mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 21:28:11 +09:00 
			
		
		
		
	* `PROTOCOL`: can be smtp, smtps, smtp+startls, smtp+unix, sendmail, dummy * `SMTP_ADDR`: domain for SMTP, or path to unix socket * `SMTP_PORT`: port for SMTP; defaults to 25 for `smtp`, 465 for `smtps`, and 587 for `smtp+startls` * `ENABLE_HELO`, `HELO_HOSTNAME`: reverse `DISABLE_HELO` to `ENABLE_HELO`; default to false + system hostname * `FORCE_TRUST_SERVER_CERT`: replace the unclear `SKIP_VERIFY` * `CLIENT_CERT_FILE`, `CLIENT_KEY_FILE`, `USE_CLIENT_CERT`: clarify client certificates here Co-authored-by: wxiaoguang <wxiaoguang@gmail.com> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
		
			
				
	
	
		
			95 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			95 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2021 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package smtp
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"net/smtp"
 | |
| 	"net/textproto"
 | |
| 	"strings"
 | |
| 
 | |
| 	auth_model "code.gitea.io/gitea/models/auth"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 	"code.gitea.io/gitea/services/mailer"
 | |
| )
 | |
| 
 | |
| // Authenticate queries if the provided login/password is authenticates against the SMTP server
 | |
| // Users will be autoregistered as required
 | |
| func (source *Source) Authenticate(user *user_model.User, userName, password string) (*user_model.User, error) {
 | |
| 	// Verify allowed domains.
 | |
| 	if len(source.AllowedDomains) > 0 {
 | |
| 		idx := strings.Index(userName, "@")
 | |
| 		if idx == -1 {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		} else if !util.IsStringInSlice(userName[idx+1:], strings.Split(source.AllowedDomains, ","), true) {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var auth smtp.Auth
 | |
| 	switch source.Auth {
 | |
| 	case PlainAuthentication:
 | |
| 		auth = smtp.PlainAuth("", userName, password, source.Addr)
 | |
| 	case LoginAuthentication:
 | |
| 		auth = &loginAuthenticator{userName, password}
 | |
| 	case CRAMMD5Authentication:
 | |
| 		auth = smtp.CRAMMD5Auth(userName, password)
 | |
| 	default:
 | |
| 		return nil, errors.New("unsupported SMTP auth type")
 | |
| 	}
 | |
| 
 | |
| 	if err := Authenticate(auth, source); err != nil {
 | |
| 		// Check standard error format first,
 | |
| 		// then fallback to worse case.
 | |
| 		tperr, ok := err.(*textproto.Error)
 | |
| 		if (ok && tperr.Code == 535) ||
 | |
| 			strings.Contains(err.Error(), "Username and Password not accepted") {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		}
 | |
| 		if (ok && tperr.Code == 534) ||
 | |
| 			strings.Contains(err.Error(), "Application-specific password required") {
 | |
| 			return nil, user_model.ErrUserNotExist{Name: userName}
 | |
| 		}
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	if user != nil {
 | |
| 		return user, nil
 | |
| 	}
 | |
| 
 | |
| 	username := userName
 | |
| 	idx := strings.Index(userName, "@")
 | |
| 	if idx > -1 {
 | |
| 		username = userName[:idx]
 | |
| 	}
 | |
| 
 | |
| 	user = &user_model.User{
 | |
| 		LowerName:   strings.ToLower(username),
 | |
| 		Name:        strings.ToLower(username),
 | |
| 		Email:       userName,
 | |
| 		Passwd:      password,
 | |
| 		LoginType:   auth_model.SMTP,
 | |
| 		LoginSource: source.authSource.ID,
 | |
| 		LoginName:   userName,
 | |
| 	}
 | |
| 	overwriteDefault := &user_model.CreateUserOverwriteOptions{
 | |
| 		IsActive: util.OptionalBoolTrue,
 | |
| 	}
 | |
| 
 | |
| 	if err := user_model.CreateUser(user, overwriteDefault); err != nil {
 | |
| 		return user, err
 | |
| 	}
 | |
| 
 | |
| 	mailer.SendRegisterNotifyMail(user)
 | |
| 
 | |
| 	return user, nil
 | |
| }
 | |
| 
 | |
| // IsSkipLocalTwoFA returns if this source should skip local 2fa for password authentication
 | |
| func (source *Source) IsSkipLocalTwoFA() bool {
 | |
| 	return source.SkipLocalTwoFA
 | |
| }
 |