| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948 |
- rspamd_config.MAILCOW_AUTH = {
- callback = function(task)
- local uname = task:get_user()
- if uname then
- return 1
- end
- end
- }
- local monitoring_hosts = rspamd_config:add_map{
- url = "/etc/rspamd/custom/monitoring_nolog.map",
- description = "Monitoring hosts",
- type = "regexp"
- }
- rspamd_config:register_symbol({
- name = 'SMTP_ACCESS',
- type = 'postfilter',
- callback = function(task)
- local util = require("rspamd_util")
- local rspamd_logger = require "rspamd_logger"
- local rspamd_ip = require 'rspamd_ip'
- local uname = task:get_user()
- local limited_access = task:get_symbol("SMTP_LIMITED_ACCESS")
- if not uname then
- return false
- end
- if not limited_access then
- return false
- end
- local hash_key = 'SMTP_ALLOW_NETS_' .. uname
- local redis_params = rspamd_parse_redis_server('smtp_access')
- local ip = task:get_from_ip()
- if ip == nil or not ip:is_valid() then
- return false
- end
- local from_ip_string = tostring(ip)
- smtp_access_table = {from_ip_string}
- local maxbits = 128
- local minbits = 32
- if ip:get_version() == 4 then
- maxbits = 32
- minbits = 8
- end
- for i=maxbits,minbits,-1 do
- local nip = ip:apply_mask(i):to_string() .. "/" .. i
- table.insert(smtp_access_table, nip)
- end
- local function smtp_access_cb(err, data)
- if err then
- rspamd_logger.infox(rspamd_config, "smtp_access query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
- return false
- else
- rspamd_logger.infox(rspamd_config, "checking ip %s for smtp_access in %s", from_ip_string, hash_key)
- for k,v in pairs(data) do
- if (v and v ~= userdata and v == '1') then
- rspamd_logger.infox(rspamd_config, "found ip in smtp_access map")
- task:insert_result(true, 'SMTP_ACCESS', 0.0, from_ip_string)
- return true
- end
- end
- rspamd_logger.infox(rspamd_config, "couldnt find ip in smtp_access map")
- task:insert_result(true, 'SMTP_ACCESS', 999.0, from_ip_string)
- return true
- end
- end
- table.insert(smtp_access_table, 1, hash_key)
- local redis_ret_user = rspamd_redis_make_request(task,
- redis_params, -- connect params
- hash_key, -- hash key
- false, -- is write
- smtp_access_cb, --callback
- 'HMGET', -- command
- smtp_access_table -- arguments
- )
- if not redis_ret_user then
- rspamd_logger.infox(rspamd_config, "cannot check smtp_access redis map")
- end
- end,
- priority = 10
- })
- rspamd_config:register_symbol({
- name = 'POSTMASTER_HANDLER',
- type = 'prefilter',
- callback = function(task)
- local rcpts = task:get_recipients('smtp')
- local rspamd_logger = require "rspamd_logger"
- local lua_util = require "lua_util"
- local from = task:get_from(1)
- -- not applying to mails with more than one rcpt to avoid bypassing filters by addressing postmaster
- if rcpts and #rcpts == 1 then
- for _,rcpt in ipairs(rcpts) do
- local rcpt_split = rspamd_str_split(rcpt['addr'], '@')
- if #rcpt_split == 2 then
- if rcpt_split[1] == 'postmaster' then
- task:set_pre_result('accept', 'whitelisting postmaster smtp rcpt', 'postmaster')
- return
- end
- end
- end
- end
- if from then
- for _,fr in ipairs(from) do
- local fr_split = rspamd_str_split(fr['addr'], '@')
- if #fr_split == 2 then
- if fr_split[1] == 'postmaster' and task:get_user() then
- -- no whitelist, keep signatures
- task:insert_result(true, 'POSTMASTER_FROM', -2500.0)
- return
- end
- end
- end
- end
- end,
- priority = 10
- })
- rspamd_config:register_symbol({
- name = 'KEEP_SPAM',
- type = 'prefilter',
- callback = function(task)
- local util = require("rspamd_util")
- local rspamd_logger = require "rspamd_logger"
- local rspamd_ip = require 'rspamd_ip'
- local uname = task:get_user()
- if uname then
- return false
- end
- local redis_params = rspamd_parse_redis_server('keep_spam')
- local ip = task:get_from_ip()
- if ip == nil or not ip:is_valid() then
- return false
- end
- -- Helper function to parse IPv6 into 8 segments
- local function ipv6_to_segments(ip_str)
- -- Remove zone identifier if present (e.g., %eth0)
