dkim.go 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
  1. package parsemail
  2. import (
  3. "bytes"
  4. "crypto"
  5. "crypto/x509"
  6. "encoding/pem"
  7. "fmt"
  8. "github.com/Jinnrry/pmail/config"
  9. "github.com/Jinnrry/pmail/utils/consts"
  10. "github.com/Jinnrry/pmail/utils/context"
  11. "github.com/emersion/go-msgauth/dkim"
  12. log "github.com/sirupsen/logrus"
  13. "golang.org/x/crypto/ed25519"
  14. "io"
  15. "os"
  16. "strings"
  17. )
  18. type Dkim struct {
  19. privateKey crypto.Signer
  20. }
  21. var instance *Dkim
  22. func Init() {
  23. privateKey, err := loadPrivateKey(config.Instance.DkimPrivateKeyPath)
  24. if err != nil {
  25. panic(config.Instance.DkimPrivateKeyPath +
  26. " DKIM load fail! Please set dkim! dkim私钥加载失败!请先设置dkim秘钥" +
  27. err.Error())
  28. }
  29. instance = &Dkim{
  30. privateKey: privateKey,
  31. }
  32. }
  33. func loadPrivateKey(path string) (crypto.Signer, error) {
  34. b, err := os.ReadFile(path)
  35. if err != nil {
  36. return nil, err
  37. }
  38. block, _ := pem.Decode(b)
  39. if block == nil {
  40. return nil, fmt.Errorf("no PEM data found")
  41. }
  42. switch strings.ToUpper(block.Type) {
  43. case "PRIVATE KEY":
  44. k, err := x509.ParsePKCS8PrivateKey(block.Bytes)
  45. if err != nil {
  46. return nil, err
  47. }
  48. return k.(crypto.Signer), nil
  49. case "RSA PRIVATE KEY":
  50. return x509.ParsePKCS1PrivateKey(block.Bytes)
  51. case "EDDSA PRIVATE KEY":
  52. if len(block.Bytes) != ed25519.PrivateKeySize {
  53. return nil, fmt.Errorf("invalid Ed25519 private key size")
  54. }
  55. return ed25519.PrivateKey(block.Bytes), nil
  56. default:
  57. return nil, fmt.Errorf("unknown private key type: '%v'", block.Type)
  58. }
  59. }
  60. func (p *Dkim) Sign(msgData string) []byte {
  61. var b bytes.Buffer
  62. r := strings.NewReader(msgData)
  63. options := &dkim.SignOptions{
  64. Domain: config.Instance.Domain,
  65. Selector: "default",
  66. Signer: p.privateKey,
  67. }
  68. if err := dkim.Sign(&b, r, options); err != nil {
  69. log.Errorf("%+v", err)
  70. return []byte(msgData)
  71. }
  72. return b.Bytes()
  73. }
  74. func Check(ctx *context.Context, mail io.Reader) bool {
  75. verifications, err := dkim.Verify(mail)
  76. if err != nil {
  77. log.WithContext(ctx).Warnf("DKIM Error:%v", err)
  78. }
  79. if len(verifications) == 0 {
  80. return false
  81. }
  82. for _, v := range verifications {
  83. if v.Domain == consts.TEST_DOMAIN {
  84. return true
  85. }
  86. if v.Err == nil {
  87. log.Println("Valid signature for:", v.Domain)
  88. } else {
  89. log.Println("Invalid signature for:", v.Domain, v.Err)
  90. return false
  91. }
  92. }
  93. return true
  94. }