1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750 |
- 'use strict';
- const packageInfo = require('../../package.json');
- const EventEmitter = require('events').EventEmitter;
- const net = require('net');
- const tls = require('tls');
- const os = require('os');
- const crypto = require('crypto');
- const DataStream = require('./data-stream');
- const PassThrough = require('stream').PassThrough;
- const shared = require('../shared');
- // default timeout values in ms
- const CONNECTION_TIMEOUT = 2 * 60 * 1000; // how much to wait for the connection to be established
- const SOCKET_TIMEOUT = 10 * 60 * 1000; // how much to wait for socket inactivity before disconnecting the client
- const GREETING_TIMEOUT = 30 * 1000; // how much to wait after connection is established but SMTP greeting is not receieved
- /**
- * Generates a SMTP connection object
- *
- * Optional options object takes the following possible properties:
- *
- * * **port** - is the port to connect to (defaults to 587 or 465)
- * * **host** - is the hostname or IP address to connect to (defaults to 'localhost')
- * * **secure** - use SSL
- * * **ignoreTLS** - ignore server support for STARTTLS
- * * **requireTLS** - forces the client to use STARTTLS
- * * **name** - the name of the client server
- * * **localAddress** - outbound address to bind to (see: http://nodejs.org/api/net.html#net_net_connect_options_connectionlistener)
- * * **greetingTimeout** - Time to wait in ms until greeting message is received from the server (defaults to 10000)
- * * **connectionTimeout** - how many milliseconds to wait for the connection to establish
- * * **socketTimeout** - Time of inactivity until the connection is closed (defaults to 1 hour)
- * * **lmtp** - if true, uses LMTP instead of SMTP protocol
- * * **logger** - bunyan compatible logger interface
- * * **debug** - if true pass SMTP traffic to the logger
- * * **tls** - options for createCredentials
- * * **socket** - existing socket to use instead of creating a new one (see: http://nodejs.org/api/net.html#net_class_net_socket)
- * * **secured** - boolean indicates that the provided socket has already been upgraded to tls
- *
- * @constructor
- * @namespace SMTP Client module
- * @param {Object} [options] Option properties
- */
- class SMTPConnection extends EventEmitter {
- constructor(options) {
- super(options);
- this.id = crypto
- .randomBytes(8)
- .toString('base64')
- .replace(/\W/g, '');
- this.stage = 'init';
- this.options = options || {};
- this.secureConnection = !!this.options.secure;
- this.alreadySecured = !!this.options.secured;
- this.port = Number(this.options.port) || (this.secureConnection ? 465 : 587);
- this.host = this.options.host || 'localhost';
- if (typeof this.options.secure === 'undefined' && this.port === 465) {
- // if secure option is not set but port is 465, then default to secure
- this.secureConnection = true;
- }
- this.name = this.options.name || this._getHostname();
- this.logger = shared.getLogger(this.options, {
- component: this.options.component || 'smtp-connection',
- sid: this.id
- });
- this.customAuth = new Map();
- Object.keys(this.options.customAuth || {}).forEach(key => {
- let mapKey = (key || '')
- .toString()
- .trim()
- .toUpperCase();
- if (!mapKey) {
- return;
- }
- this.customAuth.set(mapKey, this.options.customAuth[key]);
- });
- /**
- * Expose version nr, just for the reference
- * @type {String}
- */
- this.version = packageInfo.version;
- /**
- * If true, then the user is authenticated
- * @type {Boolean}
- */
- this.authenticated = false;
- /**
- * If set to true, this instance is no longer active
- * @private
- */
- this.destroyed = false;
- /**
- * Defines if the current connection is secure or not. If not,
- * STARTTLS can be used if available
- * @private
- */
- this.secure = !!this.secureConnection;
- /**
- * Store incomplete messages coming from the server
- * @private
- */
- this._remainder = '';
- /**
- * Unprocessed responses from the server
- * @type {Array}
- */
- this._responseQueue = [];
- this.lastServerResponse = false;
- /**
- * The socket connecting to the server
- * @publick
- */
- this._socket = false;
- /**
- * Lists supported auth mechanisms
- * @private
- */
- this._supportedAuth = [];
- /**
- * Includes current envelope (from, to)
- * @private
- */
- this._envelope = false;
- /**
- * Lists supported extensions
- * @private
- */
- this._supportedExtensions = [];
- /**
- * Defines the maximum allowed size for a single message
- * @private
- */
- this._maxAllowedSize = 0;
- /**
- * Function queue to run if a data chunk comes from the server
- * @private
- */
- this._responseActions = [];
- this._recipientQueue = [];
- /**
- * Timeout variable for waiting the greeting
- * @private
- */
- this._greetingTimeout = false;
- /**
- * Timeout variable for waiting the connection to start
- * @private
- */
- this._connectionTimeout = false;
- /**
- * If the socket is deemed already closed
- * @private
- */
- this._destroyed = false;
- /**
- * If the socket is already being closed
- * @private
- */
- this._closing = false;
- /**
- * Callbacks for socket's listeners
- */
- this._onSocketData = (chunk) => this._onData(chunk);
- this._onSocketError = (error) => this._onError(error, 'ESOCKET', false, 'CONN');
- this._onSocketClose = () => this._onClose();
- this._onSocketEnd = () => this._onEnd();
- this._onSocketTimeout = () => this._onTimeout();
- }
- /**
- * Creates a connection to a SMTP server and sets up connection
- * listener
- */