- ip_str = ip_str:gsub("%%.*$", "")
-
- local segments = {}
-
- -- Handle :: compression
- if ip_str:find('::') then
- local before, after = ip_str:match('^(.*)::(.*)$')
- before = before or ''
- after = after or ''
-
- local before_parts = {}
- local after_parts = {}
-
- if before ~= '' then
- for seg in before:gmatch('[^:]+') do
- table.insert(before_parts, tonumber(seg, 16) or 0)
- end
- end
-
- if after ~= '' then
- for seg in after:gmatch('[^:]+') do
- table.insert(after_parts, tonumber(seg, 16) or 0)
- end
- end
-
- -- Add before segments
- for _, seg in ipairs(before_parts) do
- table.insert(segments, seg)
- end
-
- -- Add compressed zeros
- local zeros_needed = 8 - #before_parts - #after_parts
- for i = 1, zeros_needed do
- table.insert(segments, 0)
- end
-
- -- Add after segments
- for _, seg in ipairs(after_parts) do
- table.insert(segments, seg)
- end
- else
- -- No compression
- for seg in ip_str:gmatch('[^:]+') do
- table.insert(segments, tonumber(seg, 16) or 0)
- end
- end
-
- -- Ensure we have exactly 8 segments
- while #segments < 8 do
- table.insert(segments, 0)
- end
-
- return segments
- end
- -- Generate all common IPv6 notations
- local function get_ipv6_variants(ip_str)
- local variants = {}
- local seen = {}
-
- local function add_variant(v)
- if v and not seen[v] then
- table.insert(variants, v)
- seen[v] = true
- end
- end
-
- -- For IPv4, just return the original
- if not ip_str:find(':') then
- add_variant(ip_str)
- return variants
- end
-
- local segments = ipv6_to_segments(ip_str)
-
- -- 1. Fully expanded form (all zeros shown as 0000)
- local expanded_parts = {}
- for _, seg in ipairs(segments) do
- table.insert(expanded_parts, string.format('%04x', seg))
- end
- add_variant(table.concat(expanded_parts, ':'))
-
- -- 2. Standard form (no leading zeros, but all segments present)
- local standard_parts = {}
- for _, seg in ipairs(segments) do
- table.insert(standard_parts, string.format('%x', seg))
- end
- add_variant(table.concat(standard_parts, ':'))
-
- -- 3. Find all possible :: compressions
- -- RFC 5952: compress the longest run of consecutive zeros
- -- But we need to check all possibilities since Redis might have any form
-
- -- Find all zero runs
- local zero_runs = {}
- local in_run = false
- local run_start = 0
- local run_length = 0
-
- for i = 1, 8 do
- if segments[i] == 0 then
- if not in_run then
- in_run = true
- run_start = i
- run_length = 1
- else
- run_length = run_length + 1
- end
- else
- if in_run then
- if run_length >= 1 then -- Allow single zero compression too
- table.insert(zero_runs, {start = run_start, length = run_length})
- end
- in_run = false
- end
- end
- end
-
- -- Don't forget the last run
- if in_run and run_length >= 1 then
- table.insert(zero_runs, {start = run_start, length = run_length})
- end
-
- -- Generate variant for each zero run compression
- for _, run in ipairs(zero_runs) do
- local parts = {}
-
- -- Before compression
- for i = 1, run.start - 1 do
- table.insert(parts, string.format('%x', segments[i]))
- end
-
- -- The compression
- if run.start == 1 then
- table.insert(parts, '')
- table.insert(parts, '')
- elseif run.start + run.length - 1 == 8 then
- table.insert(parts, '')
- table.insert(parts, '')
- else
- table.insert(parts, '')
- end
-
- -- After compression
- for i = run.start + run.length, 8 do
- table.insert(parts, string.format('%x', segments[i]))
- end
-
- local compressed = table.concat(parts, ':'):gsub('::+', '::')
- add_variant(compressed)
- end
-
- return variants
- end
- local from_ip_string = tostring(ip)
- local ip_check_table = {}
-
- -- Add all variants of the exact IP
- for _, variant in ipairs(get_ipv6_variants(from_ip_string)) do
- table.insert(ip_check_table, variant)
- end
- local maxbits = 128
- local minbits = 32
- if ip:get_version() == 4 then
- maxbits = 32
- minbits = 8
- end
-
- -- Add all CIDR notations with variants
- for i=maxbits,minbits,-1 do
- local masked_ip = ip:apply_mask(i)
