mirror of
https://blitiri.com.ar/repos/chasquid
synced 2025-12-17 14:37:02 +00:00
This patch adds support for TLS-wrapped submission connections. Instead of clients establishing a connection over plain text and then using STARTTLS to switch over a TLS connection, this new mode allows the clients to connect directly over TLS, like it's done in HTTPS. This is not an official standard yet, but it's reasonably common in practice, and provides some advantages over the traditional submission port. The default port is 465, commonly used for this; chasquid defaults to systemd file descriptor passing as for the other protocols (for now).
346 lines
8.7 KiB
Go
346 lines
8.7 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"expvar"
|
|
"flag"
|
|
"fmt"
|
|
"html/template"
|
|
"io/ioutil"
|
|
"math/rand"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"time"
|
|
|
|
"blitiri.com.ar/go/chasquid/internal/config"
|
|
"blitiri.com.ar/go/chasquid/internal/courier"
|
|
"blitiri.com.ar/go/chasquid/internal/log"
|
|
"blitiri.com.ar/go/chasquid/internal/maillog"
|
|
"blitiri.com.ar/go/chasquid/internal/normalize"
|
|
"blitiri.com.ar/go/chasquid/internal/smtpsrv"
|
|
"blitiri.com.ar/go/chasquid/internal/sts"
|
|
"blitiri.com.ar/go/chasquid/internal/systemd"
|
|
"blitiri.com.ar/go/chasquid/internal/userdb"
|
|
|
|
"net/http"
|
|
_ "net/http/pprof"
|
|
)
|
|
|
|
// Command-line flags.
|
|
var (
|
|
configDir = flag.String("config_dir", "/etc/chasquid",
|
|
"configuration directory")
|
|
showVer = flag.Bool("version", false, "show version and exit")
|
|
)
|
|
|
|
// Build information, overridden at build time using
|
|
// -ldflags="-X main.version=blah".
|
|
var (
|
|
version = "undefined"
|
|
sourceDateTs = "0"
|
|
)
|
|
|
|
var (
|
|
versionVar = expvar.NewString("chasquid/version")
|
|
|
|
sourceDate time.Time
|
|
sourceDateVar = expvar.NewString("chasquid/sourceDateStr")
|
|
sourceDateTsVar = expvar.NewInt("chasquid/sourceDateTimestamp")
|
|
)
|
|
|
|
func main() {
|
|
flag.Parse()
|
|
log.Init()
|
|
|
|
parseVersionInfo()
|
|
if *showVer {
|
|
fmt.Printf("chasquid %s (source date: %s)\n", version, sourceDate)
|
|
return
|
|
}
|
|
|
|
log.Infof("chasquid starting (version %s)", version)
|
|
|
|
// Seed the PRNG, just to prevent for it to be totally predictable.
|
|
rand.Seed(time.Now().UnixNano())
|
|
|
|
conf, err := config.Load(*configDir + "/chasquid.conf")
|
|
if err != nil {
|
|
log.Fatalf("Error reading config: %v", err)
|
|
}
|
|
config.LogConfig(conf)
|
|
|
|
// Change to the config dir.
|
|
// This allow us to use relative paths for configuration directories.
|
|
// It also can be useful in unusual environments and for testing purposes,
|
|
// where paths inside the configuration itself could be relative, and this
|
|
// fixes the point of reference.
|
|
os.Chdir(*configDir)
|
|
|
|
initMailLog(conf.MailLogPath)
|
|
|
|
if conf.MonitoringAddress != "" {
|
|
launchMonitoringServer(conf.MonitoringAddress)
|
|
}
|
|
|
|
s := smtpsrv.NewServer()
|
|
s.Hostname = conf.Hostname
|
|
s.MaxDataSize = conf.MaxDataSizeMb * 1024 * 1024
|
|
s.PostDataHook = "hooks/post-data"
|
|
|
|
s.SetAliasesConfig(conf.SuffixSeparators, conf.DropCharacters)
|
|
|
|
// Load certificates from "certs/<directory>/{fullchain,privkey}.pem".
|
|
// The structure matches letsencrypt's, to make it easier for that case.
|
|
log.Infof("Loading certificates")
|
|
for _, info := range mustReadDir("certs/") {
|
|
name := info.Name()
|
|
dir := filepath.Join("certs/", name)
|
|
if fi, err := os.Stat(dir); err == nil && !fi.IsDir() {
|
|
// Skip non-directories.
|
|
continue
|
|
}
|
|
|
|
log.Infof(" %s", name)
|
|
|
|
certPath := filepath.Join(dir, "fullchain.pem")
|
|
if _, err := os.Stat(certPath); os.IsNotExist(err) {
|
|
continue
|
|
}
|
|
keyPath := filepath.Join(dir, "privkey.pem")
|
|
if _, err := os.Stat(keyPath); os.IsNotExist(err) {
|
|
continue
|
|
}
|
|
|
|
err := s.AddCerts(certPath, keyPath)
|
|
if err != nil {
|
|
log.Fatalf(" %v", err)
|
|
}
|
|
}
|
|
|
|
// Load domains from "domains/".
|
|
log.Infof("Domain config paths:")
|
|
for _, info := range mustReadDir("domains/") {
|
|
domain, err := normalize.Domain(info.Name())
|
|
if err != nil {
|
|
log.Fatalf("Invalid name %+q: %v", info.Name(), err)
|
|
}
|
|
dir := filepath.Join("domains", info.Name())
|
|
loadDomain(domain, dir, s)
|
|
}
|
|
|
|
// Always include localhost as local domain.
|
|
// This can prevent potential trouble if we were to accidentally treat it
|
|
// as a remote domain (for loops, alias resolutions, etc.).
|
|
s.AddDomain("localhost")
|
|
|
|
dinfo := s.InitDomainInfo(conf.DataDir + "/domaininfo")
|
|
|
|
stsCache, err := sts.NewCache(conf.DataDir + "/sts-cache")
|
|
if err != nil {
|
|
log.Fatalf("Failed to initialize STS cache: %v", err)
|
|
}
|
|
go stsCache.PeriodicallyRefresh(context.Background())
|
|
|
|
localC := &courier.Procmail{
|
|
Binary: conf.MailDeliveryAgentBin,
|
|
Args: conf.MailDeliveryAgentArgs,
|
|
Timeout: 30 * time.Second,
|
|
}
|
|
remoteC := &courier.SMTP{Dinfo: dinfo, STSCache: stsCache}
|
|
s.InitQueue(conf.DataDir+"/queue", localC, remoteC)
|
|
|
|
// Load the addresses and listeners.
|
|
systemdLs, err := systemd.Listeners()
|
|
if err != nil {
|
|
log.Fatalf("Error getting systemd listeners: %v", err)
|
|
}
|
|
|
|
loadAddresses(s, conf.SmtpAddress,
|
|
systemdLs["smtp"], smtpsrv.ModeSMTP)
|
|
loadAddresses(s, conf.SubmissionAddress,
|
|
systemdLs["submission"], smtpsrv.ModeSubmission)
|
|
loadAddresses(s, conf.SubmissionOverTlsAddress,
|
|
systemdLs["submission_tls"], smtpsrv.ModeSubmissionTLS)
|
|
|
|
s.ListenAndServe()
|
|
}
|
|
|
|
func loadAddresses(srv *smtpsrv.Server, addrs []string, ls []net.Listener, mode smtpsrv.SocketMode) {
|
|
// Load addresses.
|
|
acount := 0
|
|
for _, addr := range addrs {
|
|
// The "systemd" address indicates we get listeners via systemd.
|
|
if addr == "systemd" {
|
|
srv.AddListeners(ls, mode)
|
|
acount += len(ls)
|
|
} else {
|
|
srv.AddAddr(addr, mode)
|
|
acount++
|
|
}
|
|
}
|
|
|
|
if acount == 0 {
|
|
log.Errorf("No %v addresses/listeners", mode)
|
|
log.Errorf("If using systemd, check that you named the sockets")
|
|
log.Fatalf("Exiting")
|
|
}
|
|
}
|
|
|
|
func initMailLog(path string) {
|
|
var err error
|
|
|
|
if path == "<syslog>" {
|
|
maillog.Default, err = maillog.NewSyslog()
|
|
} else {
|
|
os.MkdirAll(filepath.Dir(path), 0775)
|
|
var f *os.File
|
|
f, err = os.OpenFile(path, os.O_WRONLY|os.O_APPEND|os.O_CREATE, 0664)
|
|
maillog.Default = maillog.New(f)
|
|
}
|
|
|
|
if err != nil {
|
|
log.Fatalf("Error opening mail log: %v", err)
|
|
}
|
|
}
|
|
|
|
// Helper to load a single domain configuration into the server.
|
|
func loadDomain(name, dir string, s *smtpsrv.Server) {
|
|
log.Infof(" %s", name)
|
|
s.AddDomain(name)
|
|
|
|
if _, err := os.Stat(dir + "/users"); err == nil {
|
|
log.Infof(" adding users")
|
|
udb, err := userdb.Load(dir + "/users")
|
|
if err != nil {
|
|
log.Errorf(" error: %v", err)
|
|
} else {
|
|
s.AddUserDB(name, udb)
|
|
}
|
|
}
|
|
|
|
log.Infof(" adding aliases")
|
|
err := s.AddAliasesFile(name, dir+"/aliases")
|
|
if err != nil {
|
|
log.Errorf(" error: %v", err)
|
|
}
|
|
}
|
|
|
|
// Read a directory, which must have at least some entries.
