|
||||||
|
|
||||||
|
if not host.get_fact(File, f"/etc/dkimkeys/{dkim_selector}.private"):
|
||||||
|
server.shell(
|
||||||
|
name="Generate OpenDKIM domain keys",
|
||||||
|
commands=[
|
||||||
|
f"/usr/sbin/opendkim-genkey -D /etc/dkimkeys -d {domain} -s {dkim_selector}"
|
||||||
|
],
|
||||||
|
_use_su_login=True,
|
||||||
|
_su_user="opendkim",
|
||||||
|
)
|
||||||
|
|
||||||
|
service_file = files.put(
|
||||||
|
name="Configure opendkim to restart once a day",
|
||||||
|
src=importlib.resources.files(__package__).joinpath("opendkim/systemd.conf"),
|
||||||
|
dest="/etc/systemd/system/opendkim.service.d/10-prevent-memory-leak.conf",
|
||||||
|
)
|
||||||
|
need_restart |= service_file.changed
|
||||||
|
|
||||||
|
|
||||||
|
return need_restart
|
||||||
|
|
||||||
|
|
||||||
|
def _uninstall_mta_sts_daemon() -> None:
|
||||||
|
# Remove configuration.
|
||||||
|
files.file("/etc/mta-sts-daemon.yml", present=False)
|
||||||
|
|
||||||
|
files.directory("/usr/local/lib/postfix-mta-sts-resolver", present=False)
|
||||||
|
|
||||||
|
files.file("/etc/systemd/system/mta-sts-daemon.service", present=False)
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="Stop MTA-STS daemon",
|
||||||
|
service="mta-sts-daemon.service",
|
||||||
|
daemon_reload=True,
|
||||||
|
running=False,
|
||||||
|
enabled=False,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def _configure_postfix(config: Config, debug: bool = False) -> bool:
|
||||||
|
"""Configures Postfix SMTP server."""
|
||||||
|
need_restart = False
|
||||||
|
|
||||||
|
main_config = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("postfix/main.cf.j2"),
|
||||||
|
dest="/etc/postfix/main.cf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config=config,
|
||||||
|
disable_ipv6=config.disable_ipv6,
|
||||||
|
)
|
||||||
|
need_restart |= main_config.changed
|
||||||
|
|
||||||
|
master_config = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("postfix/master.cf.j2"),
|
||||||
|
dest="/etc/postfix/master.cf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
debug=debug,
|
||||||
|
config=config,
|
||||||
|
)
|
||||||
|
need_restart |= master_config.changed
|
||||||
|
|
||||||
|
header_cleanup = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath(
|
||||||
|
"postfix/submission_header_cleanup"
|
||||||
|
),
|
||||||
|
dest="/etc/postfix/submission_header_cleanup",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= header_cleanup.changed
|
||||||
|
|
||||||
|
# Login map that 1:1 maps email address to login.
|
||||||
|
login_map = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("postfix/login_map"),
|
||||||
|
dest="/etc/postfix/login_map",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= login_map.changed
|
||||||
|
|
||||||
|
return need_restart
|
||||||
|
|
||||||
|
|
||||||
|
def _configure_dovecot(config: Config, debug: bool = False) -> bool:
|
||||||
|
"""Configures Dovecot IMAP server."""
|
||||||
|
need_restart = False
|
||||||
|
|
||||||
|
main_config = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("dovecot/dovecot.conf.j2"),
|
||||||
|
dest="/etc/dovecot/dovecot.conf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config=config,
|
||||||
|
debug=debug,
|
||||||
|
disable_ipv6=config.disable_ipv6,
|
||||||
|
)
|
||||||
|
need_restart |= main_config.changed
|
||||||
|
auth_config = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("dovecot/auth.conf"),
|
||||||
|
dest="/etc/dovecot/auth.conf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= auth_config.changed
|
||||||
|
lua_push_notification_script = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath(
|
||||||
|
"dovecot/push_notification.lua"
|
||||||
|
),
|
||||||
|
dest="/etc/dovecot/push_notification.lua",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= lua_push_notification_script.changed
|
||||||
|
|
||||||
|
files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("dovecot/expunge.cron.j2"),
|
||||||
|
dest="/etc/cron.d/expunge",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config=config,
|
||||||
|
)
|
||||||
|
|
||||||
|
# as per https://doc.dovecot.org/configuration_manual/os/
|
||||||
|
# it is recommended to set the following inotify limits
|
||||||
|
for name in ("max_user_instances", "max_user_watches"):
|
||||||
|
key = f"fs.inotify.{name}"
|
||||||
|
server.sysctl(
|
||||||
|
name=f"Change {key}",
|
||||||
|
key=key,
|
||||||
|
value=65535,
|
||||||
|
persist=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
return need_restart
|
||||||
|
|
||||||
|
|
||||||
|
def _configure_nginx(config: Config, debug: bool = False) -> bool:
|
||||||
|
"""Configures nginx HTTP server."""
|
||||||
|
need_restart = False
|
||||||
|
|
||||||
|
main_config = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("nginx/nginx.conf.j2"),
|
||||||
|
dest="/etc/nginx/nginx.conf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config={"domain_name": config.mail_domain},
|
||||||
|
disable_ipv6=config.disable_ipv6,
|
||||||
|
)
|
||||||
|
need_restart |= main_config.changed
|
||||||
|
|
||||||
|
autoconfig = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("nginx/autoconfig.xml.j2"),
|
||||||
|
dest="/var/www/html/.well-known/autoconfig/mail/config-v1.1.xml",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config={"domain_name": config.mail_domain},
|
||||||
|
)
|
||||||
|
need_restart |= autoconfig.changed
|
||||||
|
|
||||||
|
mta_sts_config = files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("nginx/mta-sts.txt.j2"),
|
||||||
|
dest="/var/www/html/.well-known/mta-sts.txt",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
config={"domain_name": config.mail_domain},
|
||||||
|
)
|
||||||
|
need_restart |= mta_sts_config.changed
|
||||||
|
|
||||||
|
# install CGI newemail script
|
||||||
|
#
|
||||||
|
cgi_dir = "/usr/lib/cgi-bin"
|
||||||
|
files.directory(
|
||||||
|
name=f"Ensure {cgi_dir} exists",
|
||||||
|
path=cgi_dir,
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
)
|
||||||
|
|
||||||
|
files.put(
|
||||||
|
name="Upload cgi newemail.py script",
|
||||||
|
src=importlib.resources.files("chatmaild").joinpath("newemail.py").open("rb"),
|
||||||
|
dest=f"{cgi_dir}/newemail.py",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="755",
|
||||||
|
)
|
||||||
|
|
||||||
|
return need_restart
|
||||||
|
|
||||||
|
|
||||||
|
def _remove_rspamd() -> None:
|
||||||
|
"""Remove rspamd"""
|
||||||
|
apt.packages(name="Remove rspamd", packages="rspamd", present=False)
|
||||||
|
|
||||||
|
|
||||||
|
def check_config(config):
|
||||||
|
mail_domain = config.mail_domain
|
||||||
|
if mail_domain != "testrun.org" and not mail_domain.endswith(".testrun.org"):
|
||||||
|
blocked_words = "merlinux schmieder testrun.org".split()
|
||||||
|
for key in config.__dict__:
|
||||||
|
value = config.__dict__[key]
|
||||||
|
if key.startswith("privacy") and any(
|
||||||
|
x in str(value) for x in blocked_words
|
||||||
|
):
|
||||||
|
raise ValueError(
|
||||||
|
f"please set your own privacy contacts/addresses in {config._inipath}"
|
||||||
|
)
|
||||||
|
return config
|
||||||
|
|
||||||
|
|
||||||
|
def deploy_mtail(config):
|
||||||
|
apt.packages(
|
||||||
|
name="Install mtail",
|
||||||
|
packages=["mtail"],
|
||||||
|
)
|
||||||
|
|
||||||
|
# Using our own systemd unit instead of `/usr/lib/systemd/system/mtail.service`.
|
||||||
|
# This allows to read from journalctl instead of log files.
|
||||||
|
files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("mtail/mtail.service.j2"),
|
||||||
|
dest="/etc/systemd/system/mtail.service",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
address=config.mtail_address or "127.0.0.1",
|
||||||
|
port=3903,
|
||||||
|
)
|
||||||
|
|
||||||
|
mtail_conf = files.put(
|
||||||
|
name="Mtail configuration",
|
||||||
|
src=importlib.resources.files(__package__).joinpath(
|
||||||
|
"mtail/delivered_mail.mtail"
|
||||||
|
),
|
||||||
|
dest="/etc/mtail/delivered_mail.mtail",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="Start and enable mtail",
|
||||||
|
service="mtail.service",
|
||||||
|
running=bool(config.mtail_address),
|
||||||
|
enabled=bool(config.mtail_address),
|
||||||
|
restarted=mtail_conf.changed,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def deploy_iroh_relay(config) -> None:
|
||||||
|
(url, sha256sum) = {
|
||||||
|
"x86_64": (
|
||||||
|
"https://github.com/n0-computer/iroh/releases/download/v0.28.1/iroh-relay-v0.28.1-x86_64-unknown-linux-musl.tar.gz",
|
||||||
|
"2ffacf7c0622c26b67a5895ee8e07388769599f60e5f52a3bd40a3258db89b2c",
|
||||||
|
),
|
||||||
|
"aarch64": (
|
||||||
|
"https://github.com/n0-computer/iroh/releases/download/v0.28.1/iroh-relay-v0.28.1-aarch64-unknown-linux-musl.tar.gz",
|
||||||
|
"b915037bcc1ff1110cc9fcb5de4a17c00ff576fd2f568cd339b3b2d54c420dc4",
|
||||||
|
),
|
||||||
|
}[host.get_fact(facts.server.Arch)]
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install curl",
|
||||||
|
packages=["curl"],
|
||||||
|
)
|
||||||
|
|
||||||
|
server.shell(
|
||||||
|
name="Download iroh-relay",
|
||||||
|
commands=[
|
||||||
|
f"(echo '{sha256sum} /usr/local/bin/iroh-relay' | sha256sum -c) || (curl -L {url} | gunzip | tar -x -f - ./iroh-relay -O >/usr/local/bin/iroh-relay.new && mv /usr/local/bin/iroh-relay.new /usr/local/bin/iroh-relay)",
|
||||||
|
"chmod 755 /usr/local/bin/iroh-relay",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
need_restart = False
|
||||||
|
|
||||||
|
systemd_unit = files.put(
|
||||||
|
name="Upload iroh-relay systemd unit",
|
||||||
|
src=importlib.resources.files(__package__).joinpath("iroh-relay.service"),
|
||||||
|
dest="/etc/systemd/system/iroh-relay.service",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= systemd_unit.changed
|
||||||
|
|
||||||
|
iroh_config = files.put(
|
||||||
|
name="Upload iroh-relay config",
|
||||||
|
src=importlib.resources.files(__package__).joinpath("iroh-relay.toml"),
|
||||||
|
dest="/etc/iroh-relay.toml",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
need_restart |= iroh_config.changed
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="Start and enable iroh-relay",
|
||||||
|
service="iroh-relay.service",
|
||||||
|
running=True,
|
||||||
|
enabled=config.enable_iroh_relay,
|
||||||
|
restarted=need_restart,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def deploy_chatmail(config_path: Path, disable_mail: bool) -> None:
|
||||||
|
"""Deploy a chat-mail instance.
