@push.rocks/smartmta 5.1.2 → 5.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/changelog.md +14 -0
- package/dist_ts/00_commitinfo_data.d.ts +8 -0
- package/dist_ts/00_commitinfo_data.js +9 -0
- package/dist_ts/index.d.ts +3 -0
- package/dist_ts/index.js +4 -0
- package/dist_ts/logger.d.ts +17 -0
- package/dist_ts/logger.js +76 -0
- package/dist_ts/mail/core/classes.bouncemanager.d.ts +185 -0
- package/dist_ts/mail/core/classes.bouncemanager.js +569 -0
- package/dist_ts/mail/core/classes.email.d.ts +291 -0
- package/dist_ts/mail/core/classes.email.js +802 -0
- package/dist_ts/mail/core/classes.emailvalidator.d.ts +61 -0
- package/dist_ts/mail/core/classes.emailvalidator.js +184 -0
- package/dist_ts/mail/core/classes.templatemanager.d.ts +95 -0
- package/dist_ts/mail/core/classes.templatemanager.js +240 -0
- package/dist_ts/mail/core/index.d.ts +4 -0
- package/dist_ts/mail/core/index.js +6 -0
- package/dist_ts/mail/delivery/classes.delivery.queue.d.ts +163 -0
- package/dist_ts/mail/delivery/classes.delivery.queue.js +488 -0
- package/dist_ts/mail/delivery/classes.delivery.system.d.ts +160 -0
- package/dist_ts/mail/delivery/classes.delivery.system.js +630 -0
- package/dist_ts/mail/delivery/classes.unified.rate.limiter.d.ts +200 -0
- package/dist_ts/mail/delivery/classes.unified.rate.limiter.js +820 -0
- package/dist_ts/mail/delivery/index.d.ts +4 -0
- package/dist_ts/mail/delivery/index.js +6 -0
- package/dist_ts/mail/delivery/interfaces.d.ts +140 -0
- package/dist_ts/mail/delivery/interfaces.js +17 -0
- package/dist_ts/mail/index.d.ts +7 -0
- package/dist_ts/mail/index.js +12 -0
- package/dist_ts/mail/routing/classes.dkim.manager.d.ts +25 -0
- package/dist_ts/mail/routing/classes.dkim.manager.js +127 -0
- package/dist_ts/mail/routing/classes.dns.manager.d.ts +79 -0
- package/dist_ts/mail/routing/classes.dns.manager.js +415 -0
- package/dist_ts/mail/routing/classes.domain.registry.d.ts +54 -0
- package/dist_ts/mail/routing/classes.domain.registry.js +119 -0
- package/dist_ts/mail/routing/classes.email.action.executor.d.ts +33 -0
- package/dist_ts/mail/routing/classes.email.action.executor.js +137 -0
- package/dist_ts/mail/routing/classes.email.router.d.ts +171 -0
- package/dist_ts/mail/routing/classes.email.router.js +494 -0
- package/dist_ts/mail/routing/classes.unified.email.server.d.ts +241 -0
- package/dist_ts/mail/routing/classes.unified.email.server.js +935 -0
- package/dist_ts/mail/routing/index.d.ts +7 -0
- package/dist_ts/mail/routing/index.js +9 -0
- package/dist_ts/mail/routing/interfaces.d.ts +187 -0
- package/dist_ts/mail/routing/interfaces.js +2 -0
- package/dist_ts/mail/security/classes.dkimcreator.d.ts +72 -0
- package/dist_ts/mail/security/classes.dkimcreator.js +360 -0
- package/dist_ts/mail/security/classes.spfverifier.d.ts +62 -0
- package/dist_ts/mail/security/classes.spfverifier.js +87 -0
- package/dist_ts/mail/security/index.d.ts +2 -0
- package/dist_ts/mail/security/index.js +4 -0
- package/dist_ts/paths.d.ts +14 -0
- package/dist_ts/paths.js +39 -0
- package/dist_ts/plugins.d.ts +24 -0
- package/dist_ts/plugins.js +28 -0
- package/dist_ts/security/classes.contentscanner.d.ts +130 -0
- package/dist_ts/security/classes.contentscanner.js +338 -0
- package/dist_ts/security/classes.ipreputationchecker.d.ts +73 -0
- package/dist_ts/security/classes.ipreputationchecker.js +263 -0
- package/dist_ts/security/classes.rustsecuritybridge.d.ts +398 -0
- package/dist_ts/security/classes.rustsecuritybridge.js +484 -0
- package/dist_ts/security/classes.securitylogger.d.ts +140 -0
- package/dist_ts/security/classes.securitylogger.js +235 -0
- package/dist_ts/security/index.d.ts +4 -0
- package/dist_ts/security/index.js +5 -0
- package/package.json +6 -1
- package/readme.md +52 -9
- package/ts/00_commitinfo_data.ts +8 -0
- package/ts/index.ts +3 -0
- package/ts/logger.ts +91 -0
- package/ts/mail/core/classes.bouncemanager.ts +731 -0
- package/ts/mail/core/classes.email.ts +942 -0
- package/ts/mail/core/classes.emailvalidator.ts +239 -0
- package/ts/mail/core/classes.templatemanager.ts +320 -0