- connect(connectCallback) {
- if (typeof connectCallback === 'function') {
- this.once('connect', () => {
- this.logger.debug(
- {
- tnx: 'smtp'
- },
- 'SMTP handshake finished'
- );
- connectCallback();
- });
- const isDestroyedMessage = this._isDestroyedMessage('connect');
- if (isDestroyedMessage) {
- return connectCallback(this._formatError(isDestroyedMessage, 'ECONNECTION', false, 'CONN'));
- }
- }
- let opts = {
- port: this.port,
- host: this.host
- };
- if (this.options.localAddress) {
- opts.localAddress = this.options.localAddress;
- }
- let setupConnectionHandlers = () => {
- this._connectionTimeout = setTimeout(() => {
- this._onError('Connection timeout', 'ETIMEDOUT', false, 'CONN');
- }, this.options.connectionTimeout || CONNECTION_TIMEOUT);
- this._socket.on('error', this._onSocketError);
- };
- if (this.options.connection) {
- // connection is already opened
- this._socket = this.options.connection;
- if (this.secureConnection && !this.alreadySecured) {
- setImmediate(() =>
- this._upgradeConnection(err => {
- if (err) {
- this._onError(new Error('Error initiating TLS - ' + (err.message || err)), 'ETLS', false, 'CONN');
- return;
- }
- this._onConnect();
- })
- );
- } else {
- setImmediate(() => this._onConnect());
- }
- return;
- } else if (this.options.socket) {
- // socket object is set up but not yet connected
- this._socket = this.options.socket;
- return shared.resolveHostname(opts, (err, resolved) => {
- if (err) {
- return setImmediate(() => this._onError(err, 'EDNS', false, 'CONN'));
- }
- this.logger.debug(
- {
- tnx: 'dns',
- source: opts.host,
- resolved: resolved.host,
- cached: !!resolved._cached
- },
- 'Resolved %s as %s [cache %s]',
- opts.host,
- resolved.host,
- resolved._cached ? 'hit' : 'miss'
- );
- Object.keys(resolved).forEach(key => {
- if (key.charAt(0) !== '_' && resolved[key]) {
- opts[key] = resolved[key];
- }
- });
- try {
- this._socket.connect(
- this.port,
- this.host,
- () => {
- this._socket.setKeepAlive(true);
- this._onConnect();
- }
- );
- setupConnectionHandlers();
- } catch (E) {
- return setImmediate(() => this._onError(E, 'ECONNECTION', false, 'CONN'));
- }
- });
- } else if (this.secureConnection) {
- // connect using tls
- if (this.options.tls) {
- Object.keys(this.options.tls).forEach(key => {
- opts[key] = this.options.tls[key];
- });
- }
- return shared.resolveHostname(opts, (err, resolved) => {
- if (err) {
- return setImmediate(() => this._onError(err, 'EDNS', false, 'CONN'));
- }
- this.logger.debug(
- {
- tnx: 'dns',
- source: opts.host,
- resolved: resolved.host,
- cached: !!resolved._cached
- },
- 'Resolved %s as %s [cache %s]',
- opts.host,
- resolved.host,
- resolved._cached ? 'hit' : 'miss'
- );
- Object.keys(resolved).forEach(key => {
- if (key.charAt(0) !== '_' && resolved[key]) {
- opts[key] = resolved[key];
- }
- });
- try {
- this._socket = tls.connect(
- opts,
- () => {
- this._socket.setKeepAlive(true);
- this._onConnect();
- }
- );
- setupConnectionHandlers();
- } catch (E) {
- return setImmediate(() => this._onError(E, 'ECONNECTION', false, 'CONN'));
- }
- });
- } else {
- // connect using plaintext
- return shared.resolveHostname(opts, (err, resolved) => {
- if (err) {
- return setImmediate(() => this._onError(err, 'EDNS', false, 'CONN'));
- }
- this.logger.debug(
- {
- tnx: 'dns',
- source: opts.host,
- resolved: resolved.host,
- cached: !!resolved._cached
- },
- 'Resolved %s as %s [cache %s]',
- opts.host,
- resolved.host,
- resolved._cached ? 'hit' : 'miss'
- );
- Object.keys(resolved).forEach(key => {
- if (key.charAt(0) !== '_' && resolved[key]) {
- opts[key] = resolved[key];
- }
- });
- try {
- this._socket = net.connect(
- opts,
- () => {
- this._socket.setKeepAlive(true);
- this._onConnect();
- }
- );
- setupConnectionHandlers();
- } catch (E) {
- return setImmediate(() => this._onError(E, 'ECONNECTION', false, 'CONN'));
- }
- });
- }
- }
- /**
- * Sends QUIT
- */
- quit() {
- this._sendCommand('QUIT');
- this._responseActions.push(this.close);
- }
- /**
- * Closes the connection to the server
- */
- close() {
- clearTimeout(this._connectionTimeout);
- clearTimeout(this._greetingTimeout);
- this._responseActions = [];
- // allow to run this function only once
- if (this._closing) {
- return;
- }
- this._closing = true;
- let closeMethod = 'end';
- if (this.stage === 'init') {
- // Close the socket immediately when connection timed out
- closeMethod = 'destroy';
- }
- this.logger.debug(
- {
- tnx: 'smtp'
- },
- 'Closing connection to the server using "%s"',
- closeMethod
- );
- let socket = (this._socket && this._socket.socket) || this._socket;
- if (socket && !socket.destroyed) {
- try {
- this._socket[closeMethod]();
- } catch (E) {
- // just ignore
- }
- }
- this._destroy();
- }
- /**
- * Authenticate user
- */
- login(authData, callback) {
- const isDestroyedMessage = this._isDestroyedMessage('login');
- if (isDestroyedMessage) {
- return callback(this._formatError(isDestroyedMessage, 'ECONNECTION', false, 'API'));
- }
- this._auth = authData || {};
- // Select SASL authentication method
- this._authMethod =
- (this._auth.method || '')
- .toString()
- .trim()
- .toUpperCase() || false;
- if (!this._authMethod && this._auth.oauth2 && !this._auth.credentials) {
- this._authMethod = 'XOAUTH2';
- } else if (!this._authMethod || (this._authMethod === 'XOAUTH2' && !this._auth.oauth2)) {
- // use first supported
- this._authMethod = (this._supportedAuth[0] || 'PLAIN').toUpperCase().trim();
- }
- if (this._authMethod !== 'XOAUTH2' && (!this._auth.credentials || !this._auth.credentials.user || !this._auth.credentials.pass)) {
