// Copyright (c) 2023 Proton AG // // This file is part of Proton Mail Bridge. // // Proton Mail Bridge is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // Proton Mail Bridge is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with Proton Mail Bridge. If not, see . package bridge import ( "context" "fmt" "github.com/ProtonMail/gluon/reporter" "github.com/ProtonMail/proton-bridge/v3/internal" "github.com/ProtonMail/proton-bridge/v3/internal/events" "github.com/ProtonMail/proton-bridge/v3/internal/safe" "github.com/ProtonMail/proton-bridge/v3/internal/user" "github.com/ProtonMail/proton-bridge/v3/internal/vault" "github.com/sirupsen/logrus" ) func (bridge *Bridge) handleUserEvent(ctx context.Context, user *user.User, event events.Event) error { switch event := event.(type) { case events.UserAddressCreated: if err := bridge.handleUserAddressCreated(ctx, user, event); err != nil { return fmt.Errorf("failed to handle user address created event: %w", err) } case events.UserAddressEnabled: if err := bridge.handleUserAddressEnabled(ctx, user, event); err != nil { return fmt.Errorf("failed to handle user address enabled event: %w", err) } case events.UserAddressDisabled: if err := bridge.handleUserAddressDisabled(ctx, user, event); err != nil { return fmt.Errorf("failed to handle user address disabled event: %w", err) } case events.UserAddressDeleted: if err := bridge.handleUserAddressDeleted(ctx, user, event); err != nil { return fmt.Errorf("failed to handle user address deleted event: %w", err) } case events.UserRefreshed: if err := bridge.handleUserRefreshed(ctx, user); err != nil { return fmt.Errorf("failed to handle user refreshed event: %w", err) } case events.UserDeauth: bridge.handleUserDeauth(ctx, user) case events.UserBadEvent: bridge.handleUserBadEvent(ctx, user, event.Error) case events.UncategorizedEventError: bridge.handleUncategorizedErrorEvent(event) } return nil } func (bridge *Bridge) handleUserAddressCreated(ctx context.Context, user *user.User, event events.UserAddressCreated) error { if user.GetAddressMode() != vault.SplitMode { return nil } if bridge.imapServer == nil { return fmt.Errorf("no imap server instance running") } gluonID, err := bridge.imapServer.AddUser(ctx, user.NewIMAPConnector(event.AddressID), user.GluonKey()) if err != nil { return fmt.Errorf("failed to add user to IMAP server: %w", err) } if err := user.SetGluonID(event.AddressID, gluonID); err != nil { return fmt.Errorf("failed to set gluon ID: %w", err) } return nil } func (bridge *Bridge) handleUserAddressEnabled(ctx context.Context, user *user.User, event events.UserAddressEnabled) error { if user.GetAddressMode() != vault.SplitMode { return nil } gluonID, err := bridge.imapServer.AddUser(ctx, user.NewIMAPConnector(event.AddressID), user.GluonKey()) if err != nil { return fmt.Errorf("failed to add user to IMAP server: %w", err) } if err := user.SetGluonID(event.AddressID, gluonID); err != nil { return fmt.Errorf("failed to set gluon ID: %w", err) } return nil } func (bridge *Bridge) handleUserAddressDisabled(ctx context.Context, user *user.User, event events.UserAddressDisabled) error { if user.GetAddressMode() != vault.SplitMode { return nil } gluonID, ok := user.GetGluonID(event.AddressID) if !ok { return fmt.Errorf("gluon ID not found for address %s", event.AddressID) } if err := bridge.imapServer.RemoveUser(ctx, gluonID, true); err != nil { return fmt.Errorf("failed to remove user from IMAP server: %w", err) } if err := user.RemoveGluonID(event.AddressID, gluonID); err != nil { return fmt.Errorf("failed to remove gluon ID for address: %w", err) } return nil } func (bridge *Bridge) handleUserAddressDeleted(ctx context.Context, user *user.User, event events.UserAddressDeleted) error { if user.GetAddressMode() != vault.SplitMode { return nil } if bridge.imapServer == nil { return fmt.Errorf("no imap server instance running") } gluonID, ok := user.GetGluonID(event.AddressID) if !ok { return fmt.Errorf("gluon ID not found for address %s", event.AddressID) } if err := bridge.imapServer.RemoveUser(ctx, gluonID, true); err != nil { return fmt.Errorf("failed to remove user from IMAP server: %w", err) } if err := user.RemoveGluonID(event.AddressID, gluonID); err != nil { return fmt.Errorf("failed to remove gluon ID for address: %w", err) } return nil } func (bridge *Bridge) handleUserRefreshed(ctx context.Context, user *user.User) error { return safe.RLockRet(func() error { if err := bridge.removeIMAPUser(ctx, user, true); err != nil { return fmt.Errorf("failed to remove IMAP user: %w", err) } if err := bridge.addIMAPUser(ctx, user); err != nil { return fmt.Errorf("failed to add IMAP user: %w", err) } return nil }, bridge.usersLock) } func (bridge *Bridge) handleUserDeauth(ctx context.Context, user *user.User) { safe.Lock(func() { bridge.logoutUser(ctx, user, false, false) }, bridge.usersLock) } func (bridge *Bridge) handleUserBadEvent(ctx context.Context, user *user.User, err error) { safe.Lock(func() { if rerr := bridge.reporter.ReportMessageWithContext("Failed to handle event", reporter.Context{ "error_type": fmt.Sprintf("%T", internal.ErrCause(err)), "error": err, }); rerr != nil { logrus.WithError(rerr).Error("Failed to report failed event handling") } bridge.logoutUser(ctx, user, true, false) }, bridge.usersLock) } func (bridge *Bridge) handleUncategorizedErrorEvent(event events.UncategorizedEventError) { if rerr := bridge.reporter.ReportMessageWithContext("Failed to handle due to uncategorized error", reporter.Context{ "error_type": fmt.Sprintf("%T", internal.ErrCause(event.Error)), "error": event.Error, }); rerr != nil { logrus.WithError(rerr).Error("Failed to report failed event handling") } }