forked from Silverfish/proton-bridge
- GODT-1158: simple on-disk cache in store - GODT-1158: better member naming in event loop - GODT-1158: create on-disk cache during bridge setup - GODT-1158: better job options - GODT-1158: rename GetLiteral to GetRFC822 - GODT-1158: rename events -> currentEvents - GODT-1158: unlock cache per-user - GODT-1158: clean up cache after logout - GODT-1158: randomized encrypted cache passphrase - GODT-1158: Opt out of on-disk cache in settings - GODT-1158: free space in cache - GODT-1158: make tests compile - GODT-1158: optional compression - GODT-1158: cache custom location - GODT-1158: basic capacity checker - GODT-1158: cache free space config - GODT-1158: only unlock cache if pmapi client is unlocked as well - GODT-1158: simple background sync worker - GODT-1158: set size/bodystructure when caching message - GODT-1158: limit store db update blocking with semaphore - GODT-1158: dumb 10-semaphore - GODT-1158: properly handle delete; remove bad bodystructure handling - GODT-1158: hacky fix for caching after logout... baaaaad - GODT-1158: cache worker - GODT-1158: compute body structure lazily - GODT-1158: cache size in store - GODT-1158: notify cacher when adding to store - GODT-1158: 15 second store cache watcher - GODT-1158: enable cacher - GODT-1158: better cache worker starting/stopping - GODT-1158: limit cacher to less concurrency than disk cache - GODT-1158: message builder prio + pchan pkg - GODT-1158: fix pchan, use in message builder - GODT-1158: no sem in cacher (rely on message builder prio) - GODT-1158: raise priority of existing jobs when requested - GODT-1158: pending messages in on-disk cache - GODT-1158: WIP just a note about deleting messages from disk cache - GODT-1158: pending wait when trying to write - GODT-1158: pending.add to return bool - GODT-1225: Headers in bodystructure are stored as bytes. - GODT-1158: fixing header caching - GODT-1158: don't cache in background - GODT-1158: all concurrency set in settings - GODT-1158: worker pools inside message builder - GODT-1158: fix linter issues - GODT-1158: remove completed builds from builder - GODT-1158: remove builder pool - GODT-1158: cacher defer job done properly - GODT-1158: fix linter - GODT-1299: Continue with bodystructure build if deserialization failed - GODT-1324: Delete messages from the cache when they are deleted on the server - GODT-1158: refactor cache tests - GODT-1158: move builder to app/bridge - GODT-1306: Migrate cache on disk when location is changed (and delete when disabled)
281 lines
7.8 KiB
Go
281 lines
7.8 KiB
Go
// Copyright (c) 2021 Proton Technologies AG
|
|
//
|
|
// This file is part of ProtonMail Bridge.
|
|
//
|
|
// ProtonMail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// ProtonMail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with ProtonMail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
// Package bridge implements the bridge CLI application.
|
|
package bridge
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"time"
|
|
|
|
"github.com/ProtonMail/proton-bridge/internal/api"
|
|
"github.com/ProtonMail/proton-bridge/internal/app/base"
|
|
"github.com/ProtonMail/proton-bridge/internal/bridge"
|
|
"github.com/ProtonMail/proton-bridge/internal/config/settings"
|
|
pkgTLS "github.com/ProtonMail/proton-bridge/internal/config/tls"
|
|
"github.com/ProtonMail/proton-bridge/internal/constants"
|
|
"github.com/ProtonMail/proton-bridge/internal/frontend"
|
|
"github.com/ProtonMail/proton-bridge/internal/frontend/types"
|
|
"github.com/ProtonMail/proton-bridge/internal/imap"
|
|
"github.com/ProtonMail/proton-bridge/internal/smtp"
|
|
"github.com/ProtonMail/proton-bridge/internal/store/cache"
|
|
"github.com/ProtonMail/proton-bridge/internal/updater"
|
|
"github.com/ProtonMail/proton-bridge/pkg/message"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
const (
|
|
flagLogIMAP = "log-imap"
|
|
flagLogSMTP = "log-smtp"
|
|
flagNoWindow = "no-window"
|
|
flagNonInteractive = "noninteractive"
|
|
)
|
|
|
|
func New(base *base.Base) *cli.App {
|
|
app := base.NewApp(run)
|
|
|
|
app.Flags = append(app.Flags, []cli.Flag{
|
|
&cli.StringFlag{
|
|
Name: flagLogIMAP,
|
|
Usage: "Enable logging of IMAP communications (all|client|server) (may contain decrypted data!)"},
|
|
&cli.BoolFlag{
|
|
Name: flagLogSMTP,
|
|
Usage: "Enable logging of SMTP communications (may contain decrypted data!)"},
|
|
&cli.BoolFlag{
|
|
Name: flagNoWindow,
|
|
Usage: "Don't show window after start"},
|
|
&cli.BoolFlag{
|
|
Name: flagNonInteractive,
|
|
Usage: "Start Bridge entirely noninteractively"},
|
|
}...)