- if (this._auth.user && this._auth.pass) {
- this._auth.credentials = {
- user: this._auth.user,
- pass: this._auth.pass,
- options: this._auth.options
- };
- } else {
- return callback(this._formatError('Missing credentials for "' + this._authMethod + '"', 'EAUTH', false, 'API'));
- }
- }
- if (this.customAuth.has(this._authMethod)) {
- let handler = this.customAuth.get(this._authMethod);
- let lastResponse;
- let returned = false;
- let resolve = () => {
- if (returned) {
- return;
- }
- returned = true;
- this.logger.info(
- {
- tnx: 'smtp',
- username: this._auth.user,
- action: 'authenticated',
- method: this._authMethod
- },
- 'User %s authenticated',
- JSON.stringify(this._auth.user)
- );
- this.authenticated = true;
- callback(null, true);
- };
- let reject = err => {
- if (returned) {
- return;
- }
- returned = true;
- callback(this._formatError(err, 'EAUTH', lastResponse, 'AUTH ' + this._authMethod));
- };
- let handlerResponse = handler({
- auth: this._auth,
- method: this._authMethod,
- extensions: [].concat(this._supportedExtensions),
- authMethods: [].concat(this._supportedAuth),
- maxAllowedSize: this._maxAllowedSize || false,
- sendCommand: (cmd, done) => {
- let promise;
- if (!done) {
- promise = new Promise((resolve, reject) => {
- done = shared.callbackPromise(resolve, reject);
- });
- }
- this._responseActions.push(str => {
- lastResponse = str;
- let codes = str.match(/^(\d+)(?:\s(\d+\.\d+\.\d+))?\s/);
- let data = {
- command: cmd,
- response: str
- };
- if (codes) {
- data.status = Number(codes[1]) || 0;
- if (codes[2]) {
- data.code = codes[2];
- }
- data.text = str.substr(codes[0].length);
- } else {
- data.text = str;
- data.status = 0; // just in case we need to perform numeric comparisons
- }
- done(null, data);
- });
- setImmediate(() => this._sendCommand(cmd));
- return promise;
- },
- resolve,
- reject
- });
- if (handlerResponse && typeof handlerResponse.catch === 'function') {
- // a promise was returned
- handlerResponse.then(resolve).catch(reject);
- }
- return;
- }
- switch (this._authMethod) {
- case 'XOAUTH2':
- this._handleXOauth2Token(false, callback);
- return;
- case 'LOGIN':
- this._responseActions.push(str => {
- this._actionAUTH_LOGIN_USER(str, callback);
- });
- this._sendCommand('AUTH LOGIN');
- return;
- case 'PLAIN':
- this._responseActions.push(str => {
- this._actionAUTHComplete(str, callback);
- });
- this._sendCommand(
- 'AUTH PLAIN ' +
- Buffer.from(
- //this._auth.user+'\u0000'+
- '\u0000' + // skip authorization identity as it causes problems with some servers
- this._auth.credentials.user +
- '\u0000' +
- this._auth.credentials.pass,
- 'utf-8'
- ).toString('base64')
- );
- return;
- case 'CRAM-MD5':
- this._responseActions.push(str => {
- this._actionAUTH_CRAM_MD5(str, callback);
- });
- this._sendCommand('AUTH CRAM-MD5');
- return;
- }
- return callback(this._formatError('Unknown authentication method "' + this._authMethod + '"', 'EAUTH', false, 'API'));
- }
- /**
- * Sends a message
- *
- * @param {Object} envelope Envelope object, {from: addr, to: [addr]}
- * @param {Object} message String, Buffer or a Stream
- * @param {Function} callback Callback to return once sending is completed
- */
- send(envelope, message, done) {
- if (!message) {
- return done(this._formatError('Empty message', 'EMESSAGE', false, 'API'));
- }
- const isDestroyedMessage = this._isDestroyedMessage('send message');
- if (isDestroyedMessage) {
- return done(this._formatError(isDestroyedMessage, 'ECONNECTION', false, 'API'));
- }
- // reject larger messages than allowed
- if (this._maxAllowedSize && envelope.size > this._maxAllowedSize) {
- return setImmediate(() => {
- done(this._formatError('Message size larger than allowed ' + this._maxAllowedSize, 'EMESSAGE', false, 'MAIL FROM'));
- });
- }
- // ensure that callback is only called once
- let returned = false;
- let callback = function() {
- if (returned) {
- return;
- }
- returned = true;
- done(...arguments);
- };
- if (typeof message.on === 'function') {
- message.on('error', err => callback(this._formatError(err, 'ESTREAM', false, 'API')));
- }
- let startTime = Date.now();
- this._setEnvelope(envelope, (err, info) => {
- if (err) {
- return callback(err);
- }
- let envelopeTime = Date.now();
- let stream = this._createSendStream((err, str) => {
- if (err) {
- return callback(err);
- }
- info.envelopeTime = envelopeTime - startTime;
- info.messageTime = Date.now() - envelopeTime;
- info.messageSize = stream.outByteCount;
- info.response = str;
- return callback(null, info);
- });
- if (typeof message.pipe === 'function') {
- message.pipe(stream);
- } else {
- stream.write(message);
- stream.end();
- }
- });
- }
- /**
- * Resets connection state
- *
- * @param {Function} callback Callback to return once connection is reset
- */
- reset(callback) {
- this._sendCommand('RSET');
- this._responseActions.push(str => {
- if (str.charAt(0) !== '2') {
- return callback(this._formatError('Could not reset session state. response=' + str, 'EPROTOCOL', str, 'RSET'));
- }
- this._envelope = false;
- return callback(null, true);
- });
- }
- /**
- * Connection listener that is run when the connection to
- * the server is opened
- *
- * @event
- */
- _onConnect() {
- clearTimeout(this._connectionTimeout);
- this.logger.info(
- {
- tnx: 'network',
- localAddress: this._socket.localAddress,
- localPort: this._socket.localPort,
- remoteAddress: this._socket.remoteAddress,
- remotePort: this._socket.remotePort
