2020-07-08 06:30:18 +02:00
|
|
|
use std::env;
|
2020-05-03 17:41:53 +02:00
|
|
|
use std::str::FromStr;
|
|
|
|
|
|
|
|
use lettre::message::{header, Mailbox, Message, MultiPart, SinglePart};
|
|
|
|
use lettre::transport::smtp::authentication::{Credentials, Mechanism as SmtpAuthMechanism};
|
2020-07-05 01:59:15 +02:00
|
|
|
use lettre::transport::smtp::extension::ClientId;
|
2020-05-03 17:41:53 +02:00
|
|
|
use lettre::{Address, SmtpTransport, Tls, TlsParameters, Transport};
|
|
|
|
|
2018-12-30 23:34:31 +01:00
|
|
|
use native_tls::{Protocol, TlsConnector};
|
2019-07-30 19:38:54 +02:00
|
|
|
use percent_encoding::{percent_encode, NON_ALPHANUMERIC};
|
2018-08-15 08:32:19 +02:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
use crate::api::EmptyResult;
|
2019-12-27 18:37:14 +01:00
|
|
|
use crate::auth::{encode_jwt, generate_delete_claims, generate_invite_claims, generate_verify_email_claims};
|
2018-12-19 21:52:53 +01:00
|
|
|
use crate::error::Error;
|
2019-01-13 01:39:29 +01:00
|
|
|
use crate::CONFIG;
|
2020-07-08 06:30:18 +02:00
|
|
|
|
|
|
|
use chrono::{DateTime, Local};
|
|
|
|
use chrono_tz::Tz;
|
2018-12-19 21:52:53 +01:00
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
fn mailer() -> SmtpTransport {
|
|
|
|
let host = CONFIG.smtp_host().unwrap();
|
|
|
|
|
2020-03-19 13:56:53 +01:00
|
|
|
let client_security = if CONFIG.smtp_ssl() {
|
|
|
|
let tls = TlsConnector::builder()
|
|
|
|
.min_protocol_version(Some(Protocol::Tlsv11))
|
|
|
|
.build()
|
|
|
|
.unwrap();
|
2018-10-04 00:01:04 +02:00
|
|
|
|
2020-05-03 17:41:53 +02:00
|
|
|
let params = TlsParameters::new(host.clone(), tls);
|
2019-03-10 14:44:42 +01:00
|
|
|
|
|
|
|
if CONFIG.smtp_explicit_tls() {
|
2020-05-03 17:41:53 +02:00
|
|
|
Tls::Wrapper(params)
|
2019-03-10 14:44:42 +01:00
|
|
|
} else {
|
2020-05-03 17:41:53 +02:00
|
|
|
Tls::Required(params)
|
2019-03-10 14:44:42 +01:00
|
|
|
}
|
2018-08-15 08:32:19 +02:00
|
|
|
} else {
|
2020-05-03 17:41:53 +02:00
|
|
|
Tls::None
|
2018-08-15 08:32:19 +02:00
|
|
|
};
|
|
|
|
|
2019-11-06 21:39:33 +01:00
|
|
|
use std::time::Duration;
|
|
|
|
|
2020-05-31 17:58:06 +02:00
|
|
|
let smtp_client = SmtpTransport::builder(host).port(CONFIG.smtp_port()).tls(client_security);
|
2018-08-15 17:00:55 +02:00
|
|
|
|
2020-05-03 17:41:53 +02:00
|
|
|
let smtp_client = match (CONFIG.smtp_username(), CONFIG.smtp_password()) {
|
|
|
|
(Some(user), Some(pass)) => smtp_client.credentials(Credentials::new(user, pass)),
|
2018-10-04 00:01:04 +02:00
|
|
|
_ => smtp_client,
|
2018-08-15 17:00:55 +02:00
|
|
|
};
|
|
|
|
|
2020-07-05 01:59:15 +02:00
|
|
|
let smtp_client = match CONFIG.helo_name() {
|
|
|
|
Some(helo_name) => smtp_client.hello_name(ClientId::new(helo_name)),
|
|
|
|
None => smtp_client,
|
|
|
|
};
|
|
|
|
|
2020-03-14 22:30:50 +01:00
|
|
|
let smtp_client = match CONFIG.smtp_auth_mechanism() {
|
|
|
|
Some(mechanism) => {
|
2020-05-03 17:24:51 +02:00
|
|
|
let correct_mechanism = format!("\"{}\"", crate::util::upcase_first(mechanism.trim_matches('"')));
|
2020-03-14 22:30:50 +01:00
|
|
|
|
2020-05-03 17:41:53 +02:00
|
|
|
// TODO: Allow more than one mechanism
|
2020-03-14 22:30:50 +01:00
|
|
|
match serde_json::from_str::<SmtpAuthMechanism>(&correct_mechanism) {
|
2020-05-03 17:41:53 +02:00
|
|
|
Ok(auth_mechanism) => smtp_client.authentication(vec![auth_mechanism]),
|
2019-09-05 21:56:12 +02:00
|
|
|
_ => panic!("Failure to parse mechanism. Is it proper Json? Eg. `\"Plain\"` not `Plain`"),
|
2019-08-24 01:22:14 +02:00
|
|
|
}
|
2019-09-05 21:56:12 +02:00
|
|
|
}
|
2019-08-24 01:22:14 +02:00
|
|
|
