dkim.go 1.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. package parsemail
  2. import (
  3. "bytes"
  4. "crypto"
  5. "crypto/x509"
  6. "encoding/pem"
  7. "fmt"
  8. "github.com/emersion/go-msgauth/dkim"
  9. log "github.com/sirupsen/logrus"
  10. "golang.org/x/crypto/ed25519"
  11. "io"
  12. "os"
  13. "pmail/config"
  14. "strings"
  15. )
  16. type Dkim struct {
  17. privateKey crypto.Signer
  18. }
  19. var instance *Dkim
  20. func Init() {
  21. privateKey, err := loadPrivateKey(config.Instance.DkimPrivateKeyPath)
  22. if err != nil {
  23. panic("DKIM load fail! Please set dkim! dkim私钥加载失败!请先设置dkim秘钥")
  24. }
  25. instance = &Dkim{
  26. privateKey: privateKey,
  27. }
  28. }
  29. func loadPrivateKey(path string) (crypto.Signer, error) {
  30. b, err := os.ReadFile(path)
  31. if err != nil {
  32. return nil, err
  33. }
  34. block, _ := pem.Decode(b)
  35. if block == nil {
  36. return nil, fmt.Errorf("no PEM data found")
  37. }
  38. switch strings.ToUpper(block.Type) {
  39. case "PRIVATE KEY":
  40. k, err := x509.ParsePKCS8PrivateKey(block.Bytes)
  41. if err != nil {
  42. return nil, err
  43. }
  44. return k.(crypto.Signer), nil
  45. case "RSA PRIVATE KEY":
  46. return x509.ParsePKCS1PrivateKey(block.Bytes)
  47. case "EDDSA PRIVATE KEY":
  48. if len(block.Bytes) != ed25519.PrivateKeySize {
  49. return nil, fmt.Errorf("invalid Ed25519 private key size")
  50. }
  51. return ed25519.PrivateKey(block.Bytes), nil
  52. default:
  53. return nil, fmt.Errorf("unknown private key type: '%v'", block.Type)
  54. }
  55. }
  56. func (p *Dkim) Sign(msgData string) []byte {
  57. var b bytes.Buffer
  58. r := strings.NewReader(msgData)
  59. options := &dkim.SignOptions{
  60. Domain: config.Instance.Domain,
  61. Selector: "default",
  62. Signer: p.privateKey,
  63. }
  64. if err := dkim.Sign(&b, r, options); err != nil {
  65. log.Fatal(err)
  66. }
  67. return b.Bytes()
  68. }
  69. func Check(mail io.Reader) bool {
  70. verifications, err := dkim.Verify(mail)
  71. if err != nil {
  72. log.Println(err)
  73. }
  74. for _, v := range verifications {
  75. if v.Err == nil {
  76. log.Println("Valid signature for:", v.Domain)
  77. } else {
  78. log.Println("Invalid signature for:", v.Domain, v.Err)
  79. return false
  80. }
  81. }
  82. return true
  83. }