- },
- '%s established to %s:%s',
- this.secure ? 'Secure connection' : 'Connection',
- this._socket.remoteAddress,
- this._socket.remotePort
- );
- if (this._destroyed) {
- // Connection was established after we already had canceled it
- this.close();
- return;
- }
- this.stage = 'connected';
- // clear existing listeners for the socket
- this._socket.removeListener('data', this._onSocketData);
- this._socket.removeListener('timeout', this._onSocketTimeout);
- this._socket.removeListener('close', this._onSocketClose);
- this._socket.removeListener('end', this._onSocketEnd);
- this._socket.on('data', this._onSocketData);
- this._socket.once('close', this._onSocketClose);
- this._socket.once('end', this._onSocketEnd);
- this._socket.setTimeout(this.options.socketTimeout || SOCKET_TIMEOUT);
- this._socket.on('timeout', this._onSocketTimeout);
- this._greetingTimeout = setTimeout(() => {
- // if still waiting for greeting, give up
- if (this._socket && !this._destroyed && this._responseActions[0] === this._actionGreeting) {
- this._onError('Greeting never received', 'ETIMEDOUT', false, 'CONN');
- }
- }, this.options.greetingTimeout || GREETING_TIMEOUT);
- this._responseActions.push(this._actionGreeting);
- // we have a 'data' listener set up so resume socket if it was paused
- this._socket.resume();
- }
- /**
- * 'data' listener for data coming from the server
- *
- * @event
- * @param {Buffer} chunk Data chunk coming from the server
- */
- _onData(chunk) {
- if (this._destroyed || !chunk || !chunk.length) {
- return;
- }
- let data = (chunk || '').toString('binary');
- let lines = (this._remainder + data).split(/\r?\n/);
- let lastline;
- this._remainder = lines.pop();
- for (let i = 0, len = lines.length; i < len; i++) {
- if (this._responseQueue.length) {
- lastline = this._responseQueue[this._responseQueue.length - 1];
- if (/^\d+-/.test(lastline.split('\n').pop())) {
- this._responseQueue[this._responseQueue.length - 1] += '\n' + lines[i];
- continue;
- }
- }
- this._responseQueue.push(lines[i]);
- }
- this._processResponse();
- }
- /**
- * 'error' listener for the socket
- *
- * @event
- * @param {Error} err Error object
- * @param {String} type Error name
- */
- _onError(err, type, data, command) {
- clearTimeout(this._connectionTimeout);
- clearTimeout(this._greetingTimeout);
- if (this._destroyed) {
- // just ignore, already closed
- // this might happen when a socket is canceled because of reached timeout
- // but the socket timeout error itself receives only after
- return;
- }
- err = this._formatError(err, type, data, command);
- this.logger.error(data, err.message);
- this.emit('error', err);
- this.close();
- }
- _formatError(message, type, response, command) {
- let err;
- if (/Error\]$/i.test(Object.prototype.toString.call(message))) {
- err = message;
- } else {
- err = new Error(message);
- }
- if (type && type !== 'Error') {
- err.code = type;
- }
- if (response) {
- err.response = response;
- err.message += ': ' + response;
- }
- let responseCode = (typeof response === 'string' && Number((response.match(/^\d+/) || [])[0])) || false;
- if (responseCode) {
- err.responseCode = responseCode;
- }
- if (command) {
- err.command = command;
- }
- return err;
- }
- /**
- * 'close' listener for the socket
- *
- * @event
- */
- _onClose() {
- this.logger.info(
- {
- tnx: 'network'
- },
- 'Connection closed'
- );
- if (this.upgrading && !this._destroyed) {
- return this._onError(new Error('Connection closed unexpectedly'), 'ETLS', false, 'CONN');
- } else if (![this._actionGreeting, this.close].includes(this._responseActions[0]) && !this._destroyed) {
- return this._onError(new Error('Connection closed unexpectedly'), 'ECONNECTION', false, 'CONN');
- }
- this._destroy();
- }
- /**
- * 'end' listener for the socket
- *
- * @event
- */
- _onEnd() {
- this._destroy();
- }
- /**
- * 'timeout' listener for the socket
- *
- * @event
- */
- _onTimeout() {
- return this._onError(new Error('Timeout'), 'ETIMEDOUT', false, 'CONN');
- }
- /**
- * Destroys the client, emits 'end'
- */
- _destroy() {
- if (this._destroyed) {
- return;
- }
- this._destroyed = true;
- this.emit('end');
- }
- /**
- * Upgrades the connection to TLS
- *
- * @param {Function} callback Callback function to run when the connection
- * has been secured
- */
- _upgradeConnection(callback) {
- // do not remove all listeners or it breaks node v0.10 as there's
- // apparently a 'finish' event set that would be cleared as well
- // we can safely keep 'error', 'end', 'close' etc. events
- this._socket.removeListener('data', this._onSocketData); // incoming data is going to be gibberish from this point onwards
- this._socket.removeListener('timeout', this._onSocketTimeout); // timeout will be re-set for the new socket object
- let socketPlain = this._socket;
- let opts = {
- socket: this._socket,
- host: this.host
- };
- Object.keys(this.options.tls || {}).forEach(key => {
- opts[key] = this.options.tls[key];
- });
- this.upgrading = true;
- this._socket = tls.connect(
- opts,
- () => {
- this.secure = true;
- this.upgrading = false;
- this._socket.on('data', this._onSocketData);
- socketPlain.removeListener('close', this._onSocketClose);
- socketPlain.removeListener('end', this._onSocketEnd);
- return callback(null, true);
- }
- );
- this._socket.on('error', this._onSocketError);
- this._socket.once('close', this._onSocketClose);
- this._socket.once('end', this._onSocketEnd);
- this._socket.setTimeout(this.options.socketTimeout || SOCKET_TIMEOUT); // 10 min.