_ => smtp_client,
|
|
|
|
};
|
|
|
|
|
2020-05-31 17:58:06 +02:00
|
|
|
smtp_client.timeout(Some(Duration::from_secs(CONFIG.smtp_timeout()))).build()
|
2018-08-15 08:32:19 +02:00
|
|
|
}
|
|
|
|
|
2019-02-10 19:12:34 +01:00
|
|
|
fn get_text(template_name: &'static str, data: serde_json::Value) -> Result<(String, String, String), Error> {
|
|
|
|
let (subject_html, body_html) = get_template(&format!("{}.html", template_name), &data)?;
|
|
|
|
let (_subject_text, body_text) = get_template(template_name, &data)?;
|
|
|
|
Ok((subject_html, body_html, body_text))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn get_template(template_name: &str, data: &serde_json::Value) -> Result<(String, String), Error> {
|
|
|
|
let text = CONFIG.render_template(template_name, data)?;
|
2019-01-13 01:39:29 +01:00
|
|
|
let mut text_split = text.split("<!---------------->");
|
|
|
|
|
|
|
|
let subject = match text_split.next() {
|
|
|
|
Some(s) => s.trim().to_string(),
|
|
|
|
None => err!("Template doesn't contain subject"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let body = match text_split.next() {
|
|
|
|
Some(s) => s.trim().to_string(),
|
|
|
|
None => err!("Template doesn't contain body"),
|
|
|
|
};
|
|
|
|
|
|
|
|
Ok((subject, body))
|
|
|
|
}
|
|
|
|
|
2020-07-08 06:30:18 +02:00
|
|
|
pub fn format_datetime(dt: &DateTime<Local>) -> String {
|
|
|
|
let fmt = "%A, %B %_d, %Y at %r %Z";
|
|
|
|
|
|
|
|
// With a DateTime<Local>, `%Z` formats as the time zone's UTC offset
|
|
|
|
// (e.g., `+00:00`). If the `TZ` environment variable is set, try to
|
|
|
|
// format as a time zone abbreviation instead (e.g., `UTC`).
|
|
|
|
if let Ok(tz) = env::var("TZ") {
|
|
|
|
if let Ok(tz) = tz.parse::<Tz>() {
|
|
|
|
return dt.with_timezone(&tz).format(fmt).to_string();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, fall back to just displaying the UTC offset.
|
|
|
|
dt.format(fmt).to_string()
|
|
|
|
}
|
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
pub fn send_password_hint(address: &str, hint: Option<String>) -> EmptyResult {
|
2019-01-13 01:39:29 +01:00
|
|
|
let template_name = if hint.is_some() {
|
2019-01-19 16:52:12 +01:00
|
|
|
"email/pw_hint_some"
|
2018-09-11 13:04:34 +02:00
|
|
|
} else {
|
2019-01-19 16:52:12 +01:00
|
|
|
"email/pw_hint_none"
|
2018-09-11 13:04:34 +02:00
|
|
|
};
|
2018-08-15 10:17:05 +02:00
|
|
|
|
2019-02-10 21:40:20 +01:00
|
|
|
let (subject, body_html, body_text) = get_text(template_name, json!({ "hint": hint, "url": CONFIG.domain() }))?;
|
2019-03-03 16:11:55 +01:00
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-01-04 16:32:51 +01:00
|
|
|
}
|
|
|
|
|
2019-11-25 06:28:49 +01:00
|
|
|
pub fn send_delete_account(address: &str, uuid: &str) -> EmptyResult {
|
2019-12-27 18:37:14 +01:00
|
|
|
let claims = generate_delete_claims(uuid.to_string());
|
2019-11-25 06:28:49 +01:00
|
|
|
let delete_token = encode_jwt(&claims);
|
|
|
|
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/delete_account",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
"user_id": uuid,
|
|
|
|
"email": percent_encode(address.as_bytes(), NON_ALPHANUMERIC).to_string(),
|
|
|
|
"token": delete_token,
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn send_verify_email(address: &str, uuid: &str) -> EmptyResult {
|
2019-12-27 18:37:14 +01:00
|
|
|
let claims = generate_verify_email_claims(uuid.to_string());
|
2019-11-25 06:28:49 +01:00
|
|
|
let verify_email_token = encode_jwt(&claims);
|
|
|
|
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/verify_email",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