|
||||||
|
|
||||||
|
:param config_path: path to chatmail.ini
|
||||||
|
:param disable_mail: whether to disable postfix & dovecot
|
||||||
|
"""
|
||||||
|
config = read_config(config_path)
|
||||||
|
check_config(config)
|
||||||
|
mail_domain = config.mail_domain
|
||||||
|
|
||||||
|
from .www import build_webpages
|
||||||
|
|
||||||
|
server.group(name="Create vmail group", group="vmail", system=True)
|
||||||
|
server.user(name="Create vmail user", user="vmail", group="vmail", system=True)
|
||||||
|
server.group(name="Create opendkim group", group="opendkim", system=True)
|
||||||
|
server.user(
|
||||||
|
name="Create opendkim user",
|
||||||
|
user="opendkim",
|
||||||
|
groups=["opendkim"],
|
||||||
|
system=True,
|
||||||
|
)
|
||||||
|
server.user(
|
||||||
|
name="Add postfix user to opendkim group for socket access",
|
||||||
|
user="postfix",
|
||||||
|
groups=["opendkim"],
|
||||||
|
system=True,
|
||||||
|
)
|
||||||
|
server.user(name="Create echobot user", user="echobot", system=True)
|
||||||
|
server.user(name="Create iroh user", user="iroh", system=True)
|
||||||
|
|
||||||
|
# Add our OBS repository for dovecot_no_delay
|
||||||
|
files.put(
|
||||||
|
name="Add Deltachat OBS GPG key to apt keyring",
|
||||||
|
src=importlib.resources.files(__package__).joinpath("obs-home-deltachat.gpg"),
|
||||||
|
dest="/etc/apt/keyrings/obs-home-deltachat.gpg",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
|
||||||
|
files.line(
|
||||||
|
name="Add DeltaChat OBS home repository to sources.list",
|
||||||
|
path="/etc/apt/sources.list",
|
||||||
|
line="deb [signed-by=/etc/apt/keyrings/obs-home-deltachat.gpg] https://download.opensuse.org/repositories/home:/deltachat/Debian_12/ ./",
|
||||||
|
escape_regex_characters=True,
|
||||||
|
ensure_newline=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.update(name="apt update", cache_time=24 * 3600)
|
||||||
|
apt.upgrade(name="upgrade apt packages", auto_remove=True)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install rsync",
|
||||||
|
packages=["rsync"],
|
||||||
|
)
|
||||||
|
|
||||||
|
# Run local DNS resolver `unbound`.
|
||||||
|
# `resolvconf` takes care of setting up /etc/resolv.conf
|
||||||
|
# to use 127.0.0.1 as the resolver.
|
||||||
|
apt.packages(
|
||||||
|
name="Install unbound",
|
||||||
|
packages=["unbound", "unbound-anchor", "dnsutils"],
|
||||||
|
)
|
||||||
|
server.shell(
|
||||||
|
name="Generate root keys for validating DNSSEC",
|
||||||
|
commands=[
|
||||||
|
"unbound-anchor -a /var/lib/unbound/root.key || true",
|
||||||
|
"systemctl reset-failed unbound.service",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
systemd.service(
|
||||||
|
name="Start and enable unbound",
|
||||||
|
service="unbound.service",
|
||||||
|
running=True,
|
||||||
|
enabled=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
deploy_iroh_relay(config)
|
||||||
|
|
||||||
|
# Deploy acmetool to have TLS certificates.
|
||||||
|
tls_domains = [mail_domain, f"mta-sts.{mail_domain}", f"www.{mail_domain}"]
|
||||||
|
deploy_acmetool(
|
||||||
|
domains=tls_domains,
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
# required for setfacl for echobot
|
||||||
|
name="Install acl",
|
||||||
|
packages="acl",
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install Postfix",
|
||||||
|
packages="postfix",
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install Dovecot",
|
||||||
|
packages=["dovecot-imapd", "dovecot-lmtpd"],
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install nginx",
|
||||||
|
packages=["nginx", "libnginx-mod-stream"],
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Install fcgiwrap",
|
||||||
|
packages=["fcgiwrap"],
|
||||||
|
)
|
||||||
|
|
||||||
|
www_path = importlib.resources.files(__package__).joinpath("../../../www").resolve()
|
||||||
|
|
||||||
|
build_dir = www_path.joinpath("build")
|
||||||
|
src_dir = www_path.joinpath("src")
|
||||||
|
build_webpages(src_dir, build_dir, config)
|
||||||
|
files.rsync(f"{build_dir}/", "/var/www/html", flags=["-avz"])
|
||||||
|
|
||||||
|
_install_remote_venv_with_chatmaild(config)
|
||||||
|
debug = False
|
||||||
|
dovecot_need_restart = _configure_dovecot(config, debug=debug)
|
||||||
|
postfix_need_restart = _configure_postfix(config, debug=debug)
|
||||||
|
nginx_need_restart = _configure_nginx(config)
|
||||||
|
_uninstall_mta_sts_daemon()
|
||||||
|
|
||||||
|
_remove_rspamd()
|
||||||
|
opendkim_need_restart = _configure_opendkim(mail_domain, "opendkim")
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="Start and enable OpenDKIM",
|
||||||
|
service="opendkim.service",
|
||||||
|
running=True,
|
||||||
|
enabled=True,
|
||||||
|
daemon_reload=opendkim_need_restart,
|
||||||
|
restarted=opendkim_need_restart,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Dovecot should be started before Postfix
|
||||||
|
# because it creates authentication socket
|
||||||
|
# required by Postfix.
|
||||||
|
systemd.service(
|
||||||
|
name="disable dovecot for now" if disable_mail else "Start and enable Dovecot",
|
||||||
|
service="dovecot.service",
|
||||||
|
running=False if disable_mail else True,
|
||||||
|
enabled=False if disable_mail else True,
|
||||||
|
restarted=dovecot_need_restart if not disable_mail else False,
|
||||||
|
)
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="disable postfix for now" if disable_mail else "Start and enable Postfix",
|
||||||
|
service="postfix.service",
|
||||||
|
running=False if disable_mail else True,
|
||||||
|
enabled=False if disable_mail else True,
|
||||||
|
restarted=postfix_need_restart if not disable_mail else False,
|
||||||
|
)
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="Start and enable nginx",
|
||||||
|
service="nginx.service",
|
||||||
|
running=True,
|
||||||
|
enabled=True,
|
||||||
|
restarted=nginx_need_restart,
|
||||||
|
)
|
||||||
|
|
||||||
|
# This file is used by auth proxy.
|
||||||
|
# https://wiki.debian.org/EtcMailName
|
||||||
|
server.shell(
|
||||||
|
name="Setup /etc/mailname",
|
||||||
|
commands=[f"echo {mail_domain} >/etc/mailname; chmod 644 /etc/mailname"],
|
||||||
|
)
|
||||||
|
|
||||||
|
journald_conf = files.put(
|
||||||
|
name="Configure journald",
|
||||||
|
src=importlib.resources.files(__package__).joinpath("journald.conf"),
|
||||||
|
dest="/etc/systemd/journald.conf",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
systemd.service(
|
||||||
|
name="Start and enable journald",
|
||||||
|
service="systemd-journald.service",
|
||||||
|
running=True,
|
||||||
|
enabled=True,
|
||||||
|
restarted=journald_conf.changed,
|
||||||
|
)
|
||||||
|
files.directory(
|
||||||
|
name="Ensure old logs on disk are deleted",
|
||||||
|
path="/var/log/journal/",
|
||||||
|
present=False,
|
||||||
|
)
|
||||||
|
|
||||||
|
apt.packages(
|
||||||
|
name="Ensure cron is installed",
|
||||||
|
packages=["cron"],
|
||||||
|
)
|
||||||
|
|
||||||
|
deploy_mtail(config)
|
||||||
75
cmdeploy/src/cmdeploy/acmetool/__init__.py
Normal file
75
cmdeploy/src/cmdeploy/acmetool/__init__.py
Normal file
@@ -0,0 +1,75 @@
|
|||||||
|
import importlib.resources
|
||||||
|
|
||||||
|
from pyinfra import host
|
||||||
|
from pyinfra.facts.systemd import SystemdStatus
|
||||||
|
from pyinfra.operations import apt, files, server, systemd
|
||||||
|
|
||||||
|
|
||||||
|
def deploy_acmetool(email="", domains=[]):
|
||||||
|
"""Deploy acmetool."""
|
||||||
|
apt.packages(
|
||||||
|
name="Install acmetool",
|
||||||
|
packages=["acmetool"],
|
||||||
|
)
|
||||||
|
|
||||||
|
files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("acmetool.cron").open("rb"),
|
||||||
|
dest="/etc/cron.d/acmetool",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
|
||||||
|
files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("acmetool.hook").open("rb"),
|
||||||
|
dest="/usr/lib/acme/hooks/nginx",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="744",
|
||||||
|
)
|
||||||
|
|
||||||
|
files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("response-file.yaml.j2"),
|
||||||
|
dest="/var/lib/acme/conf/responses",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
email=email,
|
||||||
|
)
|
||||||
|
|
||||||
|
files.template(
|
||||||
|
src=importlib.resources.files(__package__).joinpath("target.yaml.j2"),
|
||||||
|
dest="/var/lib/acme/conf/target",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
|
||||||
|
service_file = files.put(
|
||||||
|
src=importlib.resources.files(__package__).joinpath(
|
||||||
|
"acmetool-redirector.service"
|
||||||
|
),
|
||||||
|
dest="/etc/systemd/system/acmetool-redirector.service",
|
||||||
|
user="root",
|
||||||
|
group="root",
|
||||||
|
mode="644",
|
||||||
|
)
|
||||||
|
if host.get_fact(SystemdStatus).get("nginx.service"):
|
||||||
|
systemd.service(
|
||||||
|
name="Stop nginx service to free port 80",
|
||||||
|
service="nginx",
|
||||||
|
running=False,
|
||||||
|
)
|
||||||
|
|
||||||
|
systemd.service(
|
||||||
|
name="Setup acmetool-redirector service",
|
||||||
|
service="acmetool-redirector.service",
|
||||||
|
running=True,
|
||||||
|
enabled=True,
|
||||||
|
restarted=service_file.changed,
|
||||||
|
)
|
||||||
|
|
||||||
|
server.shell(
|
||||||
|
name=f"Request certificate for: {', '.join(domains)}",
|
||||||
|
commands=[f"acmetool want --xlog.severity=debug {' '.join(domains)}"],
|
||||||
|
)
|
||||||
4
cmdeploy/src/cmdeploy/acmetool/acmetool.cron
Normal file
4
cmdeploy/src/cmdeploy/acmetool/acmetool.cron
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
SHELL=/bin/sh
|
||||||
|
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin
|
||||||
|
MAILTO=root
|
||||||
|
20 16 * * * root /usr/bin/acmetool --batch reconcile && systemctl reload dovecot && systemctl reload postfix && systemctl reload nginx
|
||||||
@@ -3,3 +3,5 @@ set -e
|
|||||||
EVENT_NAME="$1"
|
EVENT_NAME="$1"
|
||||||
[ "$EVENT_NAME" = "live-updated" ] || exit 42
|
[ "$EVENT_NAME" = "live-updated" ] || exit 42
|
||||||
systemctl restart nginx.service
|
systemctl restart nginx.service
|
||||||
|
systemctl reload dovecot.service
|
||||||
|
systemctl reload postfix.service
|
||||||
2
cmdeploy/src/cmdeploy/acmetool/response-file.yaml.j2
Normal file
2
cmdeploy/src/cmdeploy/acmetool/response-file.yaml.j2
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
"acme-enter-email": "{{ email }}"
|
||||||
|
"acme-agreement:https://letsencrypt.org/documents/LE-SA-v1.5-February-24-2025.pdf": true
|
||||||
7
cmdeploy/src/cmdeploy/acmetool/target.yaml.j2
Normal file
7
cmdeploy/src/cmdeploy/acmetool/target.yaml.j2
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
request:
|
||||||
|
provider: https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
key:
|
||||||
|
type: rsa
|
||||||
|
challenge:
|
||||||
|
webroot-paths:
|
||||||
|
- /var/www/html/.well-known/acme-challenge
|
||||||
30
cmdeploy/src/cmdeploy/chatmail.zone.j2
Normal file
30
cmdeploy/src/cmdeploy/chatmail.zone.j2
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
;
|
||||||
|
; Required DNS entries for chatmail servers
|
||||||
|
;
|
||||||
|
{% if A %}
|
||||||
|
{{ mail_domain }}. A {{ A }}
|
||||||
|
{% endif %}
|
||||||
|
{% if AAAA %}
|
||||||
|
{{ mail_domain }}. AAAA {{ AAAA }}
|
||||||
|
{% endif %}
|
||||||
|
{{ mail_domain }}. MX 10 {{ mail_domain }}.
|
||||||
|
_mta-sts.{{ mail_domain }}. TXT "v=STSv1; id={{ sts_id }}"
|
||||||
|
mta-sts.{{ mail_domain }}. CNAME {{ mail_domain }}.