- this._socket.on('timeout', this._onSocketTimeout);
- // resume in case the socket was paused
- socketPlain.resume();
- }
- /**
- * Processes queued responses from the server
- *
- * @param {Boolean} force If true, ignores _processing flag
- */
- _processResponse() {
- if (!this._responseQueue.length) {
- return false;
- }
- let str = (this.lastServerResponse = (this._responseQueue.shift() || '').toString());
- if (/^\d+-/.test(str.split('\n').pop())) {
- // keep waiting for the final part of multiline response
- return;
- }
- if (this.options.debug || this.options.transactionLog) {
- this.logger.debug(
- {
- tnx: 'server'
- },
- str.replace(/\r?\n$/, '')
- );
- }
- if (!str.trim()) {
- // skip unexpected empty lines
- setImmediate(() => this._processResponse(true));
- }
- let action = this._responseActions.shift();
- if (typeof action === 'function') {
- action.call(this, str);
- setImmediate(() => this._processResponse(true));
- } else {
- return this._onError(new Error('Unexpected Response'), 'EPROTOCOL', str, 'CONN');
- }
- }
- /**
- * Send a command to the server, append \r\n
- *
- * @param {String} str String to be sent to the server
- */
- _sendCommand(str) {
- if (this._destroyed) {
- // Connection already closed, can't send any more data
- return;
- }
- if (this._socket.destroyed) {
- return this.close();
- }
- if (this.options.debug || this.options.transactionLog) {
- this.logger.debug(
- {
- tnx: 'client'
- },
- (str || '').toString().replace(/\r?\n$/, '')
- );
- }
- this._socket.write(Buffer.from(str + '\r\n', 'utf-8'));
- }
- /**
- * Initiates a new message by submitting envelope data, starting with
- * MAIL FROM: command
- *
- * @param {Object} envelope Envelope object in the form of
- * {from:'...', to:['...']}
- * or
- * {from:{address:'...',name:'...'}, to:[address:'...',name:'...']}
- */
- _setEnvelope(envelope, callback) {
- let args = [];
- let useSmtpUtf8 = false;
- this._envelope = envelope || {};
- this._envelope.from = ((this._envelope.from && this._envelope.from.address) || this._envelope.from || '').toString().trim();
- this._envelope.to = [].concat(this._envelope.to || []).map(to => ((to && to.address) || to || '').toString().trim());
- if (!this._envelope.to.length) {
- return callback(this._formatError('No recipients defined', 'EENVELOPE', false, 'API'));
- }
- if (this._envelope.from && /[\r\n<>]/.test(this._envelope.from)) {
- return callback(this._formatError('Invalid sender ' + JSON.stringify(this._envelope.from), 'EENVELOPE', false, 'API'));
- }
- // check if the sender address uses only ASCII characters,
- // otherwise require usage of SMTPUTF8 extension
- if (/[\x80-\uFFFF]/.test(this._envelope.from)) {
- useSmtpUtf8 = true;
- }
- for (let i = 0, len = this._envelope.to.length; i < len; i++) {
- if (!this._envelope.to[i] || /[\r\n<>]/.test(this._envelope.to[i])) {
- return callback(this._formatError('Invalid recipient ' + JSON.stringify(this._envelope.to[i]), 'EENVELOPE', false, 'API'));
- }
- // check if the recipients addresses use only ASCII characters,
- // otherwise require usage of SMTPUTF8 extension
- if (/[\x80-\uFFFF]/.test(this._envelope.to[i])) {
- useSmtpUtf8 = true;
- }
- }
- // clone the recipients array for latter manipulation
- this._envelope.rcptQueue = JSON.parse(JSON.stringify(this._envelope.to || []));
- this._envelope.rejected = [];
- this._envelope.rejectedErrors = [];
- this._envelope.accepted = [];
- if (this._envelope.dsn) {
- try {
- this._envelope.dsn = this._setDsnEnvelope(this._envelope.dsn);
- } catch (err) {
- return callback(this._formatError('Invalid DSN ' + err.message, 'EENVELOPE', false, 'API'));
- }
- }
- this._responseActions.push(str => {
- this._actionMAIL(str, callback);
- });
- // If the server supports SMTPUTF8 and the envelope includes an internationalized
- // email address then append SMTPUTF8 keyword to the MAIL FROM command
- if (useSmtpUtf8 && this._supportedExtensions.includes('SMTPUTF8')) {
- args.push('SMTPUTF8');
- this._usingSmtpUtf8 = true;
- }
- // If the server supports 8BITMIME and the message might contain non-ascii bytes
- // then append the 8BITMIME keyword to the MAIL FROM command
- if (this._envelope.use8BitMime && this._supportedExtensions.includes('8BITMIME')) {
- args.push('BODY=8BITMIME');
- this._using8BitMime = true;
- }
- if (this._envelope.size && this._supportedExtensions.includes('SIZE')) {
- args.push('SIZE=' + this._envelope.size);
- }
- // If the server supports DSN and the envelope includes an DSN prop
- // then append DSN params to the MAIL FROM command
- if (this._envelope.dsn && this._supportedExtensions.includes('DSN')) {
- if (this._envelope.dsn.ret) {
- args.push('RET=' + shared.encodeXText(this._envelope.dsn.ret));
- }
- if (this._envelope.dsn.envid) {
- args.push('ENVID=' + shared.encodeXText(this._envelope.dsn.envid));
- }
- }
- this._sendCommand('MAIL FROM:<' + this._envelope.from + '>' + (args.length ? ' ' + args.join(' ') : ''));
- }
- _setDsnEnvelope(params) {
- let ret = (params.ret || params.return || '').toString().toUpperCase() || null;
- if (ret) {
- switch (ret) {
- case 'HDRS':
- case 'HEADERS':
- ret = 'HDRS';
- break;
- case 'FULL':
- case 'BODY':
- ret = 'FULL';
- break;
- }
- }
- if (ret && !['FULL', 'HDRS'].includes(ret)) {
- throw new Error('ret: ' + JSON.stringify(ret));
- }
- let envid = (params.envid || params.id || '').toString() || null;
- let notify = params.notify || null;
- if (notify) {
- if (typeof notify === 'string') {
- notify = notify.split(',');
- }
- notify = notify.map(n => n.trim().toUpperCase());
- let validNotify = ['NEVER', 'SUCCESS', 'FAILURE', 'DELAY'];
