forked from Silverfish/proton-bridge
When listing all a user's email addresses (e.g. for apple mail autoconf) we need to exclude disabled addresses. Similarly, we need to remove them from gluon if using split mode.
211 lines
6.4 KiB
Go
211 lines
6.4 KiB
Go
// Copyright (c) 2023 Proton AG
|
|
//
|
|
// This file is part of Proton Mail Bridge.
|
|
//
|
|
// Proton Mail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// Proton Mail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Proton Mail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package bridge
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"github.com/ProtonMail/gluon/reporter"
|
|
"github.com/ProtonMail/proton-bridge/v3/internal/events"
|
|
"github.com/ProtonMail/proton-bridge/v3/internal/safe"
|
|
"github.com/ProtonMail/proton-bridge/v3/internal/user"
|
|
"github.com/ProtonMail/proton-bridge/v3/internal/vault"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func (bridge *Bridge) handleUserEvent(ctx context.Context, user *user.User, event events.Event) error {
|
|
switch event := event.(type) {
|
|
case events.UserAddressCreated:
|
|
if err := bridge.handleUserAddressCreated(ctx, user, event); err != nil {
|
|
return fmt.Errorf("failed to handle user address created event: %w", err)
|
|
}
|
|
|
|
case events.UserAddressEnabled:
|
|
if err := bridge.handleUserAddressEnabled(ctx, user, event); err != nil {
|
|
return fmt.Errorf("failed to handle user address enabled event: %w", err)
|
|
}
|
|
|
|
case events.UserAddressDisabled:
|
|
if err := bridge.handleUserAddressDisabled(ctx, user, event); err != nil {
|
|
return fmt.Errorf("failed to handle user address disabled event: %w", err)
|
|
}
|
|
|
|
case events.UserAddressDeleted:
|
|
if err := bridge.handleUserAddressDeleted(ctx, user, event); err != nil {
|
|
return fmt.Errorf("failed to handle user address deleted event: %w", err)
|
|
}
|
|
|
|
case events.UserRefreshed:
|
|
if err := bridge.handleUserRefreshed(ctx, user); err != nil {
|
|
return fmt.Errorf("failed to handle user refreshed event: %w", err)
|
|
}
|
|
|
|
case events.UserDeauth:
|
|
bridge.handleUserDeauth(ctx, user)
|
|
|
|
case events.UserBadEvent:
|
|
bridge.handleUserBadEvent(ctx, user, event.Error)
|
|
|
|
case events.UncategorizedEventError:
|
|
bridge.handleUncategorizedErrorEvent(event)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserAddressCreated(ctx context.Context, user *user.User, event events.UserAddressCreated) error {
|
|
if user.GetAddressMode() != vault.SplitMode {
|
|
return nil
|
|
}
|
|
|
|
if bridge.imapServer == nil {
|
|
return fmt.Errorf("no imap server instance running")
|
|
}
|
|
|
|
gluonID, err := bridge.imapServer.AddUser(ctx, user.NewIMAPConnector(event.AddressID), user.GluonKey())
|
|
if err != nil {
|
|
return fmt.Errorf("failed to add user to IMAP server: %w", err)
|
|
}
|
|
|
|
if err := user.SetGluonID(event.AddressID, gluonID); err != nil {
|
|
return fmt.Errorf("failed to set gluon ID: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserAddressEnabled(ctx context.Context, user *user.User, event events.UserAddressEnabled) error {
|
|
if user.GetAddressMode() != vault.SplitMode {
|
|
return nil
|
|
}
|
|
|
|
gluonID, err := bridge.imapServer.AddUser(ctx, user.NewIMAPConnector(event.AddressID), user.GluonKey())
|
|
if err != nil {
|
|
return fmt.Errorf("failed to add user to IMAP server: %w", err)