"user_id": uuid,
|
|
|
|
"email": percent_encode(address.as_bytes(), NON_ALPHANUMERIC).to_string(),
|
|
|
|
"token": verify_email_token,
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn send_welcome(address: &str) -> EmptyResult {
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/welcome",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn send_welcome_must_verify(address: &str, uuid: &str) -> EmptyResult {
|
2019-12-27 18:37:14 +01:00
|
|
|
let claims = generate_verify_email_claims(uuid.to_string());
|
2019-11-25 06:28:49 +01:00
|
|
|
let verify_email_token = encode_jwt(&claims);
|
|
|
|
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/welcome_must_verify",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
"user_id": uuid,
|
|
|
|
"token": verify_email_token,
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
|
2019-01-04 16:32:51 +01:00
|
|
|
pub fn send_invite(
|
|
|
|
address: &str,
|
2019-01-06 05:03:49 +01:00
|
|
|
uuid: &str,
|
|
|
|
org_id: Option<String>,
|
|
|
|
org_user_id: Option<String>,
|
2019-01-04 16:32:51 +01:00
|
|
|
org_name: &str,
|
2019-01-06 05:03:49 +01:00
|
|
|
invited_by_email: Option<String>,
|
2019-01-04 16:32:51 +01:00
|
|
|
) -> EmptyResult {
|
2019-01-06 05:03:49 +01:00
|
|
|
let claims = generate_invite_claims(
|
2019-01-13 01:39:29 +01:00
|
|
|
uuid.to_string(),
|
|
|
|
String::from(address),
|
|
|
|
org_id.clone(),
|
|
|
|
org_user_id.clone(),
|
2019-11-02 17:39:01 +01:00
|
|
|
invited_by_email,
|
2019-01-13 01:39:29 +01:00
|
|
|
);
|
2019-01-06 05:03:49 +01:00
|
|
|
let invite_token = encode_jwt(&claims);
|
2019-01-13 01:39:29 +01:00
|
|
|
|
2019-02-10 19:12:34 +01:00
|
|
|
let (subject, body_html, body_text) = get_text(
|
2019-01-19 16:52:12 +01:00
|
|
|
"email/send_org_invite",
|
2019-01-13 01:39:29 +01:00
|
|
|
json!({
|
2019-01-25 18:23:51 +01:00
|
|
|
"url": CONFIG.domain(),
|
2019-02-08 18:45:07 +01:00
|
|
|
"org_id": org_id.unwrap_or_else(|| "_".to_string()),
|
|
|
|
"org_user_id": org_user_id.unwrap_or_else(|| "_".to_string()),
|
2019-07-30 19:38:54 +02:00
|
|
|
"email": percent_encode(address.as_bytes(), NON_ALPHANUMERIC).to_string(),
|
2019-01-13 01:39:29 +01:00
|
|
|
"org_name": org_name,
|
|
|
|
"token": invite_token,
|
|
|
|
}),
|
|
|
|
)?;
|
2019-01-04 16:32:51 +01:00
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-01-04 16:32:51 +01:00
|
|
|
}
|
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
pub fn send_invite_accepted(new_user_email: &str, address: &str, org_name: &str) -> EmptyResult {
|
2019-02-10 19:12:34 +01:00
|
|
|
let (subject, body_html, body_text) = get_text(
|
2019-01-19 16:52:12 +01:00
|
|
|
"email/invite_accepted",
|
2019-01-13 01:39:29 +01:00
|
|
|
json!({
|
2019-01-25 18:23:51 +01:00
|
|
|
"url": CONFIG.domain(),
|
2019-01-13 01:39:29 +01:00
|
|
|
"email": new_user_email,
|
|
|
|
"org_name": org_name,
|
|
|
|
}),
|
|
|
|
)?;
|
2019-01-04 16:32:51 +01:00
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-01-04 16:32:51 +01:00
|
|
|
}
|
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
pub fn send_invite_confirmed(address: &str, org_name: &str) -> EmptyResult {
|
2019-02-10 19:12:34 +01:00
|
|
|
let (subject, body_html, body_text) = get_text(
|
2019-01-19 16:52:12 +01:00
|
|
|
"email/invite_confirmed",
|
2019-01-13 01:39:29 +01:00
|
|
|
json!({
|
2019-01-25 18:23:51 +01:00
|
|
|
"url": CONFIG.domain(),
|
2019-01-13 01:39:29 +01:00
|
|
|
"org_name": org_name,
|
|
|
|
}),
|
|
|
|
)?;
|
2019-01-04 16:32:51 +01:00
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2018-08-15 08:32:19 +02:00
|
|
|
