mirror of
https://github.com/Jinnrry/PMail.git
synced 2026-04-23 00:17:16 +08:00
054336fe9e
1、新增垃圾邮件过滤插件 2、使用使用github.com/dlclark/regexp2替换go原生的正则包 3、修复空数据导致的邮件插入失败
103 lines
2.4 KiB
Go
103 lines
2.4 KiB
Go
package auth
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"encoding/pem"
|
|
"github.com/Jinnrry/pmail/db"
|
|
"github.com/Jinnrry/pmail/models"
|
|
"github.com/Jinnrry/pmail/utils/context"
|
|
log "github.com/sirupsen/logrus"
|
|
"os"
|
|
"strings"
|
|
)
|
|
|
|
// HasAuth 检查当前用户是否有某个邮件的auth
|
|
func HasAuth(ctx *context.Context, email *models.Email) bool {
|
|
if ctx.IsAdmin {
|
|
return true
|
|
}
|
|
var ue *models.UserEmail
|
|
err := db.Instance.Where("email_id = ?", email.Id).Find(&ue)
|
|
if err != nil {
|
|
log.Errorf("Error while checking user: %v", err)
|
|
return false
|
|
}
|
|
|
|
return ue != nil
|
|
}
|
|
|
|
func DkimGen() string {
|
|
privKeyStr, _ := os.ReadFile("./config/dkim/dkim.priv")
|
|
publicKeyStr, _ := os.ReadFile("./config/dkim/dkim.public")
|
|
if len(privKeyStr) > 0 && len(publicKeyStr) > 0 {
|
|
return string(publicKeyStr)
|
|
}
|
|
|
|
var (
|
|
privKey crypto.Signer
|
|
err error
|
|
)
|
|
|
|
privKey, err = rsa.GenerateKey(rand.Reader, 1024)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Failed to generate key: %v", err)
|
|
}
|
|
|
|
privBytes, err := x509.MarshalPKCS8PrivateKey(privKey)
|
|
if err != nil {
|
|
log.Fatalf("Failed to marshal private key: %v", err)
|
|
}
|
|
|
|
f, err := os.OpenFile("./config/dkim/dkim.priv", os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
|
|
if err != nil {
|
|
log.Fatalf("Failed to create key file: %v", err)
|
|
}
|
|
defer f.Close()
|
|
|
|
privBlock := pem.Block{
|
|
Type: "PRIVATE KEY",
|
|
Bytes: privBytes,
|
|
}
|
|
if err := pem.Encode(f, &privBlock); err != nil {
|
|
log.Fatalf("Failed to write key PEM block: %v", err)
|
|
}
|
|
if err := f.Close(); err != nil {
|
|
log.Fatalf("Failed to close key file: %v", err)
|
|
}
|
|
|
|
var pubBytes []byte
|
|
|
|
switch pubKey := privKey.Public().(type) {
|
|
case *rsa.PublicKey:
|
|
// RFC 6376 is inconsistent about whether RSA public keys should
|
|
// be formatted as RSAPublicKey or SubjectPublicKeyInfo.
|
|
// Erratum 3017 (https://www.rfc-editor.org/errata/eid3017)
|
|
// proposes allowing both. We use SubjectPublicKeyInfo for
|
|
// consistency with other implementations including opendkim,
|
|
// Gmail, and Fastmail.
|
|
pubBytes, err = x509.MarshalPKIXPublicKey(pubKey)
|
|
if err != nil {
|
|
log.Fatalf("Failed to marshal public key: %v", err)
|
|
}
|
|
default:
|
|
panic("unreachable")
|
|
}
|
|
|
|
params := []string{
|
|
"v=DKIM1",
|
|
"k=rsa",
|
|
"p=" + base64.StdEncoding.EncodeToString(pubBytes),
|
|
}
|
|
|
|
publicKey := strings.Join(params, "; ")
|
|
|
|
os.WriteFile("./config/dkim/dkim.public", []byte(publicKey), 0666)
|
|
|
|
return publicKey
|
|
}
|