|
||||||
|
www.{{ mail_domain }}. CNAME {{ mail_domain }}.
|
||||||
|
{{ dkim_entry }}
|
||||||
|
|
||||||
|
;
|
||||||
|
; Recommended DNS entries for interoperability and security-hardening
|
||||||
|
;
|
||||||
|
{{ mail_domain }}. TXT "v=spf1 a ~all"
|
||||||
|
_dmarc.{{ mail_domain }}. TXT "v=DMARC1;p=reject;adkim=s;aspf=s"
|
||||||
|
|
||||||
|
{% if acme_account_url %}
|
||||||
|
{{ mail_domain }}. CAA 0 issue "letsencrypt.org;accounturi={{ acme_account_url }}"
|
||||||
|
{% endif %}
|
||||||
|
_adsp._domainkey.{{ mail_domain }}. TXT "dkim=discardable"
|
||||||
|
|
||||||
|
_submission._tcp.{{ mail_domain }}. SRV 0 1 587 {{ mail_domain }}.
|
||||||
|
_submissions._tcp.{{ mail_domain }}. SRV 0 1 465 {{ mail_domain }}.
|
||||||
|
_imap._tcp.{{ mail_domain }}. SRV 0 1 143 {{ mail_domain }}.
|
||||||
|
_imaps._tcp.{{ mail_domain }}. SRV 0 1 993 {{ mail_domain }}.
|
||||||
358
cmdeploy/src/cmdeploy/cmdeploy.py
Normal file
358
cmdeploy/src/cmdeploy/cmdeploy.py
Normal file
@@ -0,0 +1,358 @@
|
|||||||
|
"""
|
||||||
|
Provides the `cmdeploy` entry point function,
|
||||||
|
along with command line option and subcommand parsing.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
import importlib.resources
|
||||||
|
import importlib.util
|
||||||
|
import os
|
||||||
|
import pathlib
|
||||||
|
import shutil
|
||||||
|
import subprocess
|
||||||
|
import sys
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
import pyinfra
|
||||||
|
from chatmaild.config import read_config, write_initial_config
|
||||||
|
from packaging import version
|
||||||
|
from termcolor import colored
|
||||||
|
|
||||||
|
from . import dns, remote
|
||||||
|
from .sshexec import SSHExec
|
||||||
|
|
||||||
|
#
|
||||||
|
# cmdeploy sub commands and options
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
def init_cmd_options(parser):
|
||||||
|
parser.add_argument(
|
||||||
|
"chatmail_domain",
|
||||||
|
action="store",
|
||||||
|
help="fully qualified DNS domain name for your chatmail instance",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def init_cmd(args, out):
|
||||||
|
"""Initialize chatmail config file."""
|
||||||
|
mail_domain = args.chatmail_domain
|
||||||
|
if args.inipath.exists():
|
||||||
|
print(f"Path exists, not modifying: {args.inipath}")
|
||||||
|
return 1
|
||||||
|
else:
|
||||||
|
write_initial_config(args.inipath, mail_domain, overrides={})
|
||||||
|
out.green(f"created config file for {mail_domain} in {args.inipath}")
|
||||||
|
|
||||||
|
|
||||||
|
def run_cmd_options(parser):
|
||||||
|
parser.add_argument(
|
||||||
|
"--dry-run",
|
||||||
|
dest="dry_run",
|
||||||
|
action="store_true",
|
||||||
|
help="don't actually modify the server",
|
||||||
|
)
|
||||||
|
parser.add_argument(
|
||||||
|
"--disable-mail",
|
||||||
|
dest="disable_mail",
|
||||||
|
action="store_true",
|
||||||
|
help="install/upgrade the server, but disable postfix & dovecot for now",
|
||||||
|
)
|
||||||
|
parser.add_argument(
|
||||||
|
"--ssh-host",
|
||||||
|
dest="ssh_host",
|
||||||
|
help="specify an SSH host to deploy to; uses mail_domain from chatmail.ini by default",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def run_cmd(args, out):
|
||||||
|
"""Deploy chatmail services on the remote server."""
|
||||||
|
|
||||||
|
sshexec = args.get_sshexec()
|
||||||
|
require_iroh = args.config.enable_iroh_relay
|
||||||
|
remote_data = dns.get_initial_remote_data(sshexec, args.config.mail_domain)
|
||||||
|
if not dns.check_initial_remote_data(remote_data, print=out.red):
|
||||||
|
return 1
|
||||||
|
|
||||||
|
env = os.environ.copy()
|
||||||
|
env["CHATMAIL_INI"] = args.inipath
|
||||||
|
env["CHATMAIL_DISABLE_MAIL"] = "True" if args.disable_mail else ""
|
||||||
|
env["CHATMAIL_REQUIRE_IROH"] = "True" if require_iroh else ""
|
||||||
|
deploy_path = importlib.resources.files(__package__).joinpath("deploy.py").resolve()
|
||||||
|
pyinf = "pyinfra --dry" if args.dry_run else "pyinfra"
|
||||||
|
ssh_host = args.config.mail_domain if not args.ssh_host else args.ssh_host
|
||||||
|
cmd = f"{pyinf} --ssh-user root {ssh_host} {deploy_path} -y"
|
||||||
|
if version.parse(pyinfra.__version__) < version.parse("3"):
|
||||||
|
out.red("Please re-run scripts/initenv.sh to update pyinfra to version 3.")
|
||||||
|
return 1
|
||||||
|
|
||||||
|
retcode = out.check_call(cmd, env=env)
|
||||||
|
if retcode == 0:
|
||||||
|
out.green("Deploy completed, call `cmdeploy dns` next.")
|
||||||
|
elif not remote_data["acme_account_url"]:
|
||||||
|
out.red("Deploy completed but letsencrypt not configured")
|
||||||
|
out.red("Run 'cmdeploy run' again")
|
||||||
|
retcode = 0
|
||||||
|
else:
|
||||||
|
out.red("Deploy failed")
|
||||||
|
return retcode
|
||||||
|
|
||||||
|
|
||||||
|
def dns_cmd_options(parser):
|
||||||
|
parser.add_argument(
|
||||||
|
"--zonefile",
|
||||||
|
dest="zonefile",
|
||||||
|
type=pathlib.Path,
|
||||||
|
default=None,
|
||||||
|
help="write out a zonefile",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def dns_cmd(args, out):
|
||||||
|
"""Check DNS entries and optionally generate dns zone file."""
|
||||||
|
sshexec = args.get_sshexec()
|
||||||
|
remote_data = dns.get_initial_remote_data(sshexec, args.config.mail_domain)
|
||||||
|
if not remote_data:
|
||||||
|
return 1
|
||||||
|
|
||||||
|
if not remote_data["acme_account_url"]:
|
||||||
|
out.red("could not get letsencrypt account url, please run 'cmdeploy run'")
|
||||||
|
return 1
|
||||||
|
|
||||||
|
if not remote_data["dkim_entry"]:
|
||||||
|
out.red("could not determine dkim_entry, please run 'cmdeploy run'")
|
||||||
|
return 1
|
||||||
|
|
||||||
|
zonefile = dns.get_filled_zone_file(remote_data)
|
||||||
|
|
||||||
|
if args.zonefile:
|
||||||
|
args.zonefile.write_text(zonefile)
|
||||||
|
out.green(f"DNS records successfully written to: {args.zonefile}")
|
||||||
|
return 0
|
||||||
|
|
||||||
|
retcode = dns.check_full_zone(
|
||||||
|
sshexec, remote_data=remote_data, zonefile=zonefile, out=out
|
||||||
|
)
|
||||||
|
return retcode
|
||||||
|
|
||||||
|
|
||||||
|
def status_cmd(args, out):
|
||||||
|
"""Display status for online chatmail instance."""
|
||||||
|
|
||||||
|
sshexec = args.get_sshexec()
|
||||||
|
|
||||||
|
out.green(f"chatmail domain: {args.config.mail_domain}")
|
||||||
|
if args.config.privacy_mail:
|
||||||
|
out.green("privacy settings: present")
|
||||||
|
else:
|
||||||
|
out.red("no privacy settings")
|
||||||
|
|
||||||
|
for line in sshexec(remote.rshell.get_systemd_running):
|
||||||
|
print(line)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cmd_options(parser):
|
||||||
|
parser.add_argument(
|
||||||
|
"--slow",
|
||||||
|
dest="slow",
|
||||||
|
action="store_true",
|
||||||
|
help="also run slow tests",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def test_cmd(args, out):
|
||||||
|
"""Run local and online tests for chatmail deployment.
|
||||||
|
|
||||||
|
This will automatically pip-install 'deltachat' if it's not available.
|
||||||
|
"""
|
||||||
|
|
||||||
|
x = importlib.util.find_spec("deltachat")
|
||||||
|
if x is None:
|
||||||
|
out.check_call(f"{sys.executable} -m pip install deltachat")
|
||||||
|
|
||||||
|
pytest_path = shutil.which("pytest")
|
||||||
|
pytest_args = [
|
||||||
|
pytest_path,
|
||||||
|
"cmdeploy/src/",
|
||||||
|
"-n4",
|
||||||
|
"-rs",
|
||||||
|
"-x",
|
||||||
|
"-v",
|
||||||
|
"--durations=5",
|
||||||
|
]
|
||||||
|
if args.slow:
|
||||||
|
pytest_args.append("--slow")
|
||||||
|
ret = out.run_ret(pytest_args)
|
||||||
|
return ret
|
||||||
|
|
||||||
|
|
||||||
|
def fmt_cmd_options(parser):
|
||||||
|
parser.add_argument(
|
||||||
|
"--check",
|
||||||
|
"-c",
|
||||||
|
action="store_true",
|
||||||
|
help="only check but don't fix problems",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def fmt_cmd(args, out):
|
||||||
|
"""Run formattting fixes on all chatmail source code."""
|
||||||
|
|
||||||
|
sources = [str(importlib.resources.files(x)) for x in ("chatmaild", "cmdeploy")]
|
||||||
|
format_args = [shutil.which("ruff"), "format"]
|
||||||
|
check_args = [shutil.which("ruff"), "check"]
|
||||||
|
|
||||||
|
if args.check:
|
||||||
|
format_args.append("--diff")
|
||||||
|
else:
|
||||||
|
check_args.append("--fix")
|
||||||
|
|
||||||
|
if not args.verbose:
|
||||||
|
check_args.append("--quiet")
|
||||||
|
format_args.append("--quiet")
|
||||||
|
|
||||||
|
format_args.extend(sources)
|
||||||
|
check_args.extend(sources)
|
||||||
|
|
||||||
|
out.check_call(" ".join(format_args), quiet=not args.verbose)
|
||||||
|
out.check_call(" ".join(check_args), quiet=not args.verbose)
|
||||||
|
|
||||||
|
|
||||||
|
def bench_cmd(args, out):
|
||||||
|
"""Run benchmarks against an online chatmail instance."""
|
||||||
|
args = ["pytest", "--pyargs", "cmdeploy.tests.online.benchmark", "-vrx"]
|
||||||
|
cmdstring = " ".join(args)
|
||||||
|
out.green(f"[$ {cmdstring}]")
|
||||||
|
subprocess.check_call(args)
|
||||||
|
|
||||||
|
|
||||||
|
def webdev_cmd(args, out):
|
||||||
|
"""Run local web development loop for static web pages."""
|
||||||
|
from .www import main
|
||||||
|
|
||||||
|
main()
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Parsing command line options and starting commands
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
class Out:
|
||||||
|
"""Convenience output printer providing coloring."""
|
||||||
|
|
||||||
|
def red(self, msg, file=sys.stderr):
|
||||||
|
print(colored(msg, "red"), file=file)
|
||||||
|
|
||||||
|
def green(self, msg, file=sys.stderr):
|
||||||
|
print(colored(msg, "green"), file=file)
|
||||||
|
|
||||||
|
def __call__(self, msg, red=False, green=False, file=sys.stdout):
|
||||||
|
color = "red" if red else ("green" if green else None)
|
||||||
|
print(colored(msg, color), file=file)
|
||||||
|
|
||||||
|
def check_call(self, arg, env=None, quiet=False):
|
||||||
|
if not quiet:
|
||||||
|
self(f"[$ {arg}]", file=sys.stderr)
|
||||||
|
return subprocess.check_call(arg, shell=True, env=env)
|
||||||
|
|
||||||
|
def run_ret(self, args, env=None, quiet=False):
|
||||||
|
if not quiet:
|
||||||
|
cmdstring = " ".join(args)
|
||||||
|
self(f"[$ {cmdstring}]", file=sys.stderr)
|
||||||
|
proc = subprocess.run(args, env=env, check=False)
|
||||||
|
return proc.returncode
|
||||||
|
|
||||||
|
|
||||||
|
def add_config_option(parser):
|
||||||
|
parser.add_argument(
|
||||||
|
"--config",
|
||||||
|
dest="inipath",
|
||||||
|
action="store",
|
||||||
|
default=Path("chatmail.ini"),
|
||||||
|
type=Path,
|
||||||
|
help="path to the chatmail.ini file",
|
||||||
|
)
|
||||||
|
parser.add_argument(
|
||||||
|
"--verbose",
|
||||||
|
"-v",
|
||||||
|
dest="verbose",
|
||||||
|
action="store_true",
|
||||||
|
default=False,
|
||||||
|
help="provide verbose logging",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def add_subcommand(subparsers, func):
|
||||||
|
name = func.__name__
|
||||||
|
assert name.endswith("_cmd")
|
||||||
|
name = name[:-4]
|
||||||
|
doc = func.__doc__.strip()
|
||||||
|
help = doc.split("\n")[0].strip(".")
|
||||||
|
p = subparsers.add_parser(name, description=doc, help=help)
|
||||||
|
p.set_defaults(func=func)
|
||||||
|
add_config_option(p)
|
||||||
|
return p
|
||||||
|
|
||||||
|
|
||||||
|
description = """
|
||||||
|
Setup your chatmail server configuration and
|
||||||
|
deploy it via SSH to your remote location.