- local cidr_base = masked_ip:to_string()
-
- for _, variant in ipairs(get_ipv6_variants(cidr_base)) do
- local cidr = variant .. "/" .. i
- table.insert(ip_check_table, cidr)
- end
- end
-
- local function keep_spam_cb(err, data)
- if err then
- rspamd_logger.infox(rspamd_config, "keep_spam query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
- return false
- else
- for k,v in pairs(data) do
- if (v and v ~= userdata and v == '1') then
- rspamd_logger.infox(rspamd_config, "found ip %s (checked as: %s) in keep_spam map, setting pre-result accept", from_ip_string, ip_check_table[k])
- task:set_pre_result('accept', 'ip matched with forward hosts', 'keep_spam')
- task:set_flag('no_stat')
- return
- end
- end
- end
- end
-
- table.insert(ip_check_table, 1, 'KEEP_SPAM')
- local redis_ret_user = rspamd_redis_make_request(task,
- redis_params, -- connect params
- 'KEEP_SPAM', -- hash key
- false, -- is write
- keep_spam_cb, --callback
- 'HMGET', -- command
- ip_check_table -- arguments
- )
- if not redis_ret_user then
- rspamd_logger.infox(rspamd_config, "cannot check keep_spam redis map")
- end
- end,
- priority = 19
- })
- rspamd_config:register_symbol({
- name = 'TLS_HEADER',
- type = 'postfilter',
- callback = function(task)
- local rspamd_logger = require "rspamd_logger"
- local tls_tag = task:get_request_header('TLS-Version')
- if type(tls_tag) == 'nil' then
- task:set_milter_reply({
- add_headers = {['X-Last-TLS-Session-Version'] = 'None'}
- })
- else
- task:set_milter_reply({
- add_headers = {['X-Last-TLS-Session-Version'] = tostring(tls_tag)}
- })
- end
- end,
- priority = 12
- })
- rspamd_config:register_symbol({
- name = 'TAG_MOO',
- type = 'postfilter',
- flags = 'ignore_passthrough',
- callback = function(task)
- local util = require("rspamd_util")
- local rspamd_logger = require "rspamd_logger"
- local redis_params = rspamd_parse_redis_server('taghandler')
- local rspamd_http = require "rspamd_http"
- local rcpts = task:get_recipients('smtp')
- local lua_util = require "lua_util"
- local function remove_moo_tag()
- local moo_tag_header = task:get_header('X-Moo-Tag', false)
- if moo_tag_header then
- task:set_milter_reply({
- remove_headers = {['X-Moo-Tag'] = 0},
- })
- end
- return true
- end
- -- Check if we have exactly one recipient
- if not (rcpts and #rcpts == 1) then
- rspamd_logger.infox("TAG_MOO: not exactly one rcpt (%s), removing moo tag", rcpts and #rcpts or 0)
- remove_moo_tag()
- return
- end
- local rcpt_addr = rcpts[1]['addr']
- local rcpt_user = rcpts[1]['user']
- local rcpt_domain = rcpts[1]['domain']
- -- Check if recipient has a tag (contains '+')
- local tag = nil
- if rcpt_user:find('%+') then
- local base_user, tag_part = rcpt_user:match('^(.-)%+(.+)$')
- if base_user and tag_part then
- tag = tag_part
- rspamd_logger.infox("TAG_MOO: found tag in recipient: %s (base: %s, tag: %s)", rcpt_addr, base_user, tag)
- end
- end
- if not tag then
- rspamd_logger.infox("TAG_MOO: no tag found in recipient %s, removing moo tag", rcpt_addr)
- remove_moo_tag()
- return
- end
- -- Optional: Check if domain is a mailcow domain
- -- When KEEP_SPAM is active, RCPT_MAILCOW_DOMAIN might not be set
- -- If the mail is being delivered, we can assume it's valid
- local mailcow_domain = task:get_symbol("RCPT_MAILCOW_DOMAIN")
- if not mailcow_domain then
- rspamd_logger.infox("TAG_MOO: RCPT_MAILCOW_DOMAIN not set (possibly due to pre-result), proceeding anyway for domain %s", rcpt_domain)
- end
- local action = task:get_metric_action('default')
- rspamd_logger.infox("TAG_MOO: metric action: %s", action)
- -- Check if we have a pre-result (e.g., from KEEP_SPAM or POSTMASTER_HANDLER)
- local allow_processing = false
-
- if task.has_pre_result then
- local has_pre, pre_action = task:has_pre_result()
- if has_pre then
- rspamd_logger.infox("TAG_MOO: pre-result detected: %s", tostring(pre_action))
- if pre_action == 'accept' then
- allow_processing = true
- rspamd_logger.infox("TAG_MOO: pre-result is accept, will process")
