You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

mailer.go 9.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package setting
  4. import (
  5. "context"
  6. "net"
  7. "net/mail"
  8. "strings"
  9. "time"
  10. "code.gitea.io/gitea/modules/log"
  11. shellquote "github.com/kballard/go-shellquote"
  12. )
  13. // Mailer represents mail service.
  14. type Mailer struct {
  15. // Mailer
  16. Name string `ini:"NAME"`
  17. From string `ini:"FROM"`
  18. EnvelopeFrom string `ini:"ENVELOPE_FROM"`
  19. OverrideEnvelopeFrom bool `ini:"-"`
  20. FromName string `ini:"-"`
  21. FromEmail string `ini:"-"`
  22. SendAsPlainText bool `ini:"SEND_AS_PLAIN_TEXT"`
  23. SubjectPrefix string `ini:"SUBJECT_PREFIX"`
  24. // SMTP sender
  25. Protocol string `ini:"PROTOCOL"`
  26. SMTPAddr string `ini:"SMTP_ADDR"`
  27. SMTPPort string `ini:"SMTP_PORT"`
  28. User string `ini:"USER"`
  29. Passwd string `ini:"PASSWD"`
  30. EnableHelo bool `ini:"ENABLE_HELO"`
  31. HeloHostname string `ini:"HELO_HOSTNAME"`
  32. ForceTrustServerCert bool `ini:"FORCE_TRUST_SERVER_CERT"`
  33. UseClientCert bool `ini:"USE_CLIENT_CERT"`
  34. ClientCertFile string `ini:"CLIENT_CERT_FILE"`
  35. ClientKeyFile string `ini:"CLIENT_KEY_FILE"`
  36. // Sendmail sender
  37. SendmailPath string `ini:"SENDMAIL_PATH"`
  38. SendmailArgs []string `ini:"-"`
  39. SendmailTimeout time.Duration `ini:"SENDMAIL_TIMEOUT"`
  40. SendmailConvertCRLF bool `ini:"SENDMAIL_CONVERT_CRLF"`
  41. }
  42. // MailService the global mailer
  43. var MailService *Mailer
  44. func loadMailsFrom(rootCfg ConfigProvider) {
  45. loadMailerFrom(rootCfg)
  46. loadRegisterMailFrom(rootCfg)
  47. loadNotifyMailFrom(rootCfg)
  48. loadIncomingEmailFrom(rootCfg)
  49. }
  50. func loadMailerFrom(rootCfg ConfigProvider) {
  51. sec := rootCfg.Section("mailer")
  52. // Check mailer setting.
  53. if !sec.Key("ENABLED").MustBool() {
  54. return
  55. }
  56. // Handle Deprecations and map on to new configuration
  57. // DEPRECATED should not be removed because users maybe upgrade from lower version to the latest version
  58. // if these are removed, the warning will not be shown
  59. deprecatedSetting(rootCfg, "mailer", "MAILER_TYPE", "mailer", "PROTOCOL", "v1.19.0")
  60. if sec.HasKey("MAILER_TYPE") && !sec.HasKey("PROTOCOL") {
  61. if sec.Key("MAILER_TYPE").String() == "sendmail" {
  62. sec.Key("PROTOCOL").MustString("sendmail")
  63. }
  64. }
  65. deprecatedSetting(rootCfg, "mailer", "HOST", "mailer", "SMTP_ADDR", "v1.19.0")
  66. if sec.HasKey("HOST") && !sec.HasKey("SMTP_ADDR") {
  67. givenHost := sec.Key("HOST").String()
  68. addr, port, err := net.SplitHostPort(givenHost)
  69. if err != nil && strings.Contains(err.Error(), "missing port in address") {
  70. addr = givenHost
  71. } else if err != nil {
  72. log.Fatal("Invalid mailer.HOST (%s): %v", givenHost, err)
  73. }
  74. if addr == "" {
  75. addr = "127.0.0.1"
  76. }
  77. sec.Key("SMTP_ADDR").MustString(addr)
  78. sec.Key("SMTP_PORT").MustString(port)
  79. }
  80. deprecatedSetting(rootCfg, "mailer", "IS_TLS_ENABLED", "mailer", "PROTOCOL", "v1.19.0")
  81. if sec.HasKey("IS_TLS_ENABLED") && !sec.HasKey("PROTOCOL") {
  82. if sec.Key("IS_TLS_ENABLED").MustBool() {
  83. sec.Key("PROTOCOL").MustString("smtps")
  84. } else {
  85. sec.Key("PROTOCOL").MustString("smtp+starttls")
  86. }
  87. }
  88. deprecatedSetting(rootCfg, "mailer", "DISABLE_HELO", "mailer", "ENABLE_HELO", "v1.19.0")