- package/ts/mail/core/index.ts +5 -0
- package/ts/mail/delivery/classes.delivery.queue.ts +645 -0
- package/ts/mail/delivery/classes.delivery.system.ts +816 -0
- package/ts/mail/delivery/classes.unified.rate.limiter.ts +1053 -0
- package/ts/mail/delivery/index.ts +5 -0
- package/ts/mail/delivery/interfaces.ts +167 -0
- package/ts/mail/index.ts +17 -0
- package/ts/mail/routing/classes.dkim.manager.ts +157 -0
- package/ts/mail/routing/classes.dns.manager.ts +573 -0
- package/ts/mail/routing/classes.domain.registry.ts +139 -0
- package/ts/mail/routing/classes.email.action.executor.ts +175 -0
- package/ts/mail/routing/classes.email.router.ts +575 -0
- package/ts/mail/routing/classes.unified.email.server.ts +1207 -0
- package/ts/mail/routing/index.ts +9 -0
- package/ts/mail/routing/interfaces.ts +202 -0
- package/ts/mail/security/classes.dkimcreator.ts +447 -0
- package/ts/mail/security/classes.spfverifier.ts +126 -0
- package/ts/mail/security/index.ts +3 -0
- package/ts/paths.ts +48 -0
- package/ts/plugins.ts +53 -0
- package/ts/security/classes.contentscanner.ts +400 -0
- package/ts/security/classes.ipreputationchecker.ts +315 -0
- package/ts/security/classes.rustsecuritybridge.ts +943 -0
- package/ts/security/classes.securitylogger.ts +299 -0
- package/ts/security/index.ts +40 -0
|
@@ -0,0 +1,484 @@
|
|
|
1
|
+
import * as plugins from '../plugins.js';
|
|
2
|
+
import * as paths from '../paths.js';
|
|
3
|
+
import { logger } from '../logger.js';
|
|
4
|
+
import { EventEmitter } from 'events';
|
|
5
|
+
// ---------------------------------------------------------------------------
|
|
6
|
+
// Bridge state machine
|
|
7
|
+
// ---------------------------------------------------------------------------
|
|
8
|
+
export var BridgeState;
|
|
9
|
+
(function (BridgeState) {
|
|
10
|
+
BridgeState["Idle"] = "idle";
|
|
11
|
+
BridgeState["Starting"] = "starting";
|
|
12
|
+
BridgeState["Running"] = "running";
|
|
13
|
+
BridgeState["Restarting"] = "restarting";
|
|
14
|
+
BridgeState["Failed"] = "failed";
|
|
15
|
+
BridgeState["Stopped"] = "stopped";
|
|
16
|
+
})(BridgeState || (BridgeState = {}));
|
|
17
|
+
const DEFAULT_RESILIENCE_CONFIG = {
|
|
18
|
+
maxRestartAttempts: 5,
|
|
19
|
+
healthCheckIntervalMs: 30_000,
|
|
20
|
+
restartBackoffBaseMs: 1_000,
|
|
21
|
+
restartBackoffMaxMs: 30_000,
|
|
22
|
+
healthCheckTimeoutMs: 5_000,
|
|
23
|
+
};
|
|
24
|
+
// ---------------------------------------------------------------------------
|
|
25
|
+
// RustSecurityBridge — singleton wrapper around smartrust.RustBridge
|
|
26
|
+
// ---------------------------------------------------------------------------
|
|
27
|
+
/**
|
|
28
|
+
* Bridge between TypeScript and the Rust `mailer-bin` binary.
|
|
29
|
+
*
|
|
30
|
+
* Uses `@push.rocks/smartrust` for JSON-over-stdin/stdout IPC.
|
|
31
|
+
* Singleton — access via `RustSecurityBridge.getInstance()`.
|
|
32
|
+
*
|
|
33
|
+
* Features resilience via auto-restart with exponential backoff,
|
|
34
|
+
* periodic health checks, and a state machine that tracks the
|
|
35
|
+
* bridge lifecycle.
|
|
36
|
+
*/
|
|
37
|
+
export class RustSecurityBridge extends EventEmitter {
|
|
38
|
+
static instance = null;
|
|
39
|
+
static _resilienceConfig = { ...DEFAULT_RESILIENCE_CONFIG };
|
|
40
|
+
bridge;
|
|
41
|
+
_running = false;
|
|
42
|
+
_state = BridgeState.Idle;
|
|
43
|
+
_restartAttempts = 0;
|
|
44
|
+
_restartTimer = null;
|
|
45
|
+
_healthCheckTimer = null;
|
|
46
|
+
_deliberateStop = false;
|
|
47
|
+
_smtpServerConfig = null;
|
|
48
|
+
constructor() {
|
|
49
|
+
super();
|
|
50
|
+
this.bridge = new plugins.smartrust.RustBridge({
|
|
51
|
+
binaryName: 'mailer-bin',
|
|
52
|
+
cliArgs: ['--management'],
|
|
53
|
+
requestTimeoutMs: 30_000,
|
|
54
|
+
readyTimeoutMs: 10_000,
|
|
55
|
+
localPaths: [
|
|
56
|
+
plugins.path.join(paths.packageDir, 'dist_rust', 'mailer-bin'),
|
|
57
|
+
plugins.path.join(paths.packageDir, 'rust', 'target', 'release', 'mailer-bin'),
|
|
58
|
+
plugins.path.join(paths.packageDir, 'rust', 'target', