| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501 | 
							- rspamd_config.MAILCOW_AUTH = {
 
- 	callback = function(task)
 
- 		local uname = task:get_user()
 
- 		if uname then
 
- 			return 1
 
- 		end
 
- 	end
 
- }
 
- local monitoring_hosts = rspamd_config:add_map{
 
-   url = "/etc/rspamd/custom/monitoring_nolog.map",
 
-   description = "Monitoring hosts",
 
-   type = "regexp"
 
- }
 
- rspamd_config:register_symbol({
 
-   name = 'SMTP_ACCESS',
 
-   type = 'postfilter',
 
-   callback = function(task)
 
-     local util = require("rspamd_util")
 
-     local rspamd_logger = require "rspamd_logger"
 
-     local rspamd_ip = require 'rspamd_ip'
 
-     local uname = task:get_user()
 
-     local limited_access = task:get_symbol("SMTP_LIMITED_ACCESS")
 
-     if not uname then
 
-       return false
 
-     end
 
-     if not limited_access then
 
-       return false
 
-     end
 
-     local hash_key = 'SMTP_ALLOW_NETS_' .. uname
 
-     local redis_params = rspamd_parse_redis_server('smtp_access')
 
-     local ip = task:get_from_ip()
 
-     if ip == nil or not ip:is_valid() then
 
-       return false
 
-     end
 
-     local from_ip_string = tostring(ip)
 
-     smtp_access_table = {from_ip_string}
 
-     local maxbits = 128
 
-     local minbits = 32
 
-     if ip:get_version() == 4 then
 
-         maxbits = 32
 
-         minbits = 8
 
-     end
 
-     for i=maxbits,minbits,-1 do
 
-       local nip = ip:apply_mask(i):to_string() .. "/" .. i
 
-       table.insert(smtp_access_table, nip)
 
-     end
 
-     local function smtp_access_cb(err, data)
 
-       if err then
 
-         rspamd_logger.infox(rspamd_config, "smtp_access query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
 
-         return false
 
-       else
 
-         rspamd_logger.infox(rspamd_config, "checking ip %s for smtp_access in %s", from_ip_string, hash_key)
 
-         for k,v in pairs(data) do
 
-           if (v and v ~= userdata and v == '1') then
 
-             rspamd_logger.infox(rspamd_config, "found ip in smtp_access map")
 
-             task:insert_result(true, 'SMTP_ACCESS', 0.0, from_ip_string)
 
-             return true
 
-           end
 
-         end
 
-         rspamd_logger.infox(rspamd_config, "couldnt find ip in smtp_access map")
 
-         task:insert_result(true, 'SMTP_ACCESS', 999.0, from_ip_string)
 
-         return true
 
-       end
 
-     end
 
-     table.insert(smtp_access_table, 1, hash_key)
 
-     local redis_ret_user = rspamd_redis_make_request(task,
 
-       redis_params, -- connect params
 
-       hash_key, -- hash key
 
-       false, -- is write
 
-       smtp_access_cb, --callback
 
-       'HMGET', -- command
 
-       smtp_access_table -- arguments
 
-     )
 
-     if not redis_ret_user then
 
-       rspamd_logger.infox(rspamd_config, "cannot check smtp_access redis map")
 
-     end
 
-   end,
 
-   priority = 10
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'POSTMASTER_HANDLER',
 
-   type = 'prefilter',
 
-   callback = function(task)
 
-   local rcpts = task:get_recipients('smtp')
 
-   local rspamd_logger = require "rspamd_logger"
 
-   local lua_util = require "lua_util"
 
-   local from = task:get_from(1)
 
-   -- not applying to mails with more than one rcpt to avoid bypassing filters by addressing postmaster
 
-   if rcpts and #rcpts == 1 then
 
-     for _,rcpt in ipairs(rcpts) do
 
-       local rcpt_split = rspamd_str_split(rcpt['addr'], '@')
 
-       if #rcpt_split == 2 then
 
-         if rcpt_split[1] == 'postmaster' then
 
-           task:set_pre_result('accept', 'whitelisting postmaster smtp rcpt')
 
-           return
 
-         end
 
-       end
 
-     end
 
-   end
 
-   if from then
 
-     for _,fr in ipairs(from) do
 
-       local fr_split = rspamd_str_split(fr['addr'], '@')
 
-       if #fr_split == 2 then
 
-         if fr_split[1] == 'postmaster' and task:get_user() then
 
-           -- no whitelist, keep signatures
 
-           task:insert_result(true, 'POSTMASTER_FROM', -2500.0)
 