  89. if sec.HasKey("DISABLE_HELO") && !sec.HasKey("ENABLE_HELO") {
  90. sec.Key("ENABLE_HELO").MustBool(!sec.Key("DISABLE_HELO").MustBool())
  91. }
  92. deprecatedSetting(rootCfg, "mailer", "SKIP_VERIFY", "mailer", "FORCE_TRUST_SERVER_CERT", "v1.19.0")
  93. if sec.HasKey("SKIP_VERIFY") && !sec.HasKey("FORCE_TRUST_SERVER_CERT") {
  94. sec.Key("FORCE_TRUST_SERVER_CERT").MustBool(sec.Key("SKIP_VERIFY").MustBool())
  95. }
  96. deprecatedSetting(rootCfg, "mailer", "USE_CERTIFICATE", "mailer", "USE_CLIENT_CERT", "v1.19.0")
  97. if sec.HasKey("USE_CERTIFICATE") && !sec.HasKey("USE_CLIENT_CERT") {
  98. sec.Key("USE_CLIENT_CERT").MustBool(sec.Key("USE_CERTIFICATE").MustBool())
  99. }
  100. deprecatedSetting(rootCfg, "mailer", "CERT_FILE", "mailer", "CLIENT_CERT_FILE", "v1.19.0")
  101. if sec.HasKey("CERT_FILE") && !sec.HasKey("CLIENT_CERT_FILE") {
  102. sec.Key("CERT_FILE").MustString(sec.Key("CERT_FILE").String())
  103. }
  104. deprecatedSetting(rootCfg, "mailer", "KEY_FILE", "mailer", "CLIENT_KEY_FILE", "v1.19.0")
  105. if sec.HasKey("KEY_FILE") && !sec.HasKey("CLIENT_KEY_FILE") {
  106. sec.Key("KEY_FILE").MustString(sec.Key("KEY_FILE").String())
  107. }
  108. deprecatedSetting(rootCfg, "mailer", "ENABLE_HTML_ALTERNATIVE", "mailer", "SEND_AS_PLAIN_TEXT", "v1.19.0")
  109. if sec.HasKey("ENABLE_HTML_ALTERNATIVE") && !sec.HasKey("SEND_AS_PLAIN_TEXT") {
  110. sec.Key("SEND_AS_PLAIN_TEXT").MustBool(!sec.Key("ENABLE_HTML_ALTERNATIVE").MustBool(false))
  111. }
  112. if sec.HasKey("PROTOCOL") && sec.Key("PROTOCOL").String() == "smtp+startls" {
  113. log.Error("Deprecated fallback `[mailer]` `PROTOCOL = smtp+startls` present. Use `[mailer]` `PROTOCOL = smtp+starttls`` instead. This fallback will be removed in v1.19.0")
  114. sec.Key("PROTOCOL").SetValue("smtp+starttls")
  115. }
  116. // Set default values & validate
  117. sec.Key("NAME").MustString(AppName)
  118. sec.Key("PROTOCOL").In("", []string{"smtp", "smtps", "smtp+starttls", "smtp+unix", "sendmail", "dummy"})
  119. sec.Key("ENABLE_HELO").MustBool(true)
  120. sec.Key("FORCE_TRUST_SERVER_CERT").MustBool(false)
  121. sec.Key("USE_CLIENT_CERT").MustBool(false)
  122. sec.Key("SENDMAIL_PATH").MustString("sendmail")
  123. sec.Key("SENDMAIL_TIMEOUT").MustDuration(5 * time.Minute)
  124. sec.Key("SENDMAIL_CONVERT_CRLF").MustBool(true)
  125. sec.Key("FROM").MustString(sec.Key("USER").String())
  126. // Now map the values on to the MailService
  127. MailService = &Mailer{}
  128. if err := sec.MapTo(MailService); err != nil {
  129. log.Fatal("Unable to map [mailer] section on to MailService. Error: %v", err)
  130. }
  131. // Infer SMTPPort if not set
  132. if MailService.SMTPPort == "" {
  133. switch MailService.Protocol {
  134. case "smtp":
  135. MailService.SMTPPort = "25"
  136. case "smtps":
  137. MailService.SMTPPort = "465"
  138. case "smtp+starttls":
  139. MailService.SMTPPort = "587"
  140. }
  141. }
  142. // Infer Protocol
  143. if MailService.Protocol == "" {
  144. if strings.ContainsAny(MailService.SMTPAddr, "/\\") {
  145. MailService.Protocol = "smtp+unix"
  146. } else {
  147. switch MailService.SMTPPort {
  148. case "25":
  149. MailService.Protocol = "smtp"
  150. case "465":
  151. MailService.Protocol = "smtps"
  152. case "587":
  153. MailService.Protocol = "smtp+starttls"
  154. default:
  155. log.Error("unable to infer unspecified mailer.PROTOCOL from mailer.SMTP_PORT = %q, assume using smtps", MailService.SMTPPort)
  156. MailService.Protocol = "smtps"
  157. if MailService.SMTPPort == "" {
  158. MailService.SMTPPort = "465"
  159. }
  160. }
  161. }
  162. }
  163. // we want to warn if users use SMTP on a non-local IP;
  164. // we might as well take the opportunity to check that it has an IP at all
  165. // This check is not needed for sendmail
  166. switch MailService.Protocol {
  167. case "sendmail":
  168. var err error
  169. MailService.SendmailArgs, err = shellquote.Split(sec.Key("SENDMAIL_ARGS").String())
  170. if err != nil {
  171. log.Error("Failed to parse Sendmail args: '%s' with error %v", sec.Key("SENDMAIL_ARGS").String(), err)
  172. }
  173. case "smtp", "smtps", "smtp+starttls", "smtp+unix":
  174. ips := tryResolveAddr(MailService.SMTPAddr)
  175. if MailService.Protocol == "smtp" {
  176. for _, ip := range ips {
  177. if !ip.IP.IsLoopback() {
  178. log.Warn("connecting over insecure SMTP protocol to non-local address is not recommended")
  179. break
  180. }
  181. }
  182. }
  183. case "dummy": // just mention and do nothing
  184. }
  185. if MailService.From != "" {
  186. parsed, err := mail.ParseAddress(MailService.From)
  187. if err != nil {
  188. log.Fatal("Invalid mailer.FROM (%s): %v", MailService.From, err)
  189. }
  190. MailService.FromName = parsed.Name
  191. MailService.FromEmail = parsed.Address
  192. } else {
  193. log.Error("no mailer.FROM provided, email system may not work.")
  194. }
  195. switch MailService.EnvelopeFrom {
  196. case "":
  197. MailService.OverrideEnvelopeFrom = false
  198. case "<>":
  199. MailService.EnvelopeFrom = ""
  200. MailService.OverrideEnvelopeFrom = true
  201. default:
  202. parsed, err := mail.ParseAddress(MailService.EnvelopeFrom)
  203. if err != nil {
  204. log.Fatal("Invalid mailer.ENVELOPE_FROM (%s): %v", MailService.EnvelopeFrom, err)
  205. }
  206. MailService.OverrideEnvelopeFrom = true
  207. MailService.EnvelopeFrom = parsed.Address
  208. }
  209. log.Info("Mail Service Enabled")
  210. }
  211. func loadRegisterMailFrom(rootCfg ConfigProvider) {
  212. if !rootCfg.Section("service").Key("REGISTER_EMAIL_CONFIRM").MustBool() {
  213. return
  214. } else if MailService == nil {
  215. log.Warn("Register Mail Service: Mail Service is not enabled")
  216. return
  217. }
  218. Service.RegisterEmailConfirm = true
  219. log.Info("Register Mail Service Enabled")
  220. }
  221. func loadNotifyMailFrom(rootCfg ConfigProvider) {
  222. if !rootCfg.Section("service").Key("ENABLE_NOTIFY_MAIL").MustBool() {
  223. return
  224. } else if MailService == nil {
  225. log.Warn("Notify Mail Service: Mail Service is not enabled")
  226. return
  227. }
  228. Service.EnableNotifyMail = true
  229. log.Info("Notify Mail Service Enabled")
  230. }
  231. func tryResolveAddr(addr string) []net.IPAddr {
  232. if strings.HasPrefix(addr, "[") && strings.HasSuffix(addr, "]") {
  233. addr = addr[1 : len(addr)-1]
  234. }
  235. ip := net.ParseIP(addr)
  236. if ip != nil {
  237. return []net.IPAddr{{IP: ip}}
  238. }
  239. ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
  240. defer cancel()
  241. ips, err := net.DefaultResolver.LookupIPAddr(ctx, addr)
  242. if err != nil {
  243. log.Warn("could not look up mailer.SMTP_ADDR: %v", err)
  244. return nil
  245. }
  246. return ips
  247. }