|
|
|
|
return app
|
|
}
|
|
|
|
func run(b *base.Base, c *cli.Context) error { // nolint[funlen]
|
|
tlsConfig, err := loadTLSConfig(b)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cache, err := loadCache(b)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
builder := message.NewBuilder(
|
|
b.Settings.GetInt(settings.FetchWorkers),
|
|
b.Settings.GetInt(settings.AttachmentWorkers),
|
|
)
|
|
|
|
bridge := bridge.New(b.Locations, b.Cache, b.Settings, b.SentryReporter, b.CrashHandler, b.Listener, cache, builder, b.CM, b.Creds, b.Updater, b.Versioner)
|
|
imapBackend := imap.NewIMAPBackend(b.CrashHandler, b.Listener, b.Cache, b.Settings, bridge)
|
|
smtpBackend := smtp.NewSMTPBackend(b.CrashHandler, b.Listener, b.Settings, bridge)
|
|
|
|
go func() {
|
|
defer b.CrashHandler.HandlePanic()
|
|
api.NewAPIServer(b.Settings, b.Listener).ListenAndServe()
|
|
}()
|
|
|
|
go func() {
|
|
defer b.CrashHandler.HandlePanic()
|
|
imapPort := b.Settings.GetInt(settings.IMAPPortKey)
|
|
imap.NewIMAPServer(
|
|
b.CrashHandler,
|
|
c.String(flagLogIMAP) == "client" || c.String(flagLogIMAP) == "all",
|
|
c.String(flagLogIMAP) == "server" || c.String(flagLogIMAP) == "all",
|
|
imapPort, tlsConfig, imapBackend, b.UserAgent, b.Listener).ListenAndServe()
|
|
}()
|
|
|
|
go func() {
|
|
defer b.CrashHandler.HandlePanic()
|
|
smtpPort := b.Settings.GetInt(settings.SMTPPortKey)
|
|
useSSL := b.Settings.GetBool(settings.SMTPSSLKey)
|
|
smtp.NewSMTPServer(
|
|
b.CrashHandler,
|
|
c.Bool(flagLogSMTP),
|
|
smtpPort, useSSL, tlsConfig, smtpBackend, b.Listener).ListenAndServe()
|
|
}()
|
|
|
|
// Bridge supports no-window option which we should use for autostart.
|
|
b.Autostart.Exec = append(b.Autostart.Exec, "--"+flagNoWindow)
|
|
|
|
// We want to remove old versions if the app exits successfully.
|
|
b.AddTeardownAction(b.Versioner.RemoveOldVersions)
|
|
|
|
// We want cookies to be saved to disk so they are loaded the next time.
|
|
b.AddTeardownAction(b.CookieJar.PersistCookies)
|
|
|
|
var frontendMode string
|
|
|
|
switch {
|
|
case c.Bool(base.FlagCLI):
|
|
frontendMode = "cli"
|
|
case c.Bool(flagNonInteractive):
|
|
return <-(make(chan error)) // Block forever.