- let invaliNotify = notify.filter(n => !validNotify.includes(n));
- if (invaliNotify.length || (notify.length > 1 && notify.includes('NEVER'))) {
- throw new Error('notify: ' + JSON.stringify(notify.join(',')));
- }
- notify = notify.join(',');
- }
- let orcpt = (params.orcpt || params.recipient || '').toString() || null;
- if (orcpt && orcpt.indexOf(';') < 0) {
- orcpt = 'rfc822;' + orcpt;
- }
- return {
- ret,
- envid,
- notify,
- orcpt
- };
- }
- _getDsnRcptToArgs() {
- let args = [];
- // If the server supports DSN and the envelope includes an DSN prop
- // then append DSN params to the RCPT TO command
- if (this._envelope.dsn && this._supportedExtensions.includes('DSN')) {
- if (this._envelope.dsn.notify) {
- args.push('NOTIFY=' + shared.encodeXText(this._envelope.dsn.notify));
- }
- if (this._envelope.dsn.orcpt) {
- args.push('ORCPT=' + shared.encodeXText(this._envelope.dsn.orcpt));
- }
- }
- return args.length ? ' ' + args.join(' ') : '';
- }
- _createSendStream(callback) {
- let dataStream = new DataStream();
- let logStream;
- if (this.options.lmtp) {
- this._envelope.accepted.forEach((recipient, i) => {
- let final = i === this._envelope.accepted.length - 1;
- this._responseActions.push(str => {
- this._actionLMTPStream(recipient, final, str, callback);
- });
- });
- } else {
- this._responseActions.push(str => {
- this._actionSMTPStream(str, callback);
- });
- }
- dataStream.pipe(
- this._socket,
- {
- end: false
- }
- );
- if (this.options.debug) {
- logStream = new PassThrough();
- logStream.on('readable', () => {
- let chunk;
- while ((chunk = logStream.read())) {
- this.logger.debug(
- {
- tnx: 'message'
- },
- chunk.toString('binary').replace(/\r?\n$/, '')
- );
- }
- });
- dataStream.pipe(logStream);
- }
- dataStream.once('end', () => {
- this.logger.info(
- {
- tnx: 'message',
- inByteCount: dataStream.inByteCount,
- outByteCount: dataStream.outByteCount
- },
- '<%s bytes encoded mime message (source size %s bytes)>',
- dataStream.outByteCount,
- dataStream.inByteCount
- );
- });
- return dataStream;
- }
- /** ACTIONS **/
- /**
- * Will be run after the connection is created and the server sends
- * a greeting. If the incoming message starts with 220 initiate
- * SMTP session by sending EHLO command
- *
- * @param {String} str Message from the server
- */
- _actionGreeting(str) {
- clearTimeout(this._greetingTimeout);
- if (str.substr(0, 3) !== '220') {
- this._onError(new Error('Invalid greeting. response=' + str), 'EPROTOCOL', str, 'CONN');
- return;
- }
- if (this.options.lmtp) {
- this._responseActions.push(this._actionLHLO);
- this._sendCommand('LHLO ' + this.name);
- } else {
- this._responseActions.push(this._actionEHLO);
- this._sendCommand('EHLO ' + this.name);
- }
- }
- /**
- * Handles server response for LHLO command. If it yielded in
- * error, emit 'error', otherwise treat this as an EHLO response
- *
- * @param {String} str Message from the server
- */
- _actionLHLO(str) {
- if (str.charAt(0) !== '2') {
- this._onError(new Error('Invalid LHLO. response=' + str), 'EPROTOCOL', str, 'LHLO');
- return;
- }
- this._actionEHLO(str);
- }
- /**
- * Handles server response for EHLO command. If it yielded in
- * error, try HELO instead, otherwise initiate TLS negotiation
- * if STARTTLS is supported by the server or move into the
- * authentication phase.
- *
- * @param {String} str Message from the server
- */
- _actionEHLO(str) {
- let match;
- if (str.substr(0, 3) === '421') {
- this._onError(new Error('Server terminates connection. response=' + str), 'ECONNECTION', str, 'EHLO');
- return;
- }
- if (str.charAt(0) !== '2') {
- if (this.options.requireTLS) {
- this._onError(new Error('EHLO failed but HELO does not support required STARTTLS. response=' + str), 'ECONNECTION', str, 'EHLO');
- return;
- }
- // Try HELO instead
- this._responseActions.push(this._actionHELO);
- this._sendCommand('HELO ' + this.name);
- return;
- }
- // Detect if the server supports STARTTLS
- if (!this.secure && !this.options.ignoreTLS && (/[ -]STARTTLS\b/im.test(str) || this.options.requireTLS)) {
- this._sendCommand('STARTTLS');
- this._responseActions.push(this._actionSTARTTLS);
- return;
- }
- // Detect if the server supports SMTPUTF8
- if (/[ -]SMTPUTF8\b/im.test(str)) {
- this._supportedExtensions.push('SMTPUTF8');
- }
- // Detect if the server supports DSN
- if (/[ -]DSN\b/im.test(str)) {
- this._supportedExtensions.push('DSN');
- }
- // Detect if the server supports 8BITMIME
- if (/[ -]8BITMIME\b/im.test(str)) {
- this._supportedExtensions.push('8BITMIME');
- }
- // Detect if the server supports PIPELINING
- if (/[ -]PIPELINING\b/im.test(str)) {
- this._supportedExtensions.push('PIPELINING');
- }
- // Detect if the server supports PLAIN auth
- if (/AUTH(?:(\s+|=)[^\n]*\s+|\s+|=)PLAIN/i.test(str)) {
- this._supportedAuth.push('PLAIN');
- }
- // Detect if the server supports LOGIN auth
- if (/AUTH(?:(\s+|=)[^\n]*\s+|\s+|=)LOGIN/i.test(str)) {
- this._supportedAuth.push('LOGIN');
- }
- // Detect if the server supports CRAM-MD5 auth
- if (/AUTH(?:(\s+|=)[^\n]*\s+|\s+|=)CRAM-MD5/i.test(str)) {
- this._supportedAuth.push('CRAM-MD5');
- }
- // Detect if the server supports XOAUTH2 auth
- if (/AUTH(?:(\s+|=)[^\n]*\s+|\s+|=)XOAUTH2/i.test(str)) {
- this._supportedAuth.push('XOAUTH2');
- }
- // Detect if the server supports SIZE extensions (and the max allowed size)
- if ((match = str.match(/[ -]SIZE(?:[ \t]+(\d+))?/im))) {
- this._supportedExtensions.push('SIZE');
- this._maxAllowedSize = Number(match[1]) || 0;
- }
- this.emit('connect');
- }
- /**
- * Handles server response for HELO command. If it yielded in
- * error, emit 'error', otherwise move into the authentication phase.