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
def get_parser():
|
||||||
|
"""Return an ArgumentParser for the 'cmdeploy' CLI"""
|
||||||
|
|
||||||
|
parser = argparse.ArgumentParser(description=description.strip())
|
||||||
|
subparsers = parser.add_subparsers(title="subcommands")
|
||||||
|
|
||||||
|
# find all subcommands in the module namespace
|
||||||
|
glob = globals()
|
||||||
|
for name, func in glob.items():
|
||||||
|
if name.endswith("_cmd"):
|
||||||
|
subparser = add_subcommand(subparsers, func)
|
||||||
|
addopts = glob.get(name + "_options")
|
||||||
|
if addopts is not None:
|
||||||
|
addopts(subparser)
|
||||||
|
|
||||||
|
return parser
|
||||||
|
|
||||||
|
|
||||||
|
def main(args=None):
|
||||||
|
"""Provide main entry point for 'cmdeploy' CLI invocation."""
|
||||||
|
parser = get_parser()
|
||||||
|
args = parser.parse_args(args=args)
|
||||||
|
if not hasattr(args, "func"):
|
||||||
|
return parser.parse_args(["-h"])
|
||||||
|
|
||||||
|
def get_sshexec():
|
||||||
|
print(f"[ssh] login to {args.config.mail_domain}")
|
||||||
|
return SSHExec(args.config.mail_domain, verbose=args.verbose)
|
||||||
|
|
||||||
|
args.get_sshexec = get_sshexec
|
||||||
|
|
||||||
|
out = Out()
|
||||||
|
kwargs = {}
|
||||||
|
if args.func.__name__ not in ("init_cmd", "fmt_cmd"):
|
||||||
|
if not args.inipath.exists():
|
||||||
|
out.red(f"expecting {args.inipath} to exist, run init first?")
|
||||||
|
raise SystemExit(1)
|
||||||
|
try:
|
||||||
|
args.config = read_config(args.inipath)
|
||||||
|
except Exception as ex:
|
||||||
|
out.red(ex)
|
||||||
|
raise SystemExit(1)
|
||||||
|
|
||||||
|
try:
|
||||||
|
res = args.func(args, out, **kwargs)
|
||||||
|
if res is None:
|
||||||
|
res = 0
|
||||||
|
return res
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
out.red("KeyboardInterrupt")
|
||||||
|
sys.exit(130)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
||||||
BIN
cmdeploy/src/cmdeploy/data/delta-chat-bw.png
Normal file
BIN
cmdeploy/src/cmdeploy/data/delta-chat-bw.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 13 KiB |
BIN
cmdeploy/src/cmdeploy/data/opensans-regular.ttf
Normal file
BIN
cmdeploy/src/cmdeploy/data/opensans-regular.ttf
Normal file
Binary file not shown.
20
cmdeploy/src/cmdeploy/deploy.py
Normal file
20
cmdeploy/src/cmdeploy/deploy.py
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
import importlib.resources
|
||||||
|
import os
|
||||||
|
|
||||||
|
import pyinfra
|
||||||
|
|
||||||
|
from cmdeploy import deploy_chatmail
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
config_path = os.getenv(
|
||||||
|
"CHATMAIL_INI",
|
||||||
|
importlib.resources.files("cmdeploy").joinpath("../../../chatmail.ini"),
|
||||||
|
)
|
||||||
|
disable_mail = bool(os.environ.get("CHATMAIL_DISABLE_MAIL"))
|
||||||
|
|
||||||
|
deploy_chatmail(config_path, disable_mail)
|
||||||
|
|
||||||
|
|
||||||
|
if pyinfra.is_cli:
|
||||||
|
main()
|
||||||
71
cmdeploy/src/cmdeploy/dns.py
Normal file
71
cmdeploy/src/cmdeploy/dns.py
Normal file
@@ -0,0 +1,71 @@
|
|||||||
|
import datetime
|
||||||
|
import importlib
|
||||||
|
|
||||||
|
from jinja2 import Template
|
||||||
|
|
||||||
|
from . import remote
|
||||||
|
|
||||||
|
|
||||||
|
def get_initial_remote_data(sshexec, mail_domain):
|
||||||
|
return sshexec.logged(
|
||||||
|
call=remote.rdns.perform_initial_checks, kwargs=dict(mail_domain=mail_domain)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def check_initial_remote_data(remote_data, *, print=print):
|
||||||
|
mail_domain = remote_data["mail_domain"]
|
||||||
|
if not remote_data["A"] and not remote_data["AAAA"]:
|
||||||
|
print(f"Missing A and/or AAAA DNS records for {mail_domain}!")
|
||||||
|
elif remote_data["MTA_STS"] != f"{mail_domain}.":
|
||||||
|
print("Missing MTA-STS CNAME record:")
|
||||||
|
print(f"mta-sts.{mail_domain}. CNAME {mail_domain}.")
|
||||||
|
elif remote_data["WWW"] != f"{mail_domain}.":
|
||||||
|
print("Missing www CNAME record:")
|
||||||
|
print(f"www.{mail_domain}. CNAME {mail_domain}.")
|
||||||
|
else:
|
||||||
|
return remote_data
|
||||||
|
|
||||||
|
|
||||||
|
def get_filled_zone_file(remote_data):
|
||||||
|
sts_id = remote_data.get("sts_id")
|
||||||
|
if not sts_id:
|
||||||
|
remote_data["sts_id"] = datetime.datetime.now().strftime("%Y%m%d%H%M")
|
||||||
|
|
||||||
|
template = importlib.resources.files(__package__).joinpath("chatmail.zone.j2")
|
||||||
|
content = template.read_text()
|
||||||
|
zonefile = Template(content).render(**remote_data)
|
||||||
|
lines = [x.strip() for x in zonefile.split("\n") if x.strip()]
|
||||||
|
lines.append("")
|
||||||
|
zonefile = "\n".join(lines)
|
||||||
|
return zonefile
|
||||||
|
|
||||||
|
|
||||||
|
def check_full_zone(sshexec, remote_data, out, zonefile) -> int:
|
||||||
|
"""Check existing DNS records, optionally write them to zone file
|
||||||
|
and return (exitcode, remote_data) tuple."""
|
||||||
|
|
||||||
|
required_diff, recommended_diff = sshexec.logged(
|
||||||
|
remote.rdns.check_zonefile,
|
||||||
|
kwargs=dict(zonefile=zonefile, mail_domain=remote_data["mail_domain"]),
|
||||||
|
)
|
||||||
|
|
||||||
|
returncode = 0
|
||||||
|
if required_diff:
|
||||||
|
out.red("Please set required DNS entries at your DNS provider:\n")
|
||||||
|
for line in required_diff:
|
||||||
|
out(line)
|
||||||
|
out("")
|
||||||
|
returncode = 1
|
||||||
|
if remote_data.get("dkim_entry") in required_diff:
|
||||||
|
out(
|
||||||
|
"If the DKIM entry above does not work with your DNS provider, you can try this one:\n"
|
||||||
|
)
|
||||||
|
out(remote_data.get("web_dkim_entry") + "\n")
|
||||||
|
if recommended_diff:
|
||||||
|
out("WARNING: these recommended DNS entries are not set:\n")
|
||||||
|
for line in recommended_diff:
|
||||||
|
out(line)
|
||||||
|
|
||||||
|
if not (recommended_diff or required_diff):
|
||||||
|
out.green("Great! All your DNS entries are verified and correct.")
|
||||||
|
return returncode
|
||||||
12
cmdeploy/src/cmdeploy/dovecot/auth.conf
Normal file
12
cmdeploy/src/cmdeploy/dovecot/auth.conf
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
uri = proxy:/run/doveauth/doveauth.socket:auth
|
||||||
|
iterate_disable = no
|
||||||
|
iterate_prefix = userdb/
|
||||||
|
|
||||||
|
default_pass_scheme = plain
|
||||||
|
# %E escapes characters " (double quote), ' (single quote) and \ (backslash) with \ (backslash).
|
||||||
|
# See <https://doc.dovecot.org/configuration_manual/config_file/config_variables/#modifiers>
|
||||||
|
# for documentation.
|
||||||
|
#
|
||||||
|
# We escape user-provided input and use double quote as a separator.
|
||||||
|
password_key = passdb/%Ew"%Eu
|
||||||
|
user_key = userdb/%Eu
|
||||||
234
cmdeploy/src/cmdeploy/dovecot/dovecot.conf.j2
Normal file
234
cmdeploy/src/cmdeploy/dovecot/dovecot.conf.j2
Normal file
@@ -0,0 +1,234 @@
|
|||||||
|
## Dovecot configuration file
|
||||||
|
|
||||||
|
{% if disable_ipv6 %}
|
||||||
|
listen = *
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
protocols = imap lmtp
|
||||||
|
|
||||||
|
auth_mechanisms = plain
|
||||||
|
|
||||||
|
{% if debug == true %}
|
||||||
|
auth_verbose = yes
|
||||||
|
auth_debug = yes
|
||||||
|
auth_debug_passwords = yes
|
||||||
|
auth_verbose_passwords = plain
|
||||||
|
auth_cache_size = 100M
|
||||||
|
mail_debug = yes
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
# Prevent warnings similar to:
|
||||||
|
# config: Warning: service auth { client_limit=1000 } is lower than required under max. load (10200). Counted for protocol services with service_count != 1: service lmtp { process_limit=100 } + service imap-urlauth-login { process_limit=100 } + service imap-login { process_limit=10000 }
|
||||||
|
# config: Warning: service anvil { client_limit=1000 } is lower than required under max. load (10103). Counted with: service imap-urlauth-login { process_limit=100 } + service imap-login { process_limit=10000 } + service auth { process_limit=1 }
