mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-20 23:07:33 +00:00
8f6cb47567
* take baseurl if saved on event * refactor: make es mocks reusable * Revert "refactor: make es mocks reusable" This reverts commit 434ce12a6acf639514308bc231e76ebb8676b643. * make messages testable * test asset url * fmt * fmt * simplify notification.Start * test url combinations * support init code added * support password changed * support reset pw * support user domain claimed * support add pwless login * support verify phone * Revert "support verify phone" This reverts commit e40503303e2fdda0c85985b3fe3160ce96d43cca. * save trigger origin from ctx * add ready for review check * camel * test email otp * fix variable naming * fix DefaultOTPEmailURLV2 * Revert "fix DefaultOTPEmailURLV2" This reverts commit fa34d4d2a83fbfd8353759c9148af9165a9dd44c. * fix email otp challenged test * fix email otp challenged test * pass origin in login and gateway requests * take origin from header * take x-forwarded if present * Update internal/notification/handlers/queries.go Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> * Update internal/notification/handlers/commands.go Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> * move origin header to ctx if available * generate * cleanup * use forwarded header * support X-Forwarded-* headers * standardize context handling * fix linting --------- Co-authored-by: Tim Möhlmann <tim+github@zitadel.com>
164 lines
4.4 KiB
Go
164 lines
4.4 KiB
Go
package smtp
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"net"
|
|
"net/smtp"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/zitadel/logging"
|
|
|
|
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/notification/channels"
|
|
"github.com/zitadel/zitadel/internal/notification/messages"
|
|
)
|
|
|
|
var _ channels.NotificationChannel = (*Email)(nil)
|
|
|
|
type Email struct {
|
|
smtpClient *smtp.Client
|
|
senderAddress string
|
|
senderName string
|
|
replyToAddress string
|
|
}
|
|
|
|
func InitChannel(cfg *Config) (*Email, error) {
|
|
client, err := cfg.SMTP.connectToSMTP(cfg.Tls)
|
|
if err != nil {
|
|
logging.New().WithError(err).Error("could not connect to smtp")
|
|
return nil, err
|
|
}
|
|
logging.New().Debug("successfully initialized smtp email channel")
|
|
return &Email{
|
|
smtpClient: client,
|
|
senderName: cfg.FromName,
|
|
senderAddress: cfg.From,
|
|
replyToAddress: cfg.ReplyToAddress,
|
|
}, nil
|
|
}
|
|
|
|
func (email *Email) HandleMessage(message channels.Message) error {
|
|
defer email.smtpClient.Close()
|
|
emailMsg, ok := message.(*messages.Email)
|
|
if !ok {
|
|
return caos_errs.ThrowInternal(nil, "EMAIL-s8JLs", "message is not EmailMessage")
|
|
}
|
|
|
|
if emailMsg.Content == "" || emailMsg.Subject == "" || len(emailMsg.Recipients) == 0 {
|
|
return caos_errs.ThrowInternalf(nil, "EMAIL-zGemZ", "subject, recipients and content must be set but got subject %s, recipients length %d and content length %d", emailMsg.Subject, len(emailMsg.Recipients), len(emailMsg.Content))
|
|
}
|
|
emailMsg.SenderEmail = email.senderAddress
|
|
emailMsg.SenderName = email.senderName
|
|
emailMsg.ReplyToAddress = email.replyToAddress
|
|
// To && From
|
|
if err := email.smtpClient.Mail(emailMsg.SenderEmail); err != nil {
|
|
return caos_errs.ThrowInternalf(err, "EMAIL-s3is3", "could not set sender: %v", emailMsg.SenderEmail)
|
|
}
|
|
for _, recp := range append(append(emailMsg.Recipients, emailMsg.CC...), emailMsg.BCC...) {
|
|
if err := email.smtpClient.Rcpt(recp); err != nil {
|
|
return caos_errs.ThrowInternalf(err, "EMAIL-s4is4", "could not set recipient: %v", recp)
|
|
}
|
|
}
|
|
|
|
// Data
|
|
w, err := email.smtpClient.Data()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
content, err := emailMsg.GetContent()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = w.Write([]byte(content))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = w.Close()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return email.smtpClient.Quit()
|
|
}
|
|
|
|
func (smtpConfig SMTP) connectToSMTP(tlsRequired bool) (client *smtp.Client, err error) {
|
|
host, _, err := net.SplitHostPort(smtpConfig.Host)
|
|
if err != nil {
|
|
return nil, caos_errs.ThrowInternal(err, "EMAIL-spR56", "could not split host and port for connect to smtp")
|
|
}
|
|
|
|
if !tlsRequired {
|
|
client, err = smtpConfig.getSMPTClient()
|
|
} else {
|
|
client, err = smtpConfig.getSMPTClientWithTls(host)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = smtpConfig.smtpAuth(client, host)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return client, nil
|
|
}
|
|
|
|
func (smtpConfig SMTP) getSMPTClient() (*smtp.Client, error) {
|
|
client, err := smtp.Dial(smtpConfig.Host)
|
|
if err != nil {
|
|
return nil, caos_errs.ThrowInternal(err, "EMAIL-skwos", "could not make smtp dial")
|
|
}
|
|
return client, nil
|
|
}
|
|
|
|
func (smtpConfig SMTP) getSMPTClientWithTls(host string) (*smtp.Client, error) {
|
|
conn, err := tls.Dial("tcp", smtpConfig.Host, &tls.Config{})
|
|
|
|
if errors.As(err, &tls.RecordHeaderError{}) {
|
|
logging.Log("MAIN-xKIzT").OnError(err).Warn("could not connect using normal tls. trying starttls instead...")
|
|
return smtpConfig.getSMPTClientWithStartTls(host)
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, caos_errs.ThrowInternal(err, "EMAIL-sl39s", "could not make tls dial")
|
|
}
|
|
|
|
client, err := smtp.NewClient(conn, host)
|
|
if err != nil {
|
|
return nil, caos_errs.ThrowInternal(err, "EMAIL-skwi4", "could not create smtp client")
|
|
}
|
|
return client, err
|
|
}
|
|
|
|
func (smtpConfig SMTP) getSMPTClientWithStartTls(host string) (*smtp.Client, error) {
|
|
client, err := smtpConfig.getSMPTClient()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err := client.StartTLS(&tls.Config{
|
|
ServerName: host,
|
|
}); err != nil {
|
|
return nil, caos_errs.ThrowInternal(err, "EMAIL-guvsQ", "could not start tls")
|
|
}
|
|
return client, nil
|
|
}
|
|
|
|
func (smtpConfig SMTP) smtpAuth(client *smtp.Client, host string) error {
|
|
if !smtpConfig.HasAuth() {
|
|
return nil
|
|
}
|
|
// Auth
|
|
auth := unencryptedAuth{
|
|
smtp.PlainAuth("", smtpConfig.User, smtpConfig.Password, host),
|
|
}
|
|
err := client.Auth(auth)
|
|
if err != nil {
|
|
return caos_errs.ThrowInternalf(err, "EMAIL-s9kfs", "could not add smtp auth for user %s", smtpConfig.User)
|
|
}
|
|
return nil
|
|
}
|