- *
- * @param {String} str Message from the server
- */
- _actionHELO(str) {
- if (str.charAt(0) !== '2') {
- this._onError(new Error('Invalid HELO. response=' + str), 'EPROTOCOL', str, 'HELO');
- return;
- }
- this.emit('connect');
- }
- /**
- * Handles server response for STARTTLS command. If there's an error
- * try HELO instead, otherwise initiate TLS upgrade. If the upgrade
- * succeedes restart the EHLO
- *
- * @param {String} str Message from the server
- */
- _actionSTARTTLS(str) {
- if (str.charAt(0) !== '2') {
- if (this.options.opportunisticTLS) {
- this.logger.info(
- {
- tnx: 'smtp'
- },
- 'Failed STARTTLS upgrade, continuing unencrypted'
- );
- return this.emit('connect');
- }
- this._onError(new Error('Error upgrading connection with STARTTLS'), 'ETLS', str, 'STARTTLS');
- return;
- }
- this._upgradeConnection((err, secured) => {
- if (err) {
- this._onError(new Error('Error initiating TLS - ' + (err.message || err)), 'ETLS', false, 'STARTTLS');
- return;
- }
- this.logger.info(
- {
- tnx: 'smtp'
- },
- 'Connection upgraded with STARTTLS'
- );
- if (secured) {
- // restart session
- if (this.options.lmtp) {
- this._responseActions.push(this._actionLHLO);
- this._sendCommand('LHLO ' + this.name);
- } else {
- this._responseActions.push(this._actionEHLO);
- this._sendCommand('EHLO ' + this.name);
- }
- } else {
- this.emit('connect');
- }
- });
- }
- /**
- * Handle the response for AUTH LOGIN command. We are expecting
- * '334 VXNlcm5hbWU6' (base64 for 'Username:'). Data to be sent as
- * response needs to be base64 encoded username. We do not need
- * exact match but settle with 334 response in general as some
- * hosts invalidly use a longer message than VXNlcm5hbWU6
- *
- * @param {String} str Message from the server
- */
- _actionAUTH_LOGIN_USER(str, callback) {
- if (!/^334[ -]/.test(str)) {
- // expecting '334 VXNlcm5hbWU6'
- callback(this._formatError('Invalid login sequence while waiting for "334 VXNlcm5hbWU6"', 'EAUTH', str, 'AUTH LOGIN'));
- return;
- }
- this._responseActions.push(str => {
- this._actionAUTH_LOGIN_PASS(str, callback);
- });
- this._sendCommand(Buffer.from(this._auth.credentials.user + '', 'utf-8').toString('base64'));
- }
- /**
- * Handle the response for AUTH CRAM-MD5 command. We are expecting
- * '334 <challenge string>'. Data to be sent as response needs to be
- * base64 decoded challenge string, MD5 hashed using the password as
- * a HMAC key, prefixed by the username and a space, and finally all
- * base64 encoded again.
- *
- * @param {String} str Message from the server
- */
- _actionAUTH_CRAM_MD5(str, callback) {
- let challengeMatch = str.match(/^334\s+(.+)$/);
- let challengeString = '';
- if (!challengeMatch) {
- return callback(this._formatError('Invalid login sequence while waiting for server challenge string', 'EAUTH', str, 'AUTH CRAM-MD5'));
- } else {
- challengeString = challengeMatch[1];
- }
- // Decode from base64
- let base64decoded = Buffer.from(challengeString, 'base64').toString('ascii'),
- hmac_md5 = crypto.createHmac('md5', this._auth.credentials.pass);
- hmac_md5.update(base64decoded);
- let hex_hmac = hmac_md5.digest('hex');
- let prepended = this._auth.credentials.user + ' ' + hex_hmac;
- this._responseActions.push(str => {
- this._actionAUTH_CRAM_MD5_PASS(str, callback);
- });
- this._sendCommand(Buffer.from(prepended).toString('base64'));
- }
- /**
- * Handles the response to CRAM-MD5 authentication, if there's no error,
- * the user can be considered logged in. Start waiting for a message to send
- *
- * @param {String} str Message from the server
- */
- _actionAUTH_CRAM_MD5_PASS(str, callback) {
- if (!str.match(/^235\s+/)) {
- return callback(this._formatError('Invalid login sequence while waiting for "235"', 'EAUTH', str, 'AUTH CRAM-MD5'));
- }
- this.logger.info(
- {
- tnx: 'smtp',
- username: this._auth.user,
- action: 'authenticated',
- method: this._authMethod
- },
- 'User %s authenticated',
- JSON.stringify(this._auth.user)
- );
- this.authenticated = true;
- callback(null, true);
- }
- /**
- * Handle the response for AUTH LOGIN command. We are expecting
- * '334 UGFzc3dvcmQ6' (base64 for 'Password:'). Data to be sent as
- * response needs to be base64 encoded password.
- *
- * @param {String} str Message from the server
- */
- _actionAUTH_LOGIN_PASS(str, callback) {
- if (!/^334[ -]/.test(str)) {
- // expecting '334 UGFzc3dvcmQ6'
- return callback(this._formatError('Invalid login sequence while waiting for "334 UGFzc3dvcmQ6"', 'EAUTH', str, 'AUTH LOGIN'));
- }
- this._responseActions.push(str => {
- this._actionAUTHComplete(str, callback);
- });
- this._sendCommand(Buffer.from(this._auth.credentials.pass + '', 'utf-8').toString('base64'));
- }
- /**
- * Handles the response for authentication, if there's no error,
- * the user can be considered logged in. Start waiting for a message to send
- *
- * @param {String} str Message from the server
- */
- _actionAUTHComplete(str, isRetry, callback) {
- if (!callback && typeof isRetry === 'function') {
- callback = isRetry;
- isRetry = false;
- }
- if (str.substr(0, 3) === '334') {
- this._responseActions.push(str => {
- if (isRetry || this._authMethod !== 'XOAUTH2') {
- this._actionAUTHComplete(str, true, callback);
- } else {
- // fetch a new OAuth2 access token
- setImmediate(() => this._handleXOauth2Token(true, callback));
- }
- });
- this._sendCommand('');
- return;
- }
- if (str.charAt(0) !== '2') {
- this.logger.info(
- {
- tnx: 'smtp',
- username: this._auth.user,
- action: 'authfail',
- method: this._authMethod
- },
- 'User %s failed to authenticate',
- JSON.stringify(this._auth.user)
- );
- return callback(this._formatError('Invalid login', 'EAUTH', str, 'AUTH ' + this._authMethod));
- }
- this.logger.info(
- {
- tnx: 'smtp',
- username: this._auth.user,
- action: 'authenticated',
- method: this._authMethod
- },
- 'User %s authenticated',
- JSON.stringify(this._auth.user)
- );
- this.authenticated = true;
- callback(null, true);
- }
- /**
- * Handle response for a MAIL FROM: command
- *
- * @param {String} str Message from the server
- */
- _actionMAIL(str, callback) {
- let message, curRecipient;
- if (Number(str.charAt(0)) !== 2) {
- if (this._usingSmtpUtf8 && /^550 /.test(str) && /[\x80-\uFFFF]/.test(this._envelope.from)) {
- message = 'Internationalized mailbox name not allowed';
- } else {
- message = 'Mail command failed';
- }
- return callback(this._formatError(message, 'EENVELOPE', str, 'MAIL FROM'));
- }
- if (!this._envelope.rcptQueue.length) {
- return callback(this._formatError('Can\x27t send mail - no recipients defined', 'EENVELOPE', false, 'API'));
- } else {
- this._recipientQueue = [];
- if (this._supportedExtensions.includes('PIPELINING')) {
- while (this._envelope.rcptQueue.length) {
- curRecipient = this._envelope.rcptQueue.shift();
- this._recipientQueue.push(curRecipient);
- this._responseActions.push(str => {
- this._actionRCPT(str, callback);
- });
- this._sendCommand('RCPT TO:<' + curRecipient + '>' + this._getDsnRcptToArgs());
- }
- } else {
- curRecipient = this._envelope.rcptQueue.shift();
- this._recipientQueue.push(curRecipient);
- this._responseActions.push(str => {
- this._actionRCPT(str, callback);
- });
- this._sendCommand('RCPT TO:<' + curRecipient + '>' + this._getDsnRcptToArgs());
- }
- }
- }
- /**
- * Handle response for a RCPT TO: command
- *
- * @param {String} str Message from the server
- */
- _actionRCPT(str, callback) {
- let message,
- err,
- curRecipient = this._recipientQueue.shift();
- if (Number(str.charAt(0)) !== 2) {
- // this is a soft error
- if (this._usingSmtpUtf8 && /^553 /.test(str) && /[\x80-\uFFFF]/.test(curRecipient)) {
- message = 'Internationalized mailbox name not allowed';
- } else {
- message = 'Recipient command failed';
- }
- this._envelope.rejected.push(curRecipient);
- // store error for the failed recipient
- err = this._formatError(message, 'EENVELOPE', str, 'RCPT TO');
- err.recipient = curRecipient;
- this._envelope.rejectedErrors.push(err);
- } else {
- this._envelope.accepted.push(curRecipient);
- }
- if (!this._envelope.rcptQueue.length && !this._recipientQueue.length) {
- if (this._envelope.rejected.length < this._envelope.to.length) {
- this._responseActions.push(str => {
- this._actionDATA(str, callback);
- });
- this._sendCommand('DATA');
- } else {
- err = this._formatError('Can\x27t send mail - all recipients were rejected', 'EENVELOPE', str, 'RCPT TO');
- err.rejected = this._envelope.rejected;
- err.rejectedErrors = this._envelope.rejectedErrors;
- return callback(err);
- }
- } else if (this._envelope.rcptQueue.length) {
- curRecipient = this._envelope.rcptQueue.shift();
- this._recipientQueue.push(curRecipient);
- this._responseActions.push(str => {
- this._actionRCPT(str, callback);
- });
- this._sendCommand('RCPT TO:<' + curRecipient + '>' + this._getDsnRcptToArgs());
- }
- }
- /**
- * Handle response for a DATA command
- *
- * @param {String} str Message from the server
- */
- _actionDATA(str, callback) {
- // response should be 354 but according to this issue https://github.com/eleith/emailjs/issues/24
- // some servers might use 250 instead, so lets check for 2 or 3 as the first digit
- if (!/^[23]/.test(str)) {
- return callback(this._formatError('Data command failed', 'EENVELOPE', str, 'DATA'));
- }
- let response = {
- accepted: this._envelope.accepted,
- rejected: this._envelope.rejected
- };
- if (this._envelope.rejectedErrors.length) {
- response.rejectedErrors = this._envelope.rejectedErrors;
- }
- callback(null, response);
- }
- /**
- * Handle response for a DATA stream when using SMTP
- * We expect a single response that defines if the sending succeeded or failed
- *
- * @param {String} str Message from the server
- */
- _actionSMTPStream(str, callback) {
- if (Number(str.charAt(0)) !== 2) {
- // Message failed
- return callback(this._formatError('Message failed', 'EMESSAGE', str, 'DATA'));
- } else {
- // Message sent succesfully
- return callback(null, str);
- }
- }
- /**
- * Handle response for a DATA stream
- * We expect a separate response for every recipient. All recipients can either
- * succeed or fail separately
- *
- * @param {String} recipient The recipient this response applies to
- * @param {Boolean} final Is this the final recipient?
- * @param {String} str Message from the server
- */
- _actionLMTPStream(recipient, final, str, callback) {
- let err;
- if (Number(str.charAt(0)) !== 2) {
- // Message failed
- err = this._formatError('Message failed for recipient ' + recipient, 'EMESSAGE', str, 'DATA');
- err.recipient = recipient;
- this._envelope.rejected.push(recipient);
- this._envelope.rejectedErrors.push(err);
- for (let i = 0, len = this._envelope.accepted.length; i < len; i++) {
- if (this._envelope.accepted[i] === recipient) {
- this._envelope.accepted.splice(i, 1);
- }
- }
- }
- if (final) {
- return callback(null, str);
- }
- }
- _handleXOauth2Token(isRetry, callback) {
- this._auth.oauth2.getToken(isRetry, (err, accessToken) => {
- if (err) {
- this.logger.info(
- {
- tnx: 'smtp',
- username: this._auth.user,
- action: 'authfail',
- method: this._authMethod
- },
- 'User %s failed to authenticate',
- JSON.stringify(this._auth.user)
- );
- return callback(this._formatError(err, 'EAUTH', false, 'AUTH XOAUTH2'));
- }
- this._responseActions.push(str => {
- this._actionAUTHComplete(str, isRetry, callback);
- });
- this._sendCommand('AUTH XOAUTH2 ' + this._auth.oauth2.buildXOAuth2Token(accessToken));
- });
- }
- /**
- *
- * @param {string} command
- * @private
- */
- _isDestroyedMessage(command) {
- if (this._destroyed) {
- return 'Cannot ' + command + ' - smtp connection is already destroyed.';
- }
- if (this._socket) {
- if (this._socket.destroyed) {
- return 'Cannot ' + command + ' - smtp connection socket is already destroyed.';
- }
- if (!this._socket.writable) {
- return 'Cannot ' + command + ' - smtp connection socket is already half-closed.';
- }
- }
- }
- _getHostname() {
- // defaul hostname is machine hostname or [IP]
- let defaultHostname = os.hostname() || '';
- // ignore if not FQDN
- if (defaultHostname.indexOf('.') < 0) {
- defaultHostname = '[127.0.0.1]';
- }
- // IP should be enclosed in []
- if (defaultHostname.match(/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$/)) {
- defaultHostname = '[' + defaultHostname + ']';
- }
- return defaultHostname;
- }
- }
- module.exports = SMTPConnection;
|