-           return
 
-         end
 
-       end
 
-     end
 
-   end
 
-   end,
 
-   priority = 10
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'KEEP_SPAM',
 
-   type = 'prefilter',
 
-   callback = function(task)
 
-     local util = require("rspamd_util")
 
-     local rspamd_logger = require "rspamd_logger"
 
-     local rspamd_ip = require 'rspamd_ip'
 
-     local uname = task:get_user()
 
-     if uname then
 
-       return false
 
-     end
 
-     local redis_params = rspamd_parse_redis_server('keep_spam')
 
-     local ip = task:get_from_ip()
 
-     if ip == nil or not ip:is_valid() then
 
-       return false
 
-     end
 
-     local from_ip_string = tostring(ip)
 
-     ip_check_table = {from_ip_string}
 
-     local maxbits = 128
 
-     local minbits = 32
 
-     if ip:get_version() == 4 then
 
-         maxbits = 32
 
-         minbits = 8
 
-     end
 
-     for i=maxbits,minbits,-1 do
 
-       local nip = ip:apply_mask(i):to_string() .. "/" .. i
 
-       table.insert(ip_check_table, nip)
 
-     end
 
-     local function keep_spam_cb(err, data)
 
-       if err then
 
-         rspamd_logger.infox(rspamd_config, "keep_spam query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
 
-         return false
 
-       else
 
-         for k,v in pairs(data) do
 
-           if (v and v ~= userdata and v == '1') then
 
-             rspamd_logger.infox(rspamd_config, "found ip in keep_spam map, setting pre-result")
 
-             task:set_pre_result('accept', 'ip matched with forward hosts')
 
-           end
 
-         end
 
-       end
 
-     end
 
-     table.insert(ip_check_table, 1, 'KEEP_SPAM')
 
-     local redis_ret_user = rspamd_redis_make_request(task,
 
-       redis_params, -- connect params
 
-       'KEEP_SPAM', -- hash key
 
-       false, -- is write
 
-       keep_spam_cb, --callback
 
-       'HMGET', -- command
 
-       ip_check_table -- arguments
 
-     )
 
-     if not redis_ret_user then
 
-       rspamd_logger.infox(rspamd_config, "cannot check keep_spam redis map")
 
-     end
 
-   end,
 
-   priority = 19
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'TLS_HEADER',
 
-   type = 'postfilter',
 
-   callback = function(task)
 
-     local rspamd_logger = require "rspamd_logger"
 
-     local tls_tag = task:get_request_header('TLS-Version')
 
-     if type(tls_tag) == 'nil' then
 
-       task:set_milter_reply({
 
-         add_headers = {['X-Last-TLS-Session-Version'] = 'None'}
 
-       })
 
-     else
 
-       task:set_milter_reply({
 
-         add_headers = {['X-Last-TLS-Session-Version'] = tostring(tls_tag)}
 
-       })
 
-     end
 
-   end,
 
-   priority = 12
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'TAG_MOO',
 
-   type = 'postfilter',
 
-   callback = function(task)
 
-     local util = require("rspamd_util")
 
-     local rspamd_logger = require "rspamd_logger"
 
-     local redis_params = rspamd_parse_redis_server('taghandler')
 
-     local rspamd_http = require "rspamd_http"
 
-     local rcpts = task:get_recipients('smtp')
 
-     local lua_util = require "lua_util"
 
-     local tagged_rcpt = task:get_symbol("TAGGED_RCPT")
 
-     local mailcow_domain = task:get_symbol("RCPT_MAILCOW_DOMAIN")
 
-     if tagged_rcpt and tagged_rcpt[1].options and mailcow_domain then
 
-       local tag = tagged_rcpt[1].options[1]
 
-       rspamd_logger.infox("found tag: %s", tag)
 
-       local action = task:get_metric_action('default')
 
-       rspamd_logger.infox("metric action now: %s", action)
 
-       if action ~= 'no action' and action ~= 'greylist' then
 
-         rspamd_logger.infox("skipping tag handler for action: %s", action)
 
-         return true
 
-       end
 
-       local function http_callback(err_message, code, body, headers)
 
-         if body ~= nil and body ~= "" then
 
-           rspamd_logger.infox(rspamd_config, "expanding rcpt to \"%s\"", body)
 
-           local function tag_callback_subject(err, data)
 
-             if err or type(data) ~= 'string' then
 
-               rspamd_logger.infox(rspamd_config, "subject tag handler rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying subfolder tag handler...", body, data, err)
 
-               local function tag_callback_subfolder(err, data)
 
-                 if err or type(data) ~= 'string' then
 
-                   rspamd_logger.infox(rspamd_config, "subfolder tag handler for rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\")", body, data, err)
 