|
||||||
|
# master: Warning: service(stats): client_limit (1000) reached, client connections are being dropped
|
||||||
|
default_client_limit = 20000
|
||||||
|
|
||||||
|
# Increase number of logged in IMAP connections.
|
||||||
|
# Each connection is handled by a separate `imap` process.
|
||||||
|
# `imap` process should have `client_limit=1` as described in
|
||||||
|
# <https://doc.dovecot.org/configuration_manual/service_configuration/#service-limits>
|
||||||
|
# so each logged in IMAP session will need its own `imap` process.
|
||||||
|
#
|
||||||
|
# If this limit is reached,
|
||||||
|
# users will fail to LOGIN as `imap-login` process
|
||||||
|
# will accept them logging in but fail to transfer logged in
|
||||||
|
# connection to `imap` process until someone logs out and
|
||||||
|
# the following warning will be logged:
|
||||||
|
# Warning: service(imap): process_limit (1024) reached, client connections are being dropped
|
||||||
|
service imap {
|
||||||
|
process_limit = 50000
|
||||||
|
}
|
||||||
|
|
||||||
|
mail_server_admin = mailto:root@{{ config.mail_domain }}
|
||||||
|
mail_server_comment = Chatmail server
|
||||||
|
|
||||||
|
# `zlib` enables compressing messages stored in the maildir.
|
||||||
|
# See
|
||||||
|
# <https://doc.dovecot.org/configuration_manual/zlib_plugin/>
|
||||||
|
# for documentation.
|
||||||
|
#
|
||||||
|
# quota plugin documentation:
|
||||||
|
# <https://doc.dovecot.org/configuration_manual/quota_plugin/>
|
||||||
|
mail_plugins = zlib quota
|
||||||
|
|
||||||
|
imap_capability = +XDELTAPUSH XCHATMAIL
|
||||||
|
|
||||||
|
|
||||||
|
# Authentication for system users.
|
||||||
|
passdb {
|
||||||
|
driver = dict
|
||||||
|
args = /etc/dovecot/auth.conf
|
||||||
|
}
|
||||||
|
userdb {
|
||||||
|
driver = dict
|
||||||
|
args = /etc/dovecot/auth.conf
|
||||||
|
}
|
||||||
|
##
|
||||||
|
## Mailbox locations and namespaces
|
||||||
|
##
|
||||||
|
|
||||||
|
# Mailboxes are stored in the "mail" directory of the vmail user home.
|
||||||
|
mail_location = maildir:{{ config.mailboxes_dir }}/%u
|
||||||
|
|
||||||
|
namespace inbox {
|
||||||
|
inbox = yes
|
||||||
|
|
||||||
|
mailbox Drafts {
|
||||||
|
special_use = \Drafts
|
||||||
|
}
|
||||||
|
mailbox Junk {
|
||||||
|
special_use = \Junk
|
||||||
|
}
|
||||||
|
mailbox Trash {
|
||||||
|
special_use = \Trash
|
||||||
|
}
|
||||||
|
|
||||||
|
# For \Sent mailboxes there are two widely used names. We'll mark both of
|
||||||
|
# them as \Sent. User typically deletes one of them if duplicates are created.
|
||||||
|
mailbox Sent {
|
||||||
|
special_use = \Sent
|
||||||
|
}
|
||||||
|
mailbox "Sent Messages" {
|
||||||
|
special_use = \Sent
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mail_uid = vmail
|
||||||
|
mail_gid = vmail
|
||||||
|
mail_privileged_group = vmail
|
||||||
|
|
||||||
|
##
|
||||||
|
## Mail processes
|
||||||
|
##
|
||||||
|
|
||||||
|
# Pass all IMAP METADATA requests to the server implementing Dovecot's dict protocol.
|
||||||
|
mail_attribute_dict = proxy:/run/chatmail-metadata/metadata.socket:metadata
|
||||||
|
|
||||||
|
# `imap_zlib` enables IMAP COMPRESS (RFC 4978).
|
||||||
|
# <https://datatracker.ietf.org/doc/html/rfc4978.html>
|
||||||
|
protocol imap {
|
||||||
|
mail_plugins = $mail_plugins imap_zlib imap_quota last_login
|
||||||
|
imap_metadata = yes
|
||||||
|
}
|
||||||
|
|
||||||
|
plugin {
|
||||||
|
last_login_dict = proxy:/run/chatmail-lastlogin/lastlogin.socket:lastlogin
|
||||||
|
#last_login_key = last-login/%u # default
|
||||||
|
last_login_precision = s
|
||||||
|
}
|
||||||
|
|
||||||
|
protocol lmtp {
|
||||||
|
# notify plugin is a dependency of push_notification plugin:
|
||||||
|
# <https://doc.dovecot.org/settings/plugin/notify-plugin/>
|
||||||
|
#
|
||||||
|
# push_notification plugin documentation:
|
||||||
|
# <https://doc.dovecot.org/configuration_manual/push_notification/>
|
||||||
|
#
|
||||||
|
# mail_lua and push_notification_lua are needed for Lua push notification handler.
|
||||||
|
# <https://doc.dovecot.org/configuration_manual/push_notification/#configuration>
|
||||||
|
mail_plugins = $mail_plugins mail_lua notify push_notification push_notification_lua
|
||||||
|
}
|
||||||
|
|
||||||
|
plugin {
|
||||||
|
zlib_save = gz
|
||||||
|
}
|
||||||
|
|
||||||
|
plugin {
|
||||||
|
imap_compress_deflate_level = 6
|
||||||
|
}
|
||||||
|
|
||||||
|
plugin {
|
||||||
|
# for now we define static quota-rules for all users
|
||||||
|
quota = maildir:User quota
|
||||||
|
quota_rule = *:storage={{ config.max_mailbox_size }}
|
||||||
|
quota_max_mail_size={{ config.max_message_size }}
|
||||||
|
quota_grace = 0
|
||||||
|
# quota_over_flag_value = TRUE
|
||||||
|
}
|
||||||
|
|
||||||
|
# push_notification configuration
|
||||||
|
plugin {
|
||||||
|
# <https://doc.dovecot.org/configuration_manual/push_notification/#lua-lua>
|
||||||
|
push_notification_driver = lua:file=/etc/dovecot/push_notification.lua
|
||||||
|
}
|
||||||
|
|
||||||
|
service lmtp {
|
||||||
|
user=vmail
|
||||||
|
|
||||||
|
unix_listener /var/spool/postfix/private/dovecot-lmtp {
|
||||||
|
group = postfix
|
||||||
|
mode = 0600
|
||||||
|
user = postfix
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
service auth {
|
||||||
|
unix_listener /var/spool/postfix/private/auth {
|
||||||
|
mode = 0660
|
||||||
|
user = postfix
|
||||||
|
group = postfix
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
service auth-worker {
|
||||||
|
# Default is root.
|
||||||
|
# Drop privileges we don't need.
|
||||||
|
user = vmail
|
||||||
|
}
|
||||||
|
|
||||||
|
service imap-login {
|
||||||
|
# High-security mode.
|
||||||
|
# Each process serves a single connection and exits afterwards.
|
||||||
|
# This is the default, but we set it explicitly to be sure.
|
||||||
|
# See <https://doc.dovecot.org/admin_manual/login_processes/#high-security-mode> for details.
|
||||||
|
service_count = 1
|
||||||
|
|
||||||
|
# Inrease the number of simultaneous connections.
|
||||||
|
#
|
||||||
|
# As of Dovecot 2.3.19.1 the default is 100 processes.
|
||||||
|
# Combined with `service_count = 1` it means only 100 connections
|
||||||
|
# can be handled simultaneously.
|
||||||
|
process_limit = 10000
|
||||||
|
|
||||||
|
# Avoid startup latency for new connections.
|
||||||
|
process_min_avail = 10
|
||||||
|
}
|
||||||
|
|
||||||
|
service anvil {
|
||||||
|
# We are disabling anvil penalty on failed login attempts
|
||||||
|
# because it can only detect brute forcing by IP address
|
||||||
|
# not by username. As the correct IP address is not handed
|
||||||
|
# to dovecot anyway, it is more of hindrance than of use.
|
||||||
|
# See <https://www.dovecot.org/list/dovecot/2012-May/135485.html> for details.
|
||||||
|
unix_listener anvil-auth-penalty {
|
||||||
|
mode = 0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl = required
|
||||||
|
ssl_cert = </var/lib/acme/live/{{ config.mail_domain }}/fullchain
|
||||||
|
ssl_key = </var/lib/acme/live/{{ config.mail_domain }}/privkey
|
||||||
|
ssl_dh = </usr/share/dovecot/dh.pem
|
||||||
|
ssl_min_protocol = TLSv1.3
|
||||||
|
ssl_prefer_server_ciphers = yes
|
||||||
|
|
||||||
|
|
||||||
|
{% if config.imap_rawlog %}
|
||||||
|
service postlogin {
|
||||||
|
executable = script-login -d rawlog
|
||||||
|
unix_listener postlogin {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
service imap {
|
||||||
|
executable = imap postlogin
|
||||||
|
}
|
||||||
|
|
||||||
|
protocol imap {
|
||||||
|
#rawlog_dir = /tmp/rawlog/%u
|
||||||
|
# Put .in and .out imap protocol logging files into per-user homedir
|
||||||
|
# You can use a command like this to combine into one protocol stream:
|
||||||
|
# sort -sn <(sed 's/ / C: /' *.in) <(sed 's/ / S: /' cat *.out)
|
||||||
|
|
||||||
|
rawlog_dir = %h
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
14
cmdeploy/src/cmdeploy/dovecot/expunge.cron.j2
Normal file
14
cmdeploy/src/cmdeploy/dovecot/expunge.cron.j2
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# delete already seen big mails after 7 days, in the INBOX
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/cur/*' -mtime +7 -size +200k -type f -delete
|
||||||
|
# delete all mails after {{ config.delete_mails_after }} days, in the Inbox
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/cur/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
# or in any IMAP subfolder
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/.*/cur/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
# even if they are unseen
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/new/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/.*/new/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
# or only temporary (but then they shouldn't be around after {{ config.delete_mails_after }} days anyway).
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/tmp/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
2 0 * * * vmail find {{ config.mailboxes_dir }} -path '*/.*/tmp/*' -mtime +{{ config.delete_mails_after }} -type f -delete
|
||||||
|
3 0 * * * vmail find {{ config.mailboxes_dir }} -name 'maildirsize' -type f -delete
|
||||||
|
4 0 * * * vmail /usr/local/lib/chatmaild/venv/bin/delete_inactive_users /usr/local/lib/chatmaild/chatmail.ini
|
||||||
28
cmdeploy/src/cmdeploy/dovecot/push_notification.lua
Normal file
28
cmdeploy/src/cmdeploy/dovecot/push_notification.lua
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
function dovecot_lua_notify_begin_txn(user)
|
||||||
|
return user
|
||||||
|
end
|
||||||
|
|
||||||
|
function contains(v, needle)
|
||||||
|
for _, keyword in ipairs(v) do
|
||||||
|
if keyword == needle then
|
||||||
|
return true
|
||||||
|
end
|
||||||
|
end
|
||||||
|
return false
|
||||||
|
end
|
||||||
|
|
||||||
|
function dovecot_lua_notify_event_message_new(user, event)
|
||||||
|
local mbox = user:mailbox(event.mailbox)
|
||||||
|
mbox:sync()
|
||||||
|
|
||||||
|
if user.username ~= event.from_address then
|
||||||
|
-- Incoming message
|
||||||
|
-- Notify METADATA server about new message.