- end
- end
- end
- -- Allow processing for mild actions or when we have pre-result accept
- if not allow_processing and action ~= 'no action' and action ~= 'greylist' then
- rspamd_logger.infox("TAG_MOO: skipping tag handler for action: %s", action)
- remove_moo_tag()
- return true
- end
- rspamd_logger.infox("TAG_MOO: processing allowed")
- local function http_callback(err_message, code, body, headers)
- if body ~= nil and body ~= "" then
- rspamd_logger.infox(rspamd_config, "TAG_MOO: expanding rcpt to \"%s\"", body)
- local function tag_callback_subject(err, data)
- if err or type(data) ~= 'string' or data == '' then
- rspamd_logger.infox(rspamd_config, "TAG_MOO: subject tag handler rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying subfolder tag handler...", body, data, err)
- local function tag_callback_subfolder(err, data)
- if err or type(data) ~= 'string' or data == '' then
- rspamd_logger.infox(rspamd_config, "TAG_MOO: subfolder tag handler for rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\")", body, data, err)
- remove_moo_tag()
- else
- rspamd_logger.infox("TAG_MOO: User wants subfolder tag, adding X-Moo-Tag header")
- task:set_milter_reply({
- add_headers = {['X-Moo-Tag'] = 'YES'}
- })
- end
- end
- local redis_ret_subfolder = rspamd_redis_make_request(task,
- redis_params, -- connect params
- body, -- hash key
- false, -- is write
- tag_callback_subfolder, --callback
- 'HGET', -- command
- {'RCPT_WANTS_SUBFOLDER_TAG', body} -- arguments
- )
- if not redis_ret_subfolder then
- rspamd_logger.infox(rspamd_config, "TAG_MOO: cannot make request to load tag handler for rcpt")
- remove_moo_tag()
- end
- else
- rspamd_logger.infox("TAG_MOO: user wants subject modified for tagged mail")
- local sbj = task:get_header('Subject') or ''
- new_sbj = '=?UTF-8?B?' .. tostring(util.encode_base64('[' .. tag .. '] ' .. sbj)) .. '?='
- task:set_milter_reply({
- remove_headers = {
- ['Subject'] = 1,
- ['X-Moo-Tag'] = 0
- },
- add_headers = {['Subject'] = new_sbj}
- })
- end
- end
- local redis_ret_subject = rspamd_redis_make_request(task,
- redis_params, -- connect params
- body, -- hash key
- false, -- is write
- tag_callback_subject, --callback
- 'HGET', -- command
- {'RCPT_WANTS_SUBJECT_TAG', body} -- arguments
- )
- if not redis_ret_subject then
- rspamd_logger.infox(rspamd_config, "TAG_MOO: cannot make request to load tag handler for rcpt")
- remove_moo_tag()
- end
- else
- rspamd_logger.infox("TAG_MOO: alias expansion returned empty body")
- remove_moo_tag()
- end
- end
- local rcpt_split = rspamd_str_split(rcpt_addr, '@')
- if #rcpt_split == 2 then
- if rcpt_split[1]:match('^postmaster') then
- rspamd_logger.infox(rspamd_config, "TAG_MOO: not expanding postmaster alias")
- remove_moo_tag()
- else
- rspamd_logger.infox("TAG_MOO: requesting alias expansion for %s", rcpt_addr)
- rspamd_http.request({
- task=task,
- url='http://nginx:8081/aliasexp.php',
- body='',
- callback=http_callback,
- headers={Rcpt=rcpt_addr},
- })
- end
- else
- rspamd_logger.infox("TAG_MOO: invalid rcpt format")
- remove_moo_tag()
- end
- end,
- priority = 19
- })
- rspamd_config:register_symbol({
- name = 'BCC',
- type = 'postfilter',
- flags = 'ignore_passthrough',
- callback = function(task)
- local util = require("rspamd_util")
- local rspamd_http = require "rspamd_http"
- local rspamd_logger = require "rspamd_logger"
- local from_table = {}
- local rcpt_table = {}
- if task:has_symbol('ENCRYPTED_CHAT') then
- return -- stop
- end
- local send_mail = function(task, bcc_dest)
- local lua_smtp = require "lua_smtp"
- local function sendmail_cb(ret, err)
- if not ret then
- rspamd_logger.errx(task, 'BCC SMTP ERROR: %s', err)
- else
- rspamd_logger.infox(rspamd_config, "BCC SMTP SUCCESS TO %s", bcc_dest)
- end
- end
- if not bcc_dest then
- return -- stop
- end
- -- dot stuff content before sending
- local email_content = tostring(task:get_content())
- email_content = string.gsub(email_content, "\r\n%.", "\r\n..")