-                 else
 
-                   rspamd_logger.infox("Add X-Moo-Tag header")
 
-                   task:set_milter_reply({
 
-                     add_headers = {['X-Moo-Tag'] = 'YES'}
 
-                   })
 
-                 end
 
-               end
 
-               local redis_ret_subfolder = rspamd_redis_make_request(task,
 
-                 redis_params, -- connect params
 
-                 body, -- hash key
 
-                 false, -- is write
 
-                 tag_callback_subfolder, --callback
 
-                 'HGET', -- command
 
-                 {'RCPT_WANTS_SUBFOLDER_TAG', body} -- arguments
 
-               )
 
-               if not redis_ret_subfolder then
 
-                 rspamd_logger.infox(rspamd_config, "cannot make request to load tag handler for rcpt")
 
-               end
 
-             else
 
-               rspamd_logger.infox("user wants subject modified for tagged mail")
 
-               local sbj = task:get_header('Subject')
 
-               new_sbj = '=?UTF-8?B?' .. tostring(util.encode_base64('[' .. tag .. '] ' .. sbj)) .. '?='
 
-               task:set_milter_reply({
 
-                 remove_headers = {['Subject'] = 1},
 
-                 add_headers = {['Subject'] = new_sbj}
 
-               })
 
-             end
 
-           end
 
-           local redis_ret_subject = rspamd_redis_make_request(task,
 
-             redis_params, -- connect params
 
-             body, -- hash key
 
-             false, -- is write
 
-             tag_callback_subject, --callback
 
-             'HGET', -- command
 
-             {'RCPT_WANTS_SUBJECT_TAG', body} -- arguments
 
-           )
 
-           if not redis_ret_subject then
 
-             rspamd_logger.infox(rspamd_config, "cannot make request to load tag handler for rcpt")
 
-           end
 
-         end
 
-       end
 
-       if rcpts and #rcpts == 1 then
 
-         for _,rcpt in ipairs(rcpts) do
 
-           local rcpt_split = rspamd_str_split(rcpt['addr'], '@')
 
-           if #rcpt_split == 2 then
 
-             if rcpt_split[1] == 'postmaster' then
 
-               rspamd_logger.infox(rspamd_config, "not expanding postmaster alias")
 
-             else
 
-               rspamd_http.request({
 
-                 task=task,
 
-                 url='http://nginx:8081/aliasexp.php',
 
-                 body='',
 
-                 callback=http_callback,
 
-                 headers={Rcpt=rcpt['addr']},
 
-               })
 
-             end
 
-           end
 
-         end
 
-       end
 
-     end
 
-   end,
 
-   priority = 19
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'BCC',
 
-   type = 'postfilter',
 
-   callback = function(task)
 
-     local util = require("rspamd_util")
 
-     local rspamd_http = require "rspamd_http"
 
-     local rspamd_logger = require "rspamd_logger"
 
-     local from_table = {}
 
-     local rcpt_table = {}
 
-     if task:has_symbol('ENCRYPTED_CHAT') then
 
-       return -- stop
 
-     end
 
-     local send_mail = function(task, bcc_dest)
 
-       local lua_smtp = require "lua_smtp"
 
-       local function sendmail_cb(ret, err)
 
-         if not ret then
 
-           rspamd_logger.errx(task, 'BCC SMTP ERROR: %s', err)
 
-         else
 
-           rspamd_logger.infox(rspamd_config, "BCC SMTP SUCCESS TO %s", bcc_dest)
 
-         end
 
-       end
 
-       if not bcc_dest then
 
-         return -- stop
 
-       end
 
-       lua_smtp.sendmail({
 
-         task = task,
 
-         host = os.getenv("IPV4_NETWORK") .. '.253',
 
-         port = 591,
 
-         from = task:get_from(stp)[1].addr,
 
-         recipients = bcc_dest,
 
-         helo = 'bcc',
 
-         timeout = 10,
 
-       }, task:get_content(), sendmail_cb)
 
-     end
 
-     -- determine from
 
-     local from = task:get_from('smtp')
 
-     if from then
 
-       for _, a in ipairs(from) do
 
-         table.insert(from_table, a['addr']) -- add this rcpt to table
 
-         table.insert(from_table, '@' .. a['domain']) -- add this rcpts domain to table
 
-       end
 
-     else
 
-       return -- stop
 
-     end
 
-     -- determine rcpts
 
-     local rcpts = task:get_recipients('smtp')
 