|
||||||
|
mbox:metadata_set("/private/messagenew", "")
|
||||||
|
end
|
||||||
|
|
||||||
|
mbox:free()
|
||||||
|
end
|
||||||
|
|
||||||
|
function dovecot_lua_notify_end_txn(ctx, success)
|
||||||
|
end
|
||||||
88
cmdeploy/src/cmdeploy/genqr.py
Normal file
88
cmdeploy/src/cmdeploy/genqr.py
Normal file
@@ -0,0 +1,88 @@
|
|||||||
|
import importlib
|
||||||
|
import io
|
||||||
|
import os
|
||||||
|
|
||||||
|
import qrcode
|
||||||
|
from PIL import Image, ImageDraw, ImageFont
|
||||||
|
|
||||||
|
|
||||||
|
def gen_qr_png_data(maildomain):
|
||||||
|
url = f"DCACCOUNT:https://{maildomain}/new"
|
||||||
|
image = gen_qr(maildomain, url)
|
||||||
|
temp = io.BytesIO()
|
||||||
|
image.save(temp, format="png")
|
||||||
|
temp.seek(0)
|
||||||
|
return temp
|
||||||
|
|
||||||
|
|
||||||
|
def gen_qr(maildomain, url):
|
||||||
|
# taken and modified from
|
||||||
|
# https://github.com/deltachat/mailadm/blob/master/src/mailadm/gen_qr.py
|
||||||
|
|
||||||
|
# info = f"{maildomain} invite code"
|
||||||
|
info = ""
|
||||||
|
|
||||||
|
# load QR code
|
||||||
|
qr = qrcode.QRCode(
|
||||||
|
version=1,
|
||||||
|
error_correction=qrcode.constants.ERROR_CORRECT_H,
|
||||||
|
box_size=1,
|
||||||
|
border=1,
|
||||||
|
)
|
||||||
|
qr.add_data(url)
|
||||||
|
qr.make(fit=True)
|
||||||
|
qr_img = qr.make_image(fill_color="black", back_color="white")
|
||||||
|
|
||||||
|
# paint all elements
|
||||||
|
ttf_path = str(
|
||||||
|
importlib.resources.files(__package__).joinpath("data/opensans-regular.ttf")
|
||||||
|
)
|
||||||
|
logo_red_path = str(
|
||||||
|
importlib.resources.files(__package__).joinpath("data/delta-chat-bw.png")
|
||||||
|
)
|
||||||
|
|
||||||
|
assert os.path.exists(ttf_path), ttf_path
|
||||||
|
font_size = 16
|
||||||
|
font = ImageFont.truetype(font=ttf_path, size=font_size)
|
||||||
|
|
||||||
|
num_lines = ((info).count("\n") + 1) if info else 0
|
||||||
|
|
||||||
|
size = width = 384
|
||||||
|
qr_padding = 6
|
||||||
|
text_height = font_size * num_lines
|
||||||
|
height = size + text_height
|
||||||
|
|
||||||
|
image = Image.new("RGBA", (width, height), "white")
|
||||||
|
qr_final_size = width - (qr_padding * 2)
|
||||||
|
|
||||||
|
if num_lines:
|
||||||
|
draw = ImageDraw.Draw(image)
|
||||||
|
|
||||||
|
# draw text
|
||||||
|
if hasattr(font, "getsize"):
|
||||||
|
info_pos = (width - font.getsize(info.strip())[0]) // 2
|
||||||
|
else:
|
||||||
|
info_pos = (width - font.getbbox(info.strip())[3]) // 2
|
||||||
|
|
||||||
|
draw.multiline_text(
|
||||||
|
(info_pos, size - qr_padding // 2),
|
||||||
|
info,
|
||||||
|
font=font,
|
||||||
|
fill="black",
|
||||||
|
align="right",
|
||||||
|
)
|
||||||
|
|
||||||
|
# paste QR code
|
||||||
|
image.paste(
|
||||||
|
qr_img.resize((qr_final_size, qr_final_size), resample=Image.NEAREST),
|
||||||
|
(qr_padding, qr_padding),
|
||||||
|
)
|
||||||
|
|
||||||
|
# background delta logo
|
||||||
|
logo2_img = Image.open(logo_red_path)
|
||||||
|
logo2_width = int(size / 6)
|
||||||
|
logo2 = logo2_img.resize((logo2_width, logo2_width), resample=Image.NEAREST)
|
||||||
|
pos = int((size / 2) - (logo2_width / 2))
|
||||||
|
image.paste(logo2, (pos, pos), mask=logo2)
|
||||||
|
|
||||||
|
return image
|
||||||
12
cmdeploy/src/cmdeploy/iroh-relay.service
Normal file
12
cmdeploy/src/cmdeploy/iroh-relay.service
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Iroh relay
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart=/usr/local/bin/iroh-relay --config-path /etc/iroh-relay.toml
|
||||||
|
Restart=on-failure
|
||||||
|
RestartSec=5s
|
||||||
|
User=iroh
|
||||||
|
Group=iroh
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
5
cmdeploy/src/cmdeploy/iroh-relay.toml
Normal file
5
cmdeploy/src/cmdeploy/iroh-relay.toml
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
enable_relay = true
|
||||||
|
http_bind_addr = "[::]:3340"
|
||||||
|
enable_stun = true
|
||||||
|
enable_metrics = false
|
||||||
|
metrics_bind_addr = "127.0.0.1:9092"
|
||||||
3
cmdeploy/src/cmdeploy/journald.conf
Normal file
3
cmdeploy/src/cmdeploy/journald.conf
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
[Journal]
|
||||||
|
MaxRetentionSec=3d
|
||||||
|
Storage=volatile
|
||||||
1
cmdeploy/src/cmdeploy/metrics.cron.j2
Normal file
1
cmdeploy/src/cmdeploy/metrics.cron.j2
Normal file
@@ -0,0 +1 @@
|
|||||||
|
*/5 * * * * root {{ config.execpath }} {{ config.mailboxes_dir }} >/var/www/html/metrics
|
||||||
64
cmdeploy/src/cmdeploy/mtail/delivered_mail.mtail
Normal file
64
cmdeploy/src/cmdeploy/mtail/delivered_mail.mtail
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
counter delivered_mail
|
||||||
|
/saved mail to INBOX$/ {
|
||||||
|
delivered_mail++
|
||||||
|
}
|
||||||
|
|
||||||
|
counter quota_exceeded
|
||||||
|
/Quota exceeded \(mailbox for user is full\)$/ {
|
||||||
|
quota_exceeded++
|
||||||
|
}
|
||||||
|
|
||||||
|
# Essentially the number of outgoing messages.
|
||||||
|
counter dkim_signed
|
||||||
|
/DKIM-Signature field added/ {
|
||||||
|
dkim_signed++
|
||||||
|
}
|
||||||
|
|
||||||
|
counter created_accounts
|
||||||
|
counter created_ci_accounts
|
||||||
|
counter created_nonci_accounts
|
||||||
|
|
||||||
|
/: Created address: (?P<addr>.*)$/ {
|
||||||
|
created_accounts++
|
||||||
|
|
||||||
|
$addr =~ /ci-/ {
|
||||||
|
created_ci_accounts++
|
||||||
|
} else {
|
||||||
|
created_nonci_accounts++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
counter postfix_timeouts
|
||||||
|
/timeout after DATA/ {
|
||||||
|
postfix_timeouts++
|
||||||
|
}
|
||||||
|
|
||||||
|
counter postfix_noqueue
|
||||||
|
/postfix\/.*NOQUEUE/ {
|
||||||
|
postfix_noqueue++
|
||||||
|
}
|
||||||
|
|
||||||
|
counter warning_count
|
||||||
|
/warning/ {
|
||||||
|
warning_count++
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
counter filtered_mail_count
|
||||||
|
|
||||||
|
counter encrypted_mail_count
|
||||||
|
/Filtering encrypted mail\./ {
|
||||||
|
encrypted_mail_count++
|
||||||
|
filtered_mail_count++
|
||||||
|
}
|
||||||
|
|
||||||
|
counter unencrypted_mail_count
|
||||||
|
/Filtering unencrypted mail\./ {
|
||||||
|
unencrypted_mail_count++
|
||||||
|
filtered_mail_count++
|
||||||
|
}
|
||||||
|
|
||||||
|
counter rejected_unencrypted_mail_count
|
||||||
|
/Rejected unencrypted mail\./ {
|
||||||
|
rejected_unencrypted_mail_count++
|
||||||
|
}
|
||||||
10
cmdeploy/src/cmdeploy/mtail/mtail.service.j2
Normal file
10
cmdeploy/src/cmdeploy/mtail/mtail.service.j2
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=mtail
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/bin/sh -c "journalctl -f -o short-iso -n 0 | /usr/bin/mtail --address={{ address }} --port={{ port }} --progs /etc/mtail --logtostderr --logs /dev/stdin"
|
||||||
|
Restart=on-failure
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
51
cmdeploy/src/cmdeploy/nginx/autoconfig.xml.j2
Normal file
51
cmdeploy/src/cmdeploy/nginx/autoconfig.xml.j2
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
|
||||||
|
<clientConfig version="1.1">
|
||||||
|
<emailProvider id="{{ config.domain_name }}">
|
||||||
|
<domain>{{ config.domain_name }}</domain>
|
||||||
|
<displayName>{{ config.domain_name }} chatmail</displayName>
|
||||||
|
<displayShortName>{{ config.domain_name }}</displayShortName>
|
||||||
|
<incomingServer type="imap">
|
||||||
|
<hostname>{{ config.domain_name }}</hostname>
|
||||||
|
<port>993</port>
|
||||||
|
<socketType>SSL</socketType>
|
||||||
|
<authentication>password-cleartext</authentication>
|
||||||
|
<username>%EMAILADDRESS%</username>
|
||||||
|
</incomingServer>
|
||||||
|
<incomingServer type="imap">
|
||||||
|
<hostname>{{ config.domain_name }}</hostname>
|
||||||
|
<port>143</port>
|
||||||
|
<socketType>STARTTLS</socketType>
|
||||||
|
<authentication>password-cleartext</authentication>
|
||||||
|
<username>%EMAILADDRESS%</username>
|
||||||
|
</incomingServer>
|
||||||
|
<incomingServer type="imap">
|
||||||
|
<hostname>{{ config.domain_name }}</hostname>
|
||||||
|
<port>443</port>
|
||||||
|
<socketType>SSL</socketType>
|
||||||
|
<authentication>password-cleartext</authentication>
|
||||||
|
<username>%EMAILADDRESS%</username>
|
||||||
|
</incomingServer>
|
||||||
|
<outgoingServer type="smtp">
|
||||||
|
<hostname>{{ config.domain_name }}</hostname>
|
||||||
|
<port>465</port>
|
||||||
|
<socketType>SSL</socketType>
|
||||||
|
<authentication>password-cleartext</authentication>
|
||||||
|
<username>%EMAILADDRESS%</username>
|
||||||
|
</outgoingServer>
|
||||||
|
<outgoingServer type="smtp">
|
||||||
|
<hostname>{{ config.domain_name }}</hostname>
|
||||||
|
<port>587</port>
|
||||||
|
<socketType>STARTTLS</socketType>
|
||||||
|
<authentication>password-cleartext</authentication>
|
||||||
|
<username>%EMAILADDRESS%</username>
|
||||||
|
</outgoingServer>
|
||||||
|
<outgoingServer type="smtp">
|
||||||
|
<hostname>{{ config.domain_name }}</hostname>
|
||||||
|
<port>443</port>
|
||||||
|
<socketType>SSL</socketType>
|
||||||
|
<authentication>password-cleartext</authentication>
|
||||||
|
<username>%EMAILADDRESS%</username>
|
||||||
|
</outgoingServer>
|
||||||
|
</emailProvider>
|
||||||
|
</clientConfig>
|
||||||
4
cmdeploy/src/cmdeploy/nginx/mta-sts.txt.j2
Normal file
4
cmdeploy/src/cmdeploy/nginx/mta-sts.txt.j2
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
version: STSv1
|
||||||
|
mode: enforce
|
||||||
|
mx: {{ config.domain_name }}
|
||||||
|
max_age: 2419200
|
||||||
125
cmdeploy/src/cmdeploy/nginx/nginx.conf.j2
Normal file
125
cmdeploy/src/cmdeploy/nginx/nginx.conf.j2
Normal file
@@ -0,0 +1,125 @@
|
|||||||
|
load_module modules/ngx_stream_module.so;
|
||||||
|
|
||||||
|
user www-data;
|
||||||
|
worker_processes auto;
|
||||||
|
pid /run/nginx.pid;
|
||||||
|
error_log syslog:server=unix:/dev/log,facility=local3;
|
||||||
|
|
||||||
|
events {
|
||||||
|
worker_connections 768;
|
||||||
|
# multi_accept on;
|
||||||
|
}
|
||||||
|
|
||||||
|
stream {
|
||||||
|
map $ssl_preread_alpn_protocols $proxy {
|
||||||
|
default 127.0.0.1:8443;
|
||||||
|
~\bsmtp\b 127.0.0.1:465;
|
||||||
|
~\bimap\b 127.0.0.1:993;
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
{% if not disable_ipv6 %}
|
||||||
|
listen [::]:443;
|
||||||
|
{% endif %}
|
||||||
|
proxy_pass $proxy;
|
||||||
|
ssl_preread on;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
http {
|
||||||
|
sendfile on;
|
||||||
|
tcp_nopush on;
|
||||||
|
|
||||||
|
# Do not emit nginx version on error pages.
|
||||||
|
server_tokens off;
|
||||||
|
|
||||||
|
include /etc/nginx/mime.types;
|
||||||
|
default_type application/octet-stream;
|
||||||
|
|
||||||
|
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
||||||
|
ssl_prefer_server_ciphers on;
|
||||||
|
ssl_certificate /var/lib/acme/live/{{ config.domain_name }}/fullchain;
|
||||||
|
ssl_certificate_key /var/lib/acme/live/{{ config.domain_name }}/privkey;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
|
||||||
|
server {
|
||||||
|
|
||||||
|
listen 127.0.0.1:8443 ssl default_server;
|
||||||
|
|
||||||
|
root /var/www/html;
|
||||||
|
|
||||||
|
index index.html index.htm;
|
||||||
|
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
access_log syslog:server=unix:/dev/log,facility=local7;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
# First attempt to serve request as file, then
|
||||||
|
# as directory, then fall back to displaying a 404.
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /metrics {
|
||||||
|
default_type text/plain;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /new {
|
||||||
|
if ($request_method = GET) {
|
||||||
|
# Redirect to Delta Chat,
|
||||||
|
# which will in turn do a POST request.
|
||||||
|
return 301 dcaccount:https://{{ config.domain_name }}/new;
|
||||||
|
}
|
||||||
|
|
||||||
|
fastcgi_pass unix:/run/fcgiwrap.socket;
|
||||||
|
include /etc/nginx/fastcgi_params;
|
||||||
|
fastcgi_param SCRIPT_FILENAME /usr/lib/cgi-bin/newemail.py;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Old URL for compatibility with e.g. printed QR codes.