- -- send mail
- local from_smtp = task:get_from('smtp')
- local from_addr = (from_smtp and from_smtp[1] and from_smtp[1].addr) or 'mailer-daemon@localhost'
- lua_smtp.sendmail({
- task = task,
- host = os.getenv("IPV4_NETWORK") .. '.253',
- port = 591,
- from = from_addr,
- recipients = bcc_dest,
- helo = 'bcc',
- timeout = 20,
- }, email_content, sendmail_cb)
- end
- -- determine from
- local from = task:get_from('smtp')
- if from then
- for _, a in ipairs(from) do
- table.insert(from_table, a['addr']) -- add this rcpt to table
- table.insert(from_table, '@' .. a['domain']) -- add this rcpts domain to table
- end
- else
- return -- stop
- end
- -- determine rcpts
- local rcpts = task:get_recipients('smtp')
- if rcpts then
- for _, a in ipairs(rcpts) do
- table.insert(rcpt_table, a['addr']) -- add this rcpt to table
- table.insert(rcpt_table, '@' .. a['domain']) -- add this rcpts domain to table
- end
- else
- return -- stop
- end
- local action = task:get_metric_action('default')
- rspamd_logger.infox("BCC: metric action: %s", action)
- -- Check for pre-result accept (e.g., from KEEP_SPAM)
- local allow_bcc = false
- if task.has_pre_result then
- local has_pre, pre_action = task:has_pre_result()
- if has_pre and pre_action == 'accept' then
- allow_bcc = true
- rspamd_logger.infox("BCC: pre-result accept detected, will send BCC")
- end
- end
- -- Allow BCC for mild actions or when we have pre-result accept
- if not allow_bcc and action ~= 'no action' and action ~= 'add header' and action ~= 'rewrite subject' then
- rspamd_logger.infox("BCC: skipping for action: %s", action)
- return
- end
- local function rcpt_callback(err_message, code, body, headers)
- if err_message == nil and code == 201 and body ~= nil then
- rspamd_logger.infox("BCC: sending BCC to %s for rcpt match", body)
- send_mail(task, body)
- end
- end
- local function from_callback(err_message, code, body, headers)
- if err_message == nil and code == 201 and body ~= nil then
- rspamd_logger.infox("BCC: sending BCC to %s for from match", body)
- send_mail(task, body)
- end
- end
- if rcpt_table then
- for _,e in ipairs(rcpt_table) do
- rspamd_logger.infox(rspamd_config, "BCC: checking bcc for rcpt address %s", e)
- rspamd_http.request({
- task=task,
- url='http://nginx:8081/bcc.php',
- body='',
- callback=rcpt_callback,
- headers={Rcpt=e}
- })
- end
- end
- if from_table then
- for _,e in ipairs(from_table) do
- rspamd_logger.infox(rspamd_config, "BCC: checking bcc for from address %s", e)
- rspamd_http.request({
- task=task,
- url='http://nginx:8081/bcc.php',
- body='',
- callback=from_callback,
- headers={From=e}
- })
- end
- end
- -- Don't return true to avoid symbol being logged
- end,
- priority = 20
- })
- rspamd_config:register_symbol({
- name = 'DYN_RL_CHECK',
- type = 'prefilter',
- callback = function(task)
- local util = require("rspamd_util")
- local redis_params = rspamd_parse_redis_server('dyn_rl')
- local rspamd_logger = require "rspamd_logger"
- local envfrom = task:get_from(1)
- local envrcpt = task:get_recipients(1) or {}
- local uname = task:get_user()
- if not envfrom or not uname then
- return false
- end
- local uname = uname:lower()
- if #envrcpt == 1 and envrcpt[1].addr:lower() == uname then
- return false
- end
- local env_from_domain = envfrom[1].domain:lower() -- get smtp from domain in lower case
- local function redis_cb_user(err, data)
- if err or type(data) ~= 'string' then
- rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for user %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying dynamic ratelimit for domain...", uname, data, err)
