mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 06:21:11 +00:00 
			
		
		
		
	For the mailer and incoming_mailer config, allow passwords to be read from a file. Add `_URI` config values and use the existing `loadSecret` function to do this. Resolves https://codeberg.org/forgejo/forgejo/issues/8113 Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/8116 Reviewed-by: Gusted <gusted@noreply.codeberg.org> Reviewed-by: oliverpool <oliverpool@noreply.codeberg.org> Co-authored-by: fruzitent <fruzit@gmail.com> Co-committed-by: fruzitent <fruzit@gmail.com>
		
			
				
	
	
		
			95 lines
		
	
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			95 lines
		
	
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2023 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package setting
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/mail"
 | |
| 	"strings"
 | |
| 
 | |
| 	"forgejo.org/modules/log"
 | |
| )
 | |
| 
 | |
| var IncomingEmail = struct {
 | |
| 	Enabled              bool
 | |
| 	ReplyToAddress       string
 | |
| 	TokenPlaceholder     string `ini:"-"`
 | |
| 	Host                 string
 | |
| 	Port                 int
 | |
| 	UseTLS               bool `ini:"USE_TLS"`
 | |
| 	SkipTLSVerify        bool `ini:"SKIP_TLS_VERIFY"`
 | |
| 	Username             string
 | |
| 	Password             string
 | |
| 	Mailbox              string
 | |
| 	DeleteHandledMessage bool
 | |
| 	MaximumMessageSize   uint32
 | |
| }{
 | |
| 	Mailbox:              "INBOX",
 | |
| 	DeleteHandledMessage: true,
 | |
| 	TokenPlaceholder:     "%{token}",
 | |
| 	MaximumMessageSize:   10485760,
 | |
| }
 | |
| 
 | |
| func loadIncomingEmailFrom(rootCfg ConfigProvider) {
 | |
| 	mustMapSetting(rootCfg, "email.incoming", &IncomingEmail)
 | |
| 
 | |
| 	if !IncomingEmail.Enabled {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// Handle aliases
 | |
| 	sec := rootCfg.Section("email.incoming")
 | |
| 	if sec.HasKey("USER") && !sec.HasKey("USERNAME") {
 | |
| 		IncomingEmail.Username = sec.Key("USER").String()
 | |
| 	}
 | |
| 
 | |
| 	if sec.HasKey("PASSWD") && !sec.HasKey("PASSWORD") {
 | |
| 		sec.Key("PASSWORD").SetValue(sec.Key("PASSWD").String())
 | |
| 	}
 | |
| 	if sec.HasKey("PASSWD_URI") && !sec.HasKey("PASSWORD_URI") {
 | |
| 		sec.Key("PASSWORD_URI").SetValue(sec.Key("PASSWD_URI").String())
 | |
| 	}
 | |
| 	IncomingEmail.Password = loadSecret(sec, "PASSWORD_URI", "PASSWORD")
 | |
| 
 | |
| 	// Infer Port if not set
 | |
| 	if IncomingEmail.Port == 0 {
 | |
| 		if IncomingEmail.UseTLS {
 | |
| 			IncomingEmail.Port = 993
 | |
| 		} else {
 | |
| 			IncomingEmail.Port = 143
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err := checkReplyToAddress(); err != nil {
 | |
| 		log.Fatal("Invalid incoming_mail.REPLY_TO_ADDRESS (%s): %v", IncomingEmail.ReplyToAddress, err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func checkReplyToAddress() error {
 | |
| 	parsed, err := mail.ParseAddress(IncomingEmail.ReplyToAddress)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if parsed.Name != "" {
 | |
| 		return errors.New("name must not be set")
 | |
| 	}
 | |
| 
 | |
| 	c := strings.Count(IncomingEmail.ReplyToAddress, IncomingEmail.TokenPlaceholder)
 | |
| 	switch c {
 | |
| 	case 0:
 | |
| 		return fmt.Errorf("%s must appear in the user part of the address (before the @)", IncomingEmail.TokenPlaceholder)
 | |
| 	case 1:
 | |
| 	default:
 | |
| 		return fmt.Errorf("%s must appear only once", IncomingEmail.TokenPlaceholder)
 | |
| 	}
 | |
| 
 | |
| 	parts := strings.Split(IncomingEmail.ReplyToAddress, "@")
 | |
| 	if !strings.Contains(parts[0], IncomingEmail.TokenPlaceholder) {
 | |
| 		return fmt.Errorf("%s must appear in the user part of the address (before the @)", IncomingEmail.TokenPlaceholder)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |