mailtrain/routes/settings.js

229 lines
8.1 KiB
JavaScript
Raw Normal View History

2016-04-04 12:36:30 +00:00
'use strict';
2016-04-11 03:26:20 +00:00
let config = require('config');
2016-04-04 12:36:30 +00:00
let passport = require('../lib/passport');
let express = require('express');
let router = new express.Router();
let tools = require('../lib/tools');
let nodemailer = require('nodemailer');
let mailer = require('../lib/mailer');
2016-04-11 03:26:20 +00:00
let url = require('url');
2016-07-28 14:10:38 +00:00
let multer = require('multer');
let upload = multer();
2017-02-17 13:56:55 +00:00
let aws = require('aws-sdk');
2017-03-04 16:15:16 +00:00
let util = require('util');
let _ = require('../lib/translate')._;
2016-04-04 12:36:30 +00:00
let settings = require('../lib/models/settings');
2017-02-17 13:56:55 +00:00
let allowedKeys = ['service_url', 'smtp_hostname', 'smtp_port', 'smtp_encryption', 'smtp_disable_auth', 'smtp_user', 'smtp_pass', 'admin_email', 'smtp_log', 'smtp_max_connections', 'smtp_max_messages', 'smtp_self_signed', 'default_from', 'default_address', 'default_subject', 'default_homepage', 'default_postaddress', 'default_sender', 'verp_hostname', 'verp_use', 'disable_wysiwyg', 'pgp_private_key', 'pgp_passphrase', 'ua_code', 'shoutout', 'disable_confirmations', 'smtp_throttling', 'dkim_api_key', 'dkim_private_key', 'dkim_selector', 'dkim_domain', 'mail_transport', 'ses_key', 'ses_secret', 'ses_region'];
2016-04-04 12:36:30 +00:00
router.all('/*', (req, res, next) => {
if (!req.user) {
2017-03-04 16:15:16 +00:00
req.flash('danger', _('Need to be logged in to access restricted content'));
2016-04-04 12:36:30 +00:00
return res.redirect('/users/login?next=' + encodeURIComponent(req.originalUrl));
}
res.setSelectedMenu('/settings');
next();
});
router.get('/', passport.csrfProtection, (req, res, next) => {
settings.list((err, configItems) => {
if (err) {
return next(err);
}
configItems.smtpEncryption = [{
checked: configItems.smtpEncryption === 'TLS' || !configItems.smtpEncryption,
key: 'TLS',
2017-03-04 16:15:16 +00:00
value: _('Use TLS'),
description: _('usually selected for port 465')
2016-04-04 12:36:30 +00:00
}, {
checked: configItems.smtpEncryption === 'STARTTLS',
key: 'STARTTLS',
2017-03-04 16:15:16 +00:00
value: _('Use STARTTLS'),
description: _('usually selected for port 587 and 25')
2016-04-04 12:36:30 +00:00
}, {
checked: configItems.smtpEncryption === 'NONE',
key: 'NONE',
2017-03-04 16:15:16 +00:00
value: _('Do not use encryption')
2016-04-04 12:36:30 +00:00
}];
2017-02-17 13:56:55 +00:00
configItems.sesRegion = [{
checked: configItems.sesRegion === 'us-east-1' || !configItems.sesRegion,
key: 'us-east-1',
value: 'US-EAST-1'
}, {
checked: configItems.sesRegion === 'us-west-2',
key: 'us-west-2',
value: 'US-WEST-2'
}, {
checked: configItems.sesRegion === 'eu-west-1',
key: 'eu-west-1',
value: 'EU-WEST-1'
}];
configItems.useSMTP = configItems.mailTransport === 'smtp' || !configItems.mailTransport;
configItems.useSES = configItems.mailTransport === 'ses';
2016-04-11 03:26:20 +00:00
let urlparts = url.parse(configItems.serviceUrl);
configItems.verpHostname = configItems.verpHostname || 'bounces.' + (urlparts.hostname || 'localhost');
configItems.verpEnabled = config.verp.enabled;
2016-04-04 12:36:30 +00:00
configItems.csrfToken = req.csrfToken();
res.render('settings', configItems);
});
});
router.post('/update', passport.parseForm, passport.csrfProtection, (req, res) => {
let data = tools.convertKeys(req.body);
let keys = [];
let values = [];
Object.keys(data).forEach(key => {
let value = data[key].trim();
key = tools.toDbKey(key);
// ensure trailing slash for service home page
if (key === 'service_url' && value && !/\/$/.test(value)) {
value = value + '/';
}
if (allowedKeys.indexOf(key) >= 0) {
keys.push(key);
values.push(value);
2016-04-04 12:36:30 +00:00
}
});
2016-04-04 12:36:30 +00:00
// checkboxs are not included in value listing if left unchecked
['smtp_log', 'smtp_self_signed', 'smtp_disable_auth', 'verp_use', 'disable_wysiwyg', 'disable_confirmations'].forEach(key => {
if (keys.indexOf(key) < 0) {
keys.push(key);
values.push('');
}
});
2016-04-04 12:36:30 +00:00
let i = 0;
let storeSettings = () => {
if (i >= keys.length) {
mailer.update();
tools.workers.forEach(worker => {
worker.send({
reload: true
});
});
2017-03-04 16:15:16 +00:00
req.flash('success', _('Settings updated'));
return res.redirect('/settings');
}
let key = keys[i];
let value = values[i];
i++;
2016-04-11 03:26:20 +00:00
settings.set(key, value, err => {
if (err) {
req.flash('danger', err && err.message || err);
return res.redirect('/settings');
2016-04-11 03:26:20 +00:00
}
storeSettings();
2016-04-11 03:26:20 +00:00
});
};
2016-04-04 12:36:30 +00:00
storeSettings();
2016-04-04 12:36:30 +00:00
});
2016-07-28 14:10:38 +00:00
router.post('/smtp-verify', upload.array(), passport.parseForm, passport.csrfProtection, (req, res) => {
let data = tools.convertKeys(req.body);
// checkboxs are not included in value listing if left unchecked
['smtpLog', 'smtpSelfSigned', 'smtpDisableAuth'].forEach(key => {
if (!data.hasOwnProperty(key)) {
data[key] = false;
} else {
data[key] = true;
2016-04-04 12:36:30 +00:00
}
2016-07-28 14:10:38 +00:00
});
2016-04-04 12:36:30 +00:00
2017-02-17 13:56:55 +00:00
let transportOptions;
if (data.mailTransport === 'smtp') {
transportOptions = {
host: data.smtpHostname,
port: Number(data.smtpPort) || false,
secure: data.smtpEncryption === 'TLS',
ignoreTLS: data.smtpEncryption === 'NONE',
auth: data.smtpDisableAuth ? false : {
user: data.smtpUser,
pass: data.smtpPass
},
tls: {
rejectUnauthorized: !data.smtpSelfSigned
}
};
} else if (data.mailTransport === 'ses') {
transportOptions = {
SES: new aws.SES({
apiVersion: '2010-12-01',
accessKeyId: data.sesKey,
secretAccessKey: data.sesSecret,
region: data.sesRegion
})
};
} else {
return res.json({
2017-03-04 16:15:16 +00:00
error: _('Invalid mail transport type')
2017-02-17 13:56:55 +00:00
});
}
let transport = nodemailer.createTransport(transportOptions);
2016-04-04 12:36:30 +00:00
2016-07-28 14:10:38 +00:00
transport.verify(err => {
if (err) {
let message = '';
switch (err.code) {
2017-02-17 13:56:55 +00:00
case 'InvalidClientTokenId':
2017-03-04 16:15:16 +00:00
message = _('Invalid Access Key');
2017-02-17 13:56:55 +00:00
break;
case 'SignatureDoesNotMatch':
2017-03-04 16:15:16 +00:00
message = _('Invalid AWS credentials');
2017-02-17 13:56:55 +00:00
break;
2016-07-28 14:10:38 +00:00
case 'ECONNREFUSED':
2017-03-04 16:15:16 +00:00
message = _('Connection refused, check hostname and port.');
2016-07-28 14:10:38 +00:00
break;
case 'ETIMEDOUT':
if ((err.message || '').indexOf('Greeting never received') === 0) {
if (data.smtpEncryption !== 'TLS') {
2017-03-04 16:15:16 +00:00
message = _('Did not receive greeting message from server. This might happen when connecting to a TLS port without using TLS.');
2016-04-04 12:36:30 +00:00
} else {
2017-03-04 16:15:16 +00:00
message = _('Did not receive greeting message from server.');
2016-04-04 12:36:30 +00:00
}
2016-07-28 14:10:38 +00:00
} else {
2017-03-04 16:15:16 +00:00
message = _('Connection timed out. Check your firewall settings, destination port is probably blocked.');
2016-07-28 14:10:38 +00:00
}
break;
case 'EAUTH':
if (/\b5\.7\.0\b/.test(err.message) && data.smtpEncryption !== 'STARTTLS') {
2017-03-04 16:15:16 +00:00
message = _('Authentication not accepted, server expects STARTTLS to be used.');
2016-07-28 14:10:38 +00:00
} else {
2017-03-04 16:15:16 +00:00
message = _('Authentication failed, check username and password.');
2016-07-28 14:10:38 +00:00
}
break;
2016-04-04 12:36:30 +00:00
}
2016-07-28 14:10:38 +00:00
if (!message && err.reason) {
message = err.reason;
}
res.json({
2017-03-04 16:15:16 +00:00
error: (message || _('Failed Mailer verification.')) + (err.response ? ' ' + util.format(_('Server responded with: "%s"'), err.response) : '')
2016-07-28 14:10:38 +00:00
});
} else {
res.json({
2017-03-04 16:15:16 +00:00
message: _('Mailer settings verified, ready to send some mail!')
2016-07-28 14:10:38 +00:00
});
}
2016-04-04 12:36:30 +00:00
});
2016-07-28 14:10:38 +00:00
2016-04-04 12:36:30 +00:00
});
module.exports = router;