0
0
Fork 0
mirror of https://github.com/go-gitea/gitea synced 2024-11-15 22:41:44 +01:00
gitea/modules/mailer/mailer.go

285 lines
6.8 KiB
Go
Raw Normal View History

2014-03-19 13:27:27 +01:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Copyright 2017 The Gitea Authors. All rights reserved.
2014-03-19 13:27:27 +01:00
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package mailer
import (
"crypto/tls"
2014-03-19 13:27:27 +01:00
"fmt"
"io"
"net"
2014-03-19 13:27:27 +01:00
"net/smtp"
"os"
"os/exec"
2014-03-19 13:27:27 +01:00
"strings"
"time"
"code.gitea.io/gitea/modules/base"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
"github.com/jaytaylor/html2text"
"gopkg.in/gomail.v2"
2014-03-19 13:27:27 +01:00
)
2016-11-25 02:44:04 +01:00
// Message mail body and log info
type Message struct {
Info string // Message information for log purpose.
*gomail.Message
}
// NewMessageFrom creates new mail message object with custom From header.
func NewMessageFrom(to []string, fromDisplayName, fromAddress, subject, body string) *Message {
log.Trace("NewMessageFrom (body):\n%s", body)
msg := gomail.NewMessage()
msg.SetAddressHeader("From", fromAddress, fromDisplayName)
msg.SetHeader("To", to...)
msg.SetHeader("Subject", subject)
msg.SetDateHeader("Date", time.Now())
plainBody, err := html2text.FromString(body)
if err != nil || setting.MailService.SendAsPlainText {
2017-09-12 03:04:14 +02:00
if strings.Contains(base.TruncateString(body, 100), "<html>") {
log.Warn("Mail contains HTML but configured to send as plain text.")
}
msg.SetBody("text/plain", plainBody)
} else {
msg.SetBody("text/plain", plainBody)
msg.AddAlternative("text/html", body)
}
return &Message{
Message: msg,
}
}
// NewMessage creates new mail message object with default From header.
func NewMessage(to []string, subject, body string) *Message {
return NewMessageFrom(to, setting.MailService.FromName, setting.MailService.FromEmail, subject, body)
}
type loginAuth struct {
2015-08-20 13:12:55 +02:00
username, password string
}
2016-11-25 02:44:04 +01:00
// LoginAuth SMTP AUTH LOGIN Auth Handler
func LoginAuth(username, password string) smtp.Auth {
return &loginAuth{username, password}
}
2016-11-25 02:44:04 +01:00
// Start start SMTP login auth
func (a *loginAuth) Start(server *smtp.ServerInfo) (string, []byte, error) {
return "LOGIN", []byte{}, nil
}
2016-11-25 02:44:04 +01:00
// Next next step of SMTP login auth
func (a *loginAuth) Next(fromServer []byte, more bool) ([]byte, error) {
if more {
switch string(fromServer) {
case "Username:":
return []byte(a.username), nil
case "Password:":
return []byte(a.password), nil
default:
return nil, fmt.Errorf("unknown fromServer: %s", string(fromServer))
}
}
return nil, nil
}
// Sender SMTP mail sender
type smtpSender struct {
2014-03-19 13:27:27 +01:00
}
2016-11-25 02:44:04 +01:00
// Send send email
func (s *smtpSender) Send(from string, to []string, msg io.WriterTo) error {
opts := setting.MailService
2014-03-20 02:05:48 +01:00
host, port, err := net.SplitHostPort(opts.Host)
if err != nil {
return err
}
tlsconfig := &tls.Config{
InsecureSkipVerify: opts.SkipVerify,
ServerName: host,
}
if opts.UseCertificate {
cert, err := tls.LoadX509KeyPair(opts.CertFile, opts.KeyFile)
if err != nil {
return err
}
tlsconfig.Certificates = []tls.Certificate{cert}
}
2014-12-19 06:24:17 +01:00
conn, err := net.Dial("tcp", net.JoinHostPort(host, port))
if err != nil {
return err
}
defer conn.Close()
2014-12-19 06:24:17 +01:00
isSecureConn := false
// Start TLS directly if the port ends with 465 (SMTPS protocol)
if strings.HasSuffix(port, "465") {
conn = tls.Client(conn, tlsconfig)
2014-12-19 06:24:17 +01:00
isSecureConn = true
}
2014-12-19 06:24:17 +01:00
client, err := smtp.NewClient(conn, host)
if err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("NewClient: %v", err)
}
if !opts.DisableHelo {
hostname := opts.HeloHostname
2015-07-03 08:08:18 +02:00
if len(hostname) == 0 {
hostname, err = os.Hostname()
if err != nil {
return err
}
}
2015-02-20 08:12:27 +01:00
2015-07-03 08:08:18 +02:00
if err = client.Hello(hostname); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("Hello: %v", err)
2015-07-03 08:08:18 +02:00
}
2015-02-20 08:12:27 +01:00
}
// If not using SMTPS, always use STARTTLS if available
2014-12-19 06:24:17 +01:00
hasStartTLS, _ := client.Extension("STARTTLS")
if !isSecureConn && hasStartTLS {
if err = client.StartTLS(tlsconfig); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("StartTLS: %v", err)
}
}
2014-12-19 06:24:17 +01:00
canAuth, options := client.Extension("AUTH")
if canAuth && len(opts.User) > 0 {
var auth smtp.Auth
if strings.Contains(options, "CRAM-MD5") {
auth = smtp.CRAMMD5Auth(opts.User, opts.Passwd)
} else if strings.Contains(options, "PLAIN") {
auth = smtp.PlainAuth("", opts.User, opts.Passwd, host)
} else if strings.Contains(options, "LOGIN") {
2015-08-20 13:12:55 +02:00
// Patch for AUTH LOGIN
auth = LoginAuth(opts.User, opts.Passwd)
}
if auth != nil {
if err = client.Auth(auth); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("Auth: %v", err)
}
}
}
if err = client.Mail(from); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("Mail: %v", err)
}
for _, rec := range to {
if err = client.Rcpt(rec); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("Rcpt: %v", err)
}
}
w, err := client.Data()
if err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("Data: %v", err)
} else if _, err = msg.WriteTo(w); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("WriteTo: %v", err)
} else if err = w.Close(); err != nil {
2015-12-19 08:44:34 +01:00
return fmt.Errorf("Close: %v", err)
}
return client.Quit()
}
// Sender sendmail mail sender
type sendmailSender struct {
}
// Send send email
func (s *sendmailSender) Send(from string, to []string, msg io.WriterTo) error {
var err error
var closeError error
var waitError error
args := []string{"-F", from, "-i"}
args = append(args, setting.MailService.SendmailArgs...)
args = append(args, to...)
log.Trace("Sending with: %s %v", setting.MailService.SendmailPath, args)
cmd := exec.Command(setting.MailService.SendmailPath, args...)
pipe, err := cmd.StdinPipe()
if err != nil {
return err
}
if err = cmd.Start(); err != nil {
return err
}
_, err = msg.WriteTo(pipe)
2014-03-19 13:27:27 +01:00
// we MUST close the pipe or sendmail will hang waiting for more of the message
// Also we should wait on our sendmail command even if something fails
closeError = pipe.Close()
waitError = cmd.Wait()
if err != nil {
return err
} else if closeError != nil {
return closeError
} else {
return waitError
}
}
func processMailQueue() {
for {
select {
case msg := <-mailQueue:
log.Trace("New e-mail sending request %s: %s", msg.GetHeader("To"), msg.Info)
if err := gomail.Send(Sender, msg.Message); err != nil {
log.Error(3, "Failed to send emails %s: %s - %v", msg.GetHeader("To"), msg.Info, err)
} else {
log.Trace("E-mails sent %s: %s", msg.GetHeader("To"), msg.Info)
2014-03-19 13:27:27 +01:00
}
}
}
}
2014-03-19 13:27:27 +01:00
var mailQueue chan *Message
// Sender sender for sending mail synchronously
var Sender gomail.Sender
2016-11-25 02:44:04 +01:00
// NewContext start mail queue service
func NewContext() {
// Need to check if mailQueue is nil because in during reinstall (user had installed
// before but swithed install lock off), this function will be called again
// while mail queue is already processing tasks, and produces a race condition.
if setting.MailService == nil || mailQueue != nil {
return
2014-03-19 13:27:27 +01:00
}
if setting.MailService.UseSendmail {
Sender = &sendmailSender{}
} else {
Sender = &smtpSender{}
}
mailQueue = make(chan *Message, setting.MailService.QueueLength)
go processMailQueue()
2014-03-19 13:27:27 +01:00
}
2016-11-25 02:44:04 +01:00
// SendAsync send mail asynchronous
2014-03-20 02:05:48 +01:00
func SendAsync(msg *Message) {
2014-03-19 13:27:27 +01:00
go func() {
2014-03-20 02:05:48 +01:00
mailQueue <- msg
2014-03-19 13:27:27 +01:00
}()
}