- local function redis_key_cb_domain(err, data)
- if err or type(data) ~= 'string' then
- rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for domain %s returned invalid or empty data (\"%s\") or error (\"%s\")", env_from_domain, data, err)
- else
- rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for domain %s with value %s", env_from_domain, data)
- task:insert_result('DYN_RL', 0.0, data, env_from_domain)
- end
- end
- local redis_ret_domain = rspamd_redis_make_request(task,
- redis_params, -- connect params
- env_from_domain, -- hash key
- false, -- is write
- redis_key_cb_domain, --callback
- 'HGET', -- command
- {'RL_VALUE', env_from_domain} -- arguments
- )
- if not redis_ret_domain then
- rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for domain")
- end
- else
- rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for user %s with value %s", uname, data)
- task:insert_result('DYN_RL', 0.0, data, uname)
- end
- end
- local redis_ret_user = rspamd_redis_make_request(task,
- redis_params, -- connect params
- uname, -- hash key
- false, -- is write
- redis_cb_user, --callback
- 'HGET', -- command
- {'RL_VALUE', uname} -- arguments
- )
- if not redis_ret_user then
- rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for user")
- end
- return true
- end,
- flags = 'empty',
- priority = 20
- })
- rspamd_config:register_symbol({
- name = 'NO_LOG_STAT',
- type = 'postfilter',
- callback = function(task)
- local from = task:get_header('From')
- if from and (monitoring_hosts:get_key(from) or from == "watchdog@localhost") then
- task:set_flag('no_log')
- task:set_flag('no_stat')
- end
- end
- })
- rspamd_config:register_symbol({
- name = 'MOO_FOOTER',
- type = 'prefilter',
- callback = function(task)
- local cjson = require "cjson"
- local lua_mime = require "lua_mime"
- local lua_util = require "lua_util"
- local rspamd_logger = require "rspamd_logger"
- local rspamd_http = require "rspamd_http"
- local envfrom = task:get_from(1)
- local uname = task:get_user()
- if not envfrom or not uname then
- return false
- end
- local uname = uname:lower()
- local env_from_domain = envfrom[1].domain:lower()
- local env_from_addr = envfrom[1].addr:lower()
- -- determine newline type
- local function newline(task)
- local t = task:get_newlines_type()
- if t == 'cr' then
- return '\r'
- elseif t == 'lf' then
- return '\n'
- end
- return '\r\n'
- end
- -- retrieve footer
- local function footer_cb(err_message, code, data, headers)
- if err or type(data) ~= 'string' then
- rspamd_logger.infox(rspamd_config, "domain wide footer request for user %s returned invalid or empty data (\"%s\") or error (\"%s\")", uname, data, err)
- else
- -- parse json string
- local footer = cjson.decode(data)
- if not footer then
- rspamd_logger.infox(rspamd_config, "parsing domain wide footer for user %s returned invalid or empty data (\"%s\") or error (\"%s\")", uname, data, err)
- else
- if footer and type(footer) == "table" and (footer.html and footer.html ~= "" or footer.plain and footer.plain ~= "") then
- rspamd_logger.infox(rspamd_config, "found domain wide footer for user %s: html=%s, plain=%s, vars=%s", uname, footer.html, footer.plain, footer.vars)
- if footer.skip_replies ~= 0 then
- in_reply_to = task:get_header_raw('in-reply-to')
- if in_reply_to then
- rspamd_logger.infox(rspamd_config, "mail is a reply - skip footer")
- return
- end
- end
- local envfrom_mime = task:get_from(2)
- local from_name = ""
- if envfrom_mime and envfrom_mime[1].name then