}
|
2018-12-15 03:54:03 +01:00
|
|
|
|
2020-07-08 06:30:18 +02:00
|
|
|
pub fn send_new_device_logged_in(address: &str, ip: &str, dt: &DateTime<Local>, device: &str) -> EmptyResult {
|
2019-07-22 08:26:24 +02:00
|
|
|
use crate::util::upcase_first;
|
|
|
|
let device = upcase_first(device);
|
|
|
|
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/new_device_logged_in",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
"ip": ip,
|
|
|
|
"device": device,
|
2020-07-08 06:30:18 +02:00
|
|
|
"datetime": format_datetime(dt),
|
2019-07-22 08:26:24 +02:00
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-07-22 08:26:24 +02:00
|
|
|
}
|
|
|
|
|
2019-08-03 08:07:14 +02:00
|
|
|
pub fn send_token(address: &str, token: &str) -> EmptyResult {
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/twofactor_email",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
"token": token,
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-08-03 08:07:14 +02:00
|
|
|
}
|
|
|
|
|
2019-11-25 06:28:49 +01:00
|
|
|
pub fn send_change_email(address: &str, token: &str) -> EmptyResult {
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/change_email",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
"token": token,
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
|
2020-02-26 11:02:22 +01:00
|
|
|
pub fn send_test(address: &str) -> EmptyResult {
|
|
|
|
let (subject, body_html, body_text) = get_text(
|
|
|
|
"email/smtp_test",
|
|
|
|
json!({
|
|
|
|
"url": CONFIG.domain(),
|
|
|
|
}),
|
|
|
|
)?;
|
|
|
|
|
2020-05-03 17:24:51 +02:00
|
|
|
send_email(address, &subject, &body_html, &body_text)
|
2020-02-26 11:02:22 +01:00
|
|
|
}
|
|
|
|
|
2019-02-10 19:12:34 +01:00
|
|
|
fn send_email(address: &str, subject: &str, body_html: &str, body_text: &str) -> EmptyResult {
|
2020-01-30 22:11:53 +01:00
|
|
|
let address_split: Vec<&str> = address.rsplitn(2, '@').collect();
|
|
|
|
if address_split.len() != 2 {
|
|
|
|
err!("Invalid email address (no @)");
|
|
|
|
}
|
|
|
|
|
2020-01-30 22:33:50 +01:00
|
|
|
let domain_puny = match idna::domain_to_ascii_strict(address_split[0]) {
|
2020-01-30 22:11:53 +01:00
|
|
|
Ok(d) => d,
|
|
|
|
Err(_) => err!("Can't convert email domain to ASCII representation"),
|
|
|
|
};
|
|
|
|
|
2020-01-30 22:33:50 +01:00
|
|
|
let address = format!("{}@{}", address_split[1], domain_puny);
|
2020-01-30 22:11:53 +01:00
|
|
|
|
2020-05-07 00:50:30 +02:00
|
|
|
let data = MultiPart::mixed()
|
|
|
|
.multipart(
|
|
|
|
MultiPart::alternative()
|
|
|
|
.singlepart(
|
|
|
|
SinglePart::quoted_printable()
|
|
|
|
.header(header::ContentType("text/plain; charset=utf-8".parse()?))
|
|
|
|
.body(body_text),
|
|
|
|
)
|
|
|
|
.multipart(
|
|
|
|
MultiPart::related().singlepart(
|
|
|
|
SinglePart::quoted_printable()
|
|
|
|
.header(header::ContentType("text/html; charset=utf-8".parse()?))
|
|
|
|
.body(body_html),
|
|
|
|
)
|
|
|
|
// .singlepart(SinglePart::base64() -- Inline files would go here
|
|
|
|
),
|
|
|
|
)
|
|
|
|
// .singlepart(SinglePart::base64() -- Attachments would go here
|
|
|
|
;
|
2020-05-03 17:41:53 +02:00
|
|
|
|
|
|
|
let email = Message::builder()
|
|
|
|
.to(Mailbox::new(None, Address::from_str(&address)?))
|
|
|
|
.from(Mailbox::new(
|
|
|
|
Some(CONFIG.smtp_from_name()),
|
|
|
|
Address::from_str(&CONFIG.smtp_from())?,
|
|
|
|
))
|
|
|
|
.subject(subject)
|
2020-05-07 00:50:30 +02:00
|
|
|
.multipart(data)?;
|
2019-03-07 20:21:10 +01:00
|
|
|
|
2020-05-03 17:41:53 +02:00
|
|
|
let _ = mailer().send(&email)?;
|
2020-01-26 15:29:14 +01:00
|
|
|
Ok(())
|
2019-01-13 01:39:29 +01:00
|
|
|
}
|