|
|
func mustReadDir(path string) []os.FileInfo {
|
|
dirs, err := ioutil.ReadDir(path)
|
|
if err != nil {
|
|
log.Fatalf("Error reading %q directory: %v", path, err)
|
|
}
|
|
if len(dirs) == 0 {
|
|
log.Fatalf("No entries found in %q", path)
|
|
}
|
|
|
|
return dirs
|
|
}
|
|
|
|
func parseVersionInfo() {
|
|
versionVar.Set(version)
|
|
|
|
sdts, err := strconv.ParseInt(sourceDateTs, 10, 0)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
sourceDate = time.Unix(sdts, 0)
|
|
sourceDateVar.Set(sourceDate.Format("2006-01-02 15:04:05 -0700"))
|
|
sourceDateTsVar.Set(sdts)
|
|
}
|
|
|
|
func launchMonitoringServer(addr string) {
|
|
log.Infof("Monitoring HTTP server listening on %s", addr)
|
|
|
|
indexData := struct {
|
|
Version string
|
|
SourceDate time.Time
|
|
StartTime time.Time
|
|
}{
|
|
Version: version,
|
|
SourceDate: sourceDate,
|
|
StartTime: time.Now(),
|
|
}
|
|
|
|
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
|
if r.URL.Path != "/" {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
if err := monitoringHTMLIndex.Execute(w, indexData); err != nil {
|
|
log.Infof("monitoring handler error: %v", err)
|
|
}
|
|
})
|
|
|
|
flags := dumpFlags()
|
|
http.HandleFunc("/debug/flags", func(w http.ResponseWriter, r *http.Request) {
|
|
w.Write([]byte(flags))
|
|
})
|
|
|
|
go http.ListenAndServe(addr, nil)
|
|
}
|
|
|
|
// Static index for the monitoring website.
|
|
var monitoringHTMLIndex = template.Must(template.New("index").Funcs(
|
|
template.FuncMap{"since": time.Since}).Parse(
|
|
`<!DOCTYPE html>
|
|
<html>
|
|
<head>
|
|
<title>chasquid monitoring</title>
|
|
</head>
|
|
<body>
|
|
<h1>chasquid monitoring</h1>
|
|
|
|
chasquid {{.Version}}<br>
|
|
source date {{.SourceDate.Format "2006-01-02 15:04:05 -0700"}}<p>
|
|
|
|
started {{.StartTime.Format "Mon, 2006-01-02 15:04:05 -0700"}}<br>
|
|
up since {{.StartTime | since}}<p>
|
|
|
|
<ul>
|
|
<li><a href="/debug/queue">queue</a>
|
|
<li><a href="/debug/vars">exported variables</a>
|
|
<small><a href="https://golang.org/pkg/expvar/">(ref)</a></small>
|
|
<li>traces <small><a href="https://godoc.org/golang.org/x/net/trace">
|
|
(ref)</a></small>
|
|
<ul>
|
|
<li><a href="/debug/requests?exp=1">requests (short-lived)</a>
|
|
<li><a href="/debug/events?exp=1">events (long-lived)</a>
|
|
</ul>
|
|
<li><a href="/debug/flags">flags</a>
|
|
<li><a href="/debug/pprof">pprof</a>
|
|
<small><a href="https://golang.org/pkg/net/http/pprof/">
|
|
(ref)</a></small>
|
|
<ul>
|
|
<li><a href="/debug/pprof/goroutine?debug=1">goroutines</a>
|
|
</ul>
|
|
</ul>
|
|
</body>
|
|
</html>
|
|
`))
|
|
|
|
// dumpFlags to a string, for troubleshooting purposes.
|
|
func dumpFlags() string {
|
|
s := ""
|
|
visited := make(map[string]bool)
|
|
|
|
// Print set flags first, then the rest.
|
|
flag.Visit(func(f *flag.Flag) {
|
|
s += fmt.Sprintf("-%s=%s\n", f.Name, f.Value.String())
|
|
visited[f.Name] = true
|
|
})
|
|
|
|
s += "\n"
|
|
flag.VisitAll(func(f *flag.Flag) {
|
|
if !visited[f.Name] {
|
|
s += fmt.Sprintf("-%s=%s\n", f.Name, f.Value.String())
|
|
}
|
|
})
|
|
|
|
return s
|
|
}
|