-     if rcpts then
 
-       for _, a in ipairs(rcpts) do
 
-         table.insert(rcpt_table, a['addr']) -- add this rcpt to table
 
-         table.insert(rcpt_table, '@' .. a['domain']) -- add this rcpts domain to table
 
-       end
 
-     else
 
-       return -- stop
 
-     end
 
-     local action = task:get_metric_action('default')
 
-     rspamd_logger.infox("metric action now: %s", action)
 
-     local function rcpt_callback(err_message, code, body, headers)
 
-       if err_message == nil and code == 201 and body ~= nil then
 
-         if action == 'no action' or action == 'add header' or action == 'rewrite subject' then
 
-           send_mail(task, body)
 
-         end
 
-       end
 
-     end
 
-     local function from_callback(err_message, code, body, headers)
 
-       if err_message == nil and code == 201 and body ~= nil then
 
-         if action == 'no action' or action == 'add header' or action == 'rewrite subject' then
 
-           send_mail(task, body)
 
-         end
 
-       end
 
-     end
 
-     if rcpt_table then
 
-       for _,e in ipairs(rcpt_table) do
 
-         rspamd_logger.infox(rspamd_config, "checking bcc for rcpt address %s", e)
 
-         rspamd_http.request({
 
-           task=task,
 
-           url='http://nginx:8081/bcc.php',
 
-           body='',
 
-           callback=rcpt_callback,
 
-           headers={Rcpt=e}
 
-         })
 
-       end
 
-     end
 
-     if from_table then
 
-       for _,e in ipairs(from_table) do
 
-         rspamd_logger.infox(rspamd_config, "checking bcc for from address %s", e)
 
-         rspamd_http.request({
 
-           task=task,
 
-           url='http://nginx:8081/bcc.php',
 
-           body='',
 
-           callback=from_callback,
 
-           headers={From=e}
 
-         })
 
-       end
 
-     end
 
-     return true
 
-   end,
 
-   priority = 20
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'DYN_RL_CHECK',
 
-   type = 'prefilter',
 
-   callback = function(task)
 
-     local util = require("rspamd_util")
 
-     local redis_params = rspamd_parse_redis_server('dyn_rl')
 
-     local rspamd_logger = require "rspamd_logger"
 
-     local envfrom = task:get_from(1)
 
-     local uname = task:get_user()
 
-     if not envfrom or not uname then
 
-       return false
 
-     end
 
-     local uname = uname:lower()
 
-     local env_from_domain = envfrom[1].domain:lower() -- get smtp from domain in lower case
 
-     local function redis_cb_user(err, data)
 
-       if err or type(data) ~= 'string' then
 
-         rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for user %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying dynamic ratelimit for domain...", uname, data, err)
 
-         local function redis_key_cb_domain(err, data)
 
-           if err or type(data) ~= 'string' then
 
-             rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for domain %s returned invalid or empty data (\"%s\") or error (\"%s\")", env_from_domain, data, err)
 
-           else
 
-             rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for domain %s with value %s", env_from_domain, data)
 
-             task:insert_result('DYN_RL', 0.0, data, env_from_domain)
 
-           end
 
-         end
 
-         local redis_ret_domain = rspamd_redis_make_request(task,
 
-           redis_params, -- connect params
 
-           env_from_domain, -- hash key
 
-           false, -- is write
 
-           redis_key_cb_domain, --callback
 
-           'HGET', -- command
 
-           {'RL_VALUE', env_from_domain} -- arguments
 
-         )
 
-         if not redis_ret_domain then
 
-           rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for domain")
 
-         end
 
-       else
 
-         rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for user %s with value %s", uname, data)
 
-         task:insert_result('DYN_RL', 0.0, data, uname)
 
-       end
 
-     end
 
-     local redis_ret_user = rspamd_redis_make_request(task,
 
-       redis_params, -- connect params
 
-       uname, -- hash key
 
-       false, -- is write
 
-       redis_cb_user, --callback
 
-       'HGET', -- command
 
-       {'RL_VALUE', uname} -- arguments
 
-     )
 
-     if not redis_ret_user then
 
-       rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for user")
 
-     end
 
-     return true
 
-   end,
 
-   flags = 'empty',
 
-   priority = 20
 
- })
 
- rspamd_config:register_symbol({
 
-   name = 'NO_LOG_STAT',
 
-   type = 'postfilter',
 
-   callback = function(task)
 
-     local from = task:get_header('From')
 
-     if from and (monitoring_hosts:get_key(from) or from == "watchdog@localhost") then
 
-       task:set_flag('no_log')
 
-       task:set_flag('no_stat')
 
-     end
 
-   end
 
- })
 
 
  |