- from_name = envfrom_mime[1].name
- elseif envfrom and envfrom[1].name then
- from_name = envfrom[1].name
- end
- -- default replacements
- local replacements = {
- auth_user = uname,
- from_user = envfrom[1].user,
- from_name = from_name,
- from_addr = envfrom[1].addr,
- from_domain = envfrom[1].domain:lower()
- }
- -- add custom mailbox attributes
- if footer.vars and type(footer.vars) == "string" then
- local footer_vars = cjson.decode(footer.vars)
- if type(footer_vars) == "table" then
- for key, value in pairs(footer_vars) do
- replacements[key] = value
- end
- end
- end
- if footer.html and footer.html ~= "" then
- footer.html = lua_util.jinja_template(footer.html, replacements, true)
- end
- if footer.plain and footer.plain ~= "" then
- footer.plain = lua_util.jinja_template(footer.plain, replacements, true)
- end
- -- add footer
- local out = {}
- local rewrite = lua_mime.add_text_footer(task, footer.html, footer.plain) or {}
- local seen_cte
- local newline_s = newline(task)
- local function rewrite_ct_cb(name, hdr)
- if rewrite.need_rewrite_ct then
- if name:lower() == 'content-type' then
- -- include boundary if present
- local boundary_part = rewrite.new_ct.boundary and
- string.format('; boundary="%s"', rewrite.new_ct.boundary) or ''
- local nct = string.format('%s: %s/%s; charset=utf-8%s',
- 'Content-Type', rewrite.new_ct.type, rewrite.new_ct.subtype, boundary_part)
- out[#out + 1] = nct
- -- update Content-Type header (include boundary if present)
- task:set_milter_reply({
- remove_headers = {['Content-Type'] = 0},
- })
- task:set_milter_reply({
- add_headers = {['Content-Type'] = string.format('%s/%s; charset=utf-8%s',
- rewrite.new_ct.type, rewrite.new_ct.subtype, boundary_part)}
- })
- return
- elseif name:lower() == 'content-transfer-encoding' then
- out[#out + 1] = string.format('%s: %s',
- 'Content-Transfer-Encoding', 'quoted-printable')
- -- update Content-Transfer-Encoding header
- task:set_milter_reply({
- remove_headers = {['Content-Transfer-Encoding'] = 0},
- })
- task:set_milter_reply({
- add_headers = {['Content-Transfer-Encoding'] = 'quoted-printable'}
- })
- seen_cte = true
- return
- end
- end
- out[#out + 1] = hdr.raw:gsub('\r?\n?$', '')
- end
- task:headers_foreach(rewrite_ct_cb, {full = true})
- if not seen_cte and rewrite.need_rewrite_ct then
- out[#out + 1] = string.format('%s: %s', 'Content-Transfer-Encoding', 'quoted-printable')
- end
- -- End of headers
- out[#out + 1] = newline_s
- if rewrite.out then
- for _,o in ipairs(rewrite.out) do
- out[#out + 1] = o
- end
- else
- out[#out + 1] = task:get_rawbody()
- end
- local out_parts = {}
- for _,o in ipairs(out) do
- if type(o) ~= 'table' then
- out_parts[#out_parts + 1] = o
- out_parts[#out_parts + 1] = newline_s
- else
- local removePrefix = "--\x0D\x0AContent-Type"
- if string.lower(string.sub(tostring(o[1]), 1, string.len(removePrefix))) == string.lower(removePrefix) then
- o[1] = string.sub(tostring(o[1]), string.len("--\x0D\x0A") + 1)
- end
- out_parts[#out_parts + 1] = o[1]
- if o[2] then
- out_parts[#out_parts + 1] = newline_s
- end
- end
- end
- task:set_message(out_parts)
- else
- rspamd_logger.infox(rspamd_config, "domain wide footer request for user %s returned invalid or empty data (\"%s\")", uname, data)
- end
- end
- end
- end
- -- fetch footer
- rspamd_http.request({
- task=task,
- url='http://nginx:8081/footer.php',
- body='',
- callback=footer_cb,
- headers={Domain=env_from_domain,Username=uname,From=env_from_addr},
- })
- return true
- end,
- priority = 1
- })
|