|
|
default:
|
|
frontendMode = "qt"
|
|
}
|
|
|
|
f := frontend.New(
|
|
constants.Version,
|
|
constants.BuildVersion,
|
|
b.Name,
|
|
frontendMode,
|
|
!c.Bool(flagNoWindow),
|
|
b.CrashHandler,
|
|
b.Locations,
|
|
b.Settings,
|
|
b.Listener,
|
|
b.Updater,
|
|
b.UserAgent,
|
|
bridge,
|
|
smtpBackend,
|
|
b.Autostart,
|
|
b,
|
|
)
|
|
|
|
// Watch for updates routine
|
|
go func() {
|
|
ticker := time.NewTicker(constants.UpdateCheckInterval)
|
|
|
|
for {
|
|
checkAndHandleUpdate(b.Updater, f, b.Settings.GetBool(settings.AutoUpdateKey))
|
|
<-ticker.C
|
|
}
|
|
}()
|
|
|
|
return f.Loop()
|
|
}
|
|
|
|
func loadTLSConfig(b *base.Base) (*tls.Config, error) {
|
|
if !b.TLS.HasCerts() {
|
|
if err := generateTLSCerts(b); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
tlsConfig, err := b.TLS.GetConfig()
|
|
if err == nil {
|
|
return tlsConfig, nil
|
|
}
|
|
|
|
logrus.WithError(err).Error("Failed to load TLS config, regenerating certificates")
|
|
|
|
if err := generateTLSCerts(b); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return b.TLS.GetConfig()
|
|
}
|
|
|
|
func generateTLSCerts(b *base.Base) error {
|
|
template, err := pkgTLS.NewTLSTemplate()
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to generate TLS template")
|
|
}
|
|
|
|
if err := b.TLS.GenerateCerts(template); err != nil {
|
|
return errors.Wrap(err, "failed to generate TLS certs")
|
|
}
|
|
|
|
if err := b.TLS.InstallCerts(); err != nil {
|
|
return errors.Wrap(err, "failed to install TLS certs")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func checkAndHandleUpdate(u types.Updater, f frontend.Frontend, autoUpdate bool) {
|
|
log := logrus.WithField("pkg", "app/bridge")
|
|
version, err := u.Check()
|
|
if err != nil {
|
|
log.WithError(err).Error("An error occurred while checking for updates")
|
|
return
|
|
}
|
|
|
|
f.WaitUntilFrontendIsReady()
|
|
|
|
// Update links in UI
|
|
f.SetVersion(version)
|
|
|
|
if !u.IsUpdateApplicable(version) {
|
|
log.Info("No need to update")
|
|
return
|
|
}
|
|
|
|
log.WithField("version", version.Version).Info("An update is available")
|
|
|
|
if !autoUpdate {
|
|
f.NotifyManualUpdate(version, u.CanInstall(version))
|
|
return
|
|
}
|
|
|
|
if !u.CanInstall(version) {
|
|
log.Info("A manual update is required")
|
|
f.NotifySilentUpdateError(updater.ErrManualUpdateRequired)
|
|
return
|
|
}
|
|
|
|
if err := u.InstallUpdate(version); err != nil {
|
|
if errors.Cause(err) == updater.ErrDownloadVerify {
|
|
log.WithError(err).Warning("Skipping update installation due to temporary error")
|
|
} else {
|
|
log.WithError(err).Error("The update couldn't be installed")
|
|
f.NotifySilentUpdateError(err)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
f.NotifySilentUpdateInstalled()
|
|
}
|
|
|
|
// NOTE(GODT-1158): How big should in-memory cache be?
|
|
// NOTE(GODT-1158): How to handle cache location migration if user changes custom path?
|
|
func loadCache(b *base.Base) (cache.Cache, error) {
|
|
if !b.Settings.GetBool(settings.CacheEnabledKey) {
|
|
return cache.NewInMemoryCache(100 * (1 << 20)), nil
|
|
}
|
|
|
|
var compressor cache.Compressor
|
|
|
|
// NOTE(GODT-1158): If user changes compression setting we have to nuke the cache.
|
|
if b.Settings.GetBool(settings.CacheCompressionKey) {
|
|
compressor = &cache.GZipCompressor{}
|
|
} else {
|
|
compressor = &cache.NoopCompressor{}
|
|
}
|
|
|
|
var path string
|
|
|
|
if customPath := b.Settings.Get(settings.CacheLocationKey); customPath != "" {
|
|
path = customPath
|
|
} else {
|
|
path = b.Cache.GetDefaultMessageCacheDir()
|
|
}
|
|
|
|
return cache.NewOnDiskCache(path, compressor, cache.Options{
|
|
MinFreeAbs: uint64(b.Settings.GetInt(settings.CacheMinFreeAbsKey)),
|
|
MinFreeRat: b.Settings.GetFloat64(settings.CacheMinFreeRatKey),
|
|
ConcurrentRead: b.Settings.GetInt(settings.CacheConcurrencyRead),
|
|
ConcurrentWrite: b.Settings.GetInt(settings.CacheConcurrencyWrite),
|
|
})
|
|
}
|