|
||||||
|
#
|
||||||
|
# Copy-paste instead of redirect to /new
|
||||||
|
# because Delta Chat core does not follow redirects.
|
||||||
|
#
|
||||||
|
# Redirects are only for browsers.
|
||||||
|
location /cgi-bin/newemail.py {
|
||||||
|
if ($request_method = GET) {
|
||||||
|
return 301 dcaccount:https://{{ config.domain_name }}/new;
|
||||||
|
}
|
||||||
|
|
||||||
|
fastcgi_pass unix:/run/fcgiwrap.socket;
|
||||||
|
include /etc/nginx/fastcgi_params;
|
||||||
|
fastcgi_param SCRIPT_FILENAME /usr/lib/cgi-bin/newemail.py;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Proxy to iroh-relay service.
|
||||||
|
location /relay {
|
||||||
|
proxy_pass http://127.0.0.1:3340;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
|
||||||
|
# Upgrade header is normally set to "iroh derp http" or "websocket".
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
|
||||||
|
location /relay/probe {
|
||||||
|
proxy_pass http://127.0.0.1:3340;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /generate_204 {
|
||||||
|
proxy_pass http://127.0.0.1:3340;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# Redirect www. to non-www
|
||||||
|
server {
|
||||||
|
listen 127.0.0.1:8443 ssl;
|
||||||
|
server_name www.{{ config.domain_name }};
|
||||||
|
return 301 $scheme://{{ config.domain_name }}$request_uri;
|
||||||
|
access_log syslog:server=unix:/dev/log,facility=local7;
|
||||||
|
}
|
||||||
|
}
|
||||||
BIN
cmdeploy/src/cmdeploy/obs-home-deltachat.gpg
Normal file
BIN
cmdeploy/src/cmdeploy/obs-home-deltachat.gpg
Normal file
Binary file not shown.
1
cmdeploy/src/cmdeploy/opendkim/KeyTable
Normal file
1
cmdeploy/src/cmdeploy/opendkim/KeyTable
Normal file
@@ -0,0 +1 @@
|
|||||||
|
{{ config.opendkim_selector }}._domainkey.{{ config.domain_name }} {{ config.domain_name }}:{{ config.opendkim_selector }}:/etc/dkimkeys/{{ config.opendkim_selector }}.private
|
||||||
1
cmdeploy/src/cmdeploy/opendkim/SigningTable
Normal file
1
cmdeploy/src/cmdeploy/opendkim/SigningTable
Normal file
@@ -0,0 +1 @@
|
|||||||
|
*@{{ config.domain_name }} {{ config.opendkim_selector }}._domainkey.{{ config.domain_name }}
|
||||||
28
cmdeploy/src/cmdeploy/opendkim/final.lua
Normal file
28
cmdeploy/src/cmdeploy/opendkim/final.lua
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
if odkim.internal_ip(ctx) == 1 then
|
||||||
|
-- Outgoing message will be signed,
|
||||||
|
-- no need to look for signatures.
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
|
||||||
|
nsigs = odkim.get_sigcount(ctx)
|
||||||
|
if nsigs == nil then
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
|
||||||
|
for i = 1, nsigs do
|
||||||
|
sig = odkim.get_sighandle(ctx, i - 1)
|
||||||
|
sigres = odkim.sig_result(sig)
|
||||||
|
|
||||||
|
-- All signatures that do not correspond to From:
|
||||||
|
-- were ignored in screen.lua and return sigres -1.
|
||||||
|
--
|
||||||
|
-- Any valid signature that was not ignored like this
|
||||||
|
-- means the message is acceptable.
|
||||||
|
if sigres == 0 then
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
odkim.set_reply(ctx, "554", "5.7.1", "No valid DKIM signature found")
|
||||||
|
odkim.set_result(ctx, SMFIS_REJECT)
|
||||||
|
return nil
|
||||||
66
cmdeploy/src/cmdeploy/opendkim/opendkim.conf
Normal file
66
cmdeploy/src/cmdeploy/opendkim/opendkim.conf
Normal file
@@ -0,0 +1,66 @@
|
|||||||
|
# OpenDKIM configuration.
|
||||||
|
|
||||||
|
Syslog yes
|
||||||
|
SyslogSuccess yes
|
||||||
|
#LogWhy no
|
||||||
|
|
||||||
|
# Common signing and verification parameters. In Debian, the "From" header is
|
||||||
|
# oversigned, because it is often the identity key used by reputation systems
|
||||||
|
# and thus somewhat security sensitive.
|
||||||
|
Canonicalization relaxed/simple
|
||||||
|
OversignHeaders From
|
||||||
|
|
||||||
|
On-BadSignature reject
|
||||||
|
On-KeyNotFound reject
|
||||||
|
On-NoSignature reject
|
||||||
|
|
||||||
|
# Signing domain, selector, and key (required). For example, perform signing
|
||||||
|
# for domain "example.com" with selector "2020" (2020._domainkey.example.com),
|
||||||
|
# using the private key stored in /etc/dkimkeys/example.private. More granular
|
||||||
|
# setup options can be found in /usr/share/doc/opendkim/README.opendkim.
|
||||||
|
Domain {{ config.domain_name }}
|
||||||
|
Selector {{ config.opendkim_selector }}
|
||||||
|
KeyFile /etc/dkimkeys/{{ config.opendkim_selector }}.private
|
||||||
|
KeyTable /etc/dkimkeys/KeyTable
|
||||||
|
SigningTable refile:/etc/dkimkeys/SigningTable
|
||||||
|
|
||||||
|
# Sign Autocrypt header in addition to the default specified in RFC 6376.
|
||||||
|
#
|
||||||
|
# Default list is here:
|
||||||
|
# <https://github.com/trusteddomainproject/OpenDKIM/blob/5c539587561785a66c1f67f720f2fb741f320785/libopendkim/dkim.c#L221-L245>
|
||||||
|
SignHeaders *,+autocrypt,+content-type
|
||||||
|
|
||||||
|
# Prevent addition of second Content-Type header
|
||||||
|
# and other important headers that should not be added
|
||||||
|
# after signing the message.
|
||||||
|
# See
|
||||||
|
# <https://www.zone.eu/blog/2024/05/17/bimi-and-dmarc-cant-save-you/>
|
||||||
|
# and RFC 6376 (page 41) for reference.
|
||||||
|
#
|
||||||
|
# We don't use "l=" body length so the problem described in RFC 6376
|
||||||
|
# is not applicable, but adding e.g. a second "From" header
|
||||||
|
# or second "Autocrypt" header is better prevented in any case.
|
||||||
|
#
|
||||||
|
# Default is empty.
|
||||||
|
OversignHeaders from,reply-to,subject,date,to,cc,resent-date,resent-from,resent-sender,resent-to,resent-cc,in-reply-to,references,list-id,list-help,list-unsubscribe,list-subscribe,list-post,list-owner,list-archive,autocrypt
|
||||||
|
|
||||||
|
# Script to ignore signatures that do not correspond to the From: domain.
|
||||||
|
ScreenPolicyScript /etc/opendkim/screen.lua
|
||||||
|
|
||||||
|
# Script to reject mails without a valid DKIM signature.
|
||||||
|
FinalPolicyScript /etc/opendkim/final.lua
|
||||||
|
|
||||||
|
# In Debian, opendkim runs as user "opendkim". A umask of 007 is required when
|
||||||
|
# using a local socket with MTAs that access the socket as a non-privileged
|
||||||
|
# user (for example, Postfix). You may need to add user "postfix" to group
|
||||||
|
# "opendkim" in that case.
|
||||||
|
UserID opendkim
|
||||||
|
UMask 007
|
||||||
|
|
||||||
|
Socket local:/var/spool/postfix/opendkim/opendkim.sock
|
||||||
|
|
||||||
|
PidFile /run/opendkim/opendkim.pid
|
||||||
|
|
||||||
|
# The trust anchor enables DNSSEC. In Debian, the trust anchor file is provided
|
||||||
|
# by the package dns-root-data.
|
||||||
|
TrustAnchorFile /usr/share/dns/root.key
|
||||||
21
cmdeploy/src/cmdeploy/opendkim/screen.lua
Normal file
21
cmdeploy/src/cmdeploy/opendkim/screen.lua
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
-- Ignore signatures that do not correspond to the From: domain.
|
||||||
|
|
||||||
|
from_domain = odkim.get_fromdomain(ctx)
|
||||||
|
if from_domain == nil then
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
|
||||||
|
n = odkim.get_sigcount(ctx)
|
||||||
|
if n == nil then
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
|
||||||
|
for i = 1, n do
|
||||||
|
sig = odkim.get_sighandle(ctx, i - 1)
|
||||||
|
sig_domain = odkim.sig_getdomain(sig)
|
||||||
|
if from_domain ~= sig_domain then
|
||||||
|
odkim.sig_ignore(sig)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
return nil
|
||||||
3
cmdeploy/src/cmdeploy/opendkim/systemd.conf
Normal file
3
cmdeploy/src/cmdeploy/opendkim/systemd.conf
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
[Service]
|
||||||
|
Restart=always
|
||||||
|
RuntimeMaxSec=1d
|
||||||
1
cmdeploy/src/cmdeploy/postfix/login_map
Normal file
1
cmdeploy/src/cmdeploy/postfix/login_map
Normal file
@@ -0,0 +1 @@
|
|||||||
|
/^(.*)$/ ${1}
|
||||||
89
cmdeploy/src/cmdeploy/postfix/main.cf.j2
Normal file
89
cmdeploy/src/cmdeploy/postfix/main.cf.j2
Normal file
@@ -0,0 +1,89 @@
|
|||||||
|
myorigin = {{ config.mail_domain }}
|
||||||
|
|
||||||
|
smtpd_banner = $myhostname ESMTP $mail_name (Debian/GNU)
|
||||||
|
biff = no
|
||||||
|
|
||||||
|
# appending .domain is the MUA's job.
|
||||||
|
append_dot_mydomain = no
|
||||||
|
|
||||||
|
# Uncomment the next line to generate "delayed mail" warnings
|
||||||
|
#delay_warning_time = 4h
|
||||||
|
|
||||||
|
readme_directory = no
|
||||||
|
|
||||||
|
# See http://www.postfix.org/COMPATIBILITY_README.html
|
||||||
|
compatibility_level = 3.6
|
||||||
|
|
||||||
|
# TLS parameters
|
||||||
|
smtpd_tls_cert_file=/var/lib/acme/live/{{ config.mail_domain }}/fullchain
|
||||||
|
smtpd_tls_key_file=/var/lib/acme/live/{{ config.mail_domain }}/privkey
|
||||||
|
smtpd_tls_security_level=may
|
||||||
|
|
||||||
|
smtp_tls_CApath=/etc/ssl/certs
|
||||||
|
smtp_tls_security_level=verify
|
||||||
|
# Send SNI extension when connecting to other servers.
|
||||||
|
# <https://www.postfix.org/postconf.5.html#smtp_tls_servername>
|
||||||
|
smtp_tls_servername = hostname
|
||||||
|
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
||||||
|
smtp_tls_policy_maps = inline:{nauta.cu=may}
|
||||||
|
smtpd_tls_protocols = >=TLSv1.2
|
||||||
|
|
||||||
|
# Disable anonymous cipher suites
|
||||||
|
# and known insecure algorithms.
|
||||||
|
#
|
||||||
|
# Disabling anonymous ciphers
|
||||||
|
# does not generally improve security
|
||||||
|
# because clients that want to verify certificate
|
||||||
|
# will not select them anyway,
|
||||||
|
# but makes cipher suite list shorter and security scanners happy.
|
||||||
|
# See <https://www.postfix.org/TLS_README.html> for discussion.
|
||||||
|
#
|
||||||
|
# Only ancient insecure ciphers should be disabled here
|
||||||
|
# as MTA clients that do not support more secure cipher
|
||||||
|
# likely do not support MTA-STS either and will
|
||||||
|
# otherwise fall back to using plaintext connection.
|
||||||
|
smtpd_tls_exclude_ciphers = aNULL, RC4, MD5, DES
|
||||||
|
|
||||||
|
# Override client's preference order.
|
||||||
|
# <https://www.postfix.org/postconf.5.html#tls_preempt_cipherlist>
|
||||||
|
#
|
||||||
|
# This is mostly to ensure cipher suites with forward secrecy
|
||||||
|
# are preferred over non cipher suites without forward secrecy.
|
||||||
|
# See <https://www.postfix.org/FORWARD_SECRECY_README.html#server_fs>.
|
||||||
|
tls_preempt_cipherlist = yes
|
||||||
|
|
||||||
|
smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination
|
||||||
|
myhostname = {{ config.mail_domain }}
|
||||||
|
alias_maps = hash:/etc/aliases
|
||||||
|
alias_database = hash:/etc/aliases
|
||||||
|
|
||||||
|
# Postfix does not deliver mail for any domain by itself.
|
||||||
|
# Primary domain is listed in `virtual_mailbox_domains` instead
|
||||||
|
# and handed over to Dovecot.
|
||||||
|
mydestination =
|
||||||
|
|
||||||
|
relayhost =
|
||||||
|
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
|
||||||
|
mailbox_size_limit = 0
|
||||||
|
message_size_limit = {{config.max_message_size}}
|
||||||
|
recipient_delimiter = +
|
||||||
|
inet_interfaces = all
|
||||||
|
{% if disable_ipv6 %}
|
||||||
|
inet_protocols = ipv4
|
||||||
|
{% else %}
|
||||||
|
inet_protocols = all
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
virtual_transport = lmtp:unix:private/dovecot-lmtp
|
||||||
|
virtual_mailbox_domains = {{ config.mail_domain }}
|
||||||
|
|
||||||
|
mua_client_restrictions = permit_sasl_authenticated, reject
|
||||||
|
mua_sender_restrictions = reject_sender_login_mismatch, permit_sasl_authenticated, reject
|
||||||
|
mua_helo_restrictions = permit_mynetworks, reject_invalid_helo_hostname, reject_non_fqdn_helo_hostname, permit
|
||||||
|
|
||||||
|
# 1:1 map MAIL FROM to SASL login name.
|
||||||
|
smtpd_sender_login_maps = regexp:/etc/postfix/login_map
|
||||||
|
|
||||||
|
# Do not lookup SMTP client hostnames to reduce delays
|
||||||
|
# and avoid unnecessary DNS requests.
|
||||||
|
smtpd_peername_lookup = no
|
||||||
@@ -9,14 +9,16 @@
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (no) (never) (100)
|
# (yes) (yes) (no) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - y - - smtpd -v
|
{% if debug == true %}
|
||||||
#smtp inet n - y - 1 postscreen
|
smtp inet n - y - - smtpd -v
|
||||||
#smtpd pass - - y - - smtpd
|
{%- else %}
|
||||||
#dnsblog unix - - y - 0 dnsblog
|
smtp inet n - y - - smtpd
|
||||||
#tlsproxy unix - - y - 0 tlsproxy
|
{%- endif %}
|
||||||
submission inet n - y - - smtpd
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port_incoming }}
|
||||||
|
submission inet n - y - 5000 smtpd
|
||||||
-o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
-o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
|
-o smtpd_tls_mandatory_protocols=>=TLSv1.3
|
||||||
-o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
-o smtpd_sasl_type=dovecot
|
-o smtpd_sasl_type=dovecot
|
||||||
-o smtpd_sasl_path=private/auth
|
-o smtpd_sasl_path=private/auth
|
||||||
@@ -28,11 +30,13 @@ submission inet n - y - - smtpd
|
|||||||
-o smtpd_recipient_restrictions=
|
-o smtpd_recipient_restrictions=
|
||||||
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
-o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
-o content_filter=filter:unix:private/filtermail
|
-o smtpd_client_connection_count_limit=1000
|
||||||
smtps inet n - y - - smtpd
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
||||||
|
smtps inet n - y - 5000 smtpd
|
||||||
-o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
-o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
-o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
|
-o smtpd_tls_mandatory_protocols=>=TLSv1.3
|
||||||
-o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
-o smtpd_sasl_type=dovecot
|
-o smtpd_sasl_type=dovecot
|
||||||
-o smtpd_sasl_path=private/auth
|
-o smtpd_sasl_path=private/auth
|
||||||
@@ -42,8 +46,9 @@ smtps inet n - y - - smtpd
|
|||||||
-o smtpd_sender_restrictions=$mua_sender_restrictions
|
-o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
-o smtpd_recipient_restrictions=
|
-o smtpd_recipient_restrictions=
|
||||||
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
|
-o smtpd_client_connection_count_limit=1000
|
||||||
-o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
-o content_filter=filter:unix:private/filtermail
|
-o smtpd_proxy_filter=127.0.0.1:{{ config.filtermail_smtp_port }}
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
cleanup unix n - y - 0 cleanup
|
cleanup unix n - y - 0 cleanup
|
||||||
@@ -66,13 +71,32 @@ showq unix n - y - - showq
|
|||||||
error unix - - y - - error
|
error unix - - y - - error
|
||||||
retry unix - - y - - error
|
retry unix - - y - - error
|
||||||
discard unix - - y - - discard
|
discard unix - - y - - discard
|
||||||
local unix - n n - - local
|
|
||||||
virtual unix - n n - - virtual
|
|
||||||
lmtp unix - - y - - lmtp
|
lmtp unix - - y - - lmtp
|
||||||
anvil unix - - y - 1 anvil
|
anvil unix - - y - 1 anvil
|
||||||
scache unix - - y - 1 scache
|
scache unix - - y - 1 scache
|
||||||
postlog unix-dgram n - n - 1 postlogd
|
postlog unix-dgram n - n - 1 postlogd
|
||||||
filter unix - n n - - lmtp
|
filter unix - n n - - lmtp
|
||||||
# Local SMTP server for reinjecting filered mail.
|
# Local SMTP server for reinjecting outgoing filtered mail.
|
||||||
localhost:10026 inet n - n - 10 smtpd
|
127.0.0.1:{{ config.postfix_reinject_port }} inet n - n - 10 smtpd
|
||||||
-o content_filter=
|
-o syslog_name=postfix/reinject
|
||||||
|
-o smtpd_milters=unix:opendkim/opendkim.sock
|
||||||
|
-o cleanup_service_name=authclean
|
||||||
|
|
||||||
|
# Local SMTP server for reinjecting incoming filtered mail
|
||||||
|
127.0.0.1:{{ config.postfix_reinject_port_incoming }} inet n - n - 10 smtpd
|
||||||
|
-o syslog_name=postfix/reinject_incoming
|
||||||
|
-o smtpd_milters=unix:opendkim/opendkim.sock
|
||||||
|
|
||||||
|
# Cleanup `Received` headers for authenticated mail
|
||||||
|
# to avoid leaking client IP.
|
||||||
|
#
|
||||||
|
# We do not do this for received mails
|
||||||
|
# as this will break DKIM signatures
|
||||||
|
# if `Received` header is signed.
|
||||||
|
#
|
||||||
|
# This service also rewrites
|
||||||
|
# Subject with `[...]`
|
||||||
|
# to make sure the users
|
||||||
|
# cannot send unprotected Subject.
|
||||||
|
authclean unix n - - - 0 cleanup
|
||||||
|
-o header_checks=regexp:/etc/postfix/submission_header_cleanup
|
||||||
10
cmdeploy/src/cmdeploy/postfix/mta-sts-daemon.service
Normal file
10
cmdeploy/src/cmdeploy/postfix/mta-sts-daemon.service
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Postfix MTA-STS resolver daemon
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart=/usr/local/lib/postfix-mta-sts-resolver/bin/mta-sts-daemon
|
||||||
|
Restart=always
|
||||||
|
RestartSec=30
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
13
cmdeploy/src/cmdeploy/postfix/mta-sts-daemon.yml
Normal file
13
cmdeploy/src/cmdeploy/postfix/mta-sts-daemon.yml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
host: 127.0.0.1
|
||||||
|
port: 8461
|
||||||
|
reuse_port: true
|
||||||
|
shutdown_timeout: 20
|
||||||
|
cache:
|
||||||
|
type: internal
|
||||||
|
options:
|
||||||
|
cache_size: 10000
|
||||||
|
proactive_policy_fetching:
|
||||||
|
enabled: true
|
||||||
|
default_zone:
|
||||||
|
strict_testing: false
|
||||||
|
timeout: 4
|
||||||
5
cmdeploy/src/cmdeploy/postfix/submission_header_cleanup
Normal file
5
cmdeploy/src/cmdeploy/postfix/submission_header_cleanup
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
/^Received:/ IGNORE
|
||||||
|
/^X-Originating-IP:/ IGNORE
|
||||||
|
/^X-Mailer:/ IGNORE
|
||||||
|
/^User-Agent:/ IGNORE
|
||||||
|
/^Subject:/ REPLACE Subject: [...]
|
||||||
12
cmdeploy/src/cmdeploy/remote/__init__.py
Normal file
12
cmdeploy/src/cmdeploy/remote/__init__.py
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
"""
|
||||||
|
|
||||||
|
The 'cmdeploy.remote' sub package contains modules with remotely executing functions.
|
||||||
|
|
||||||
|
Its "_sshexec_bootstrap" module is executed remotely through `SSHExec`
|
||||||
|
and its main() loop there stays connected via a command channel,
|
||||||
|
ready to receive function invocations ("command") and return results.
|
||||||
|
"""
|
||||||
|
|
||||||
|
from . import rdns, rshell
|
||||||
|
|
||||||
|
__all__ = ["rdns", "rshell"]
|
||||||
30
cmdeploy/src/cmdeploy/remote/_sshexec_bootstrap.py
Normal file
30
cmdeploy/src/cmdeploy/remote/_sshexec_bootstrap.py
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
import builtins
|
||||||
|
import importlib
|
||||||
|
import traceback
|
||||||
|
|
||||||
|
## Function Execution server
|
||||||
|
|
||||||
|
|
||||||
|
def _run_loop(cmd_channel):
|
||||||
|
while cmd := cmd_channel.receive():
|
||||||
|
cmd_channel.send(_handle_one_request(cmd))
|
||||||
|
|
||||||
|
|
||||||
|
def _handle_one_request(cmd):
|
||||||
|
pymod_path, func_name, kwargs = cmd
|
||||||
|
try:
|
||||||
|
mod = importlib.import_module(pymod_path)
|
||||||
|
func = getattr(mod, func_name)
|
||||||
|
res = func(**kwargs)
|
||||||
|
return ("finish", res)
|
||||||
|
except:
|
||||||
|
data = traceback.format_exc()
|
||||||
|
return ("error", data)
|
||||||
|
|
||||||
|
|
||||||
|
def main(channel):
|
||||||
|
# enable simple "print" logging
|
||||||
|
|
||||||
|
builtins.print = lambda x="": channel.send(("log", x))
|
||||||
|
|
||||||
|
_run_loop(channel)
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user