|
|
}
|
|
|
|
if err := user.SetGluonID(event.AddressID, gluonID); err != nil {
|
|
return fmt.Errorf("failed to set gluon ID: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserAddressDisabled(ctx context.Context, user *user.User, event events.UserAddressDisabled) error {
|
|
if user.GetAddressMode() != vault.SplitMode {
|
|
return nil
|
|
}
|
|
|
|
gluonID, ok := user.GetGluonID(event.AddressID)
|
|
if !ok {
|
|
return fmt.Errorf("gluon ID not found for address %s", event.AddressID)
|
|
}
|
|
|
|
if err := bridge.imapServer.RemoveUser(ctx, gluonID, true); err != nil {
|
|
return fmt.Errorf("failed to remove user from IMAP server: %w", err)
|
|
}
|
|
|
|
if err := user.RemoveGluonID(event.AddressID, gluonID); err != nil {
|
|
return fmt.Errorf("failed to remove gluon ID for address: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserAddressDeleted(ctx context.Context, user *user.User, event events.UserAddressDeleted) error {
|
|
if user.GetAddressMode() != vault.SplitMode {
|
|
return nil
|
|
}
|
|
|
|
if bridge.imapServer == nil {
|
|
return fmt.Errorf("no imap server instance running")
|
|
}
|
|
|
|
gluonID, ok := user.GetGluonID(event.AddressID)
|
|
if !ok {
|
|
return fmt.Errorf("gluon ID not found for address %s", event.AddressID)
|
|
}
|
|
|
|
if err := bridge.imapServer.RemoveUser(ctx, gluonID, true); err != nil {
|
|
return fmt.Errorf("failed to remove user from IMAP server: %w", err)
|
|
}
|
|
|
|
if err := user.RemoveGluonID(event.AddressID, gluonID); err != nil {
|
|
return fmt.Errorf("failed to remove gluon ID for address: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserRefreshed(ctx context.Context, user *user.User) error {
|
|
return safe.RLockRet(func() error {
|
|
if err := bridge.removeIMAPUser(ctx, user, true); err != nil {
|
|
return fmt.Errorf("failed to remove IMAP user: %w", err)
|
|
}
|
|
|
|
if err := bridge.addIMAPUser(ctx, user); err != nil {
|
|
return fmt.Errorf("failed to add IMAP user: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}, bridge.usersLock)
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserDeauth(ctx context.Context, user *user.User) {
|
|
safe.Lock(func() {
|
|
bridge.logoutUser(ctx, user, false, false)
|
|
}, bridge.usersLock)
|
|
}
|
|
|
|
func (bridge *Bridge) handleUserBadEvent(ctx context.Context, user *user.User, err error) {
|
|
safe.Lock(func() {
|
|
if rerr := bridge.reporter.ReportMessageWithContext("Failed to handle event", reporter.Context{
|
|
"error_type": fmt.Sprintf("%T", getUnwrappedError(err)),
|
|
"error": err,
|
|
}); rerr != nil {
|
|
logrus.WithError(rerr).Error("Failed to report failed event handling")
|
|
}
|
|
|
|
bridge.logoutUser(ctx, user, true, false)
|
|
}, bridge.usersLock)
|
|
}
|
|
|
|
func (bridge *Bridge) handleUncategorizedErrorEvent(event events.UncategorizedEventError) {
|
|
if rerr := bridge.reporter.ReportMessageWithContext("Failed to handle due to uncategorized error", reporter.Context{
|
|
"error_type": fmt.Sprintf("%T", getUnwrappedError(event.Error)),
|
|
"error": event.Error,
|
|
}); rerr != nil {
|
|
logrus.WithError(rerr).Error("Failed to report failed event handling")
|
|
}
|
|
}
|
|
|
|
func getUnwrappedError(err error) error {
|
|
for {
|
|
unwrapped := errors.Unwrap(err)
|
|
if unwrapped == nil {
|
|
break
|
|
}
|
|
|
|
err = unwrapped
|
|
}
|
|
|
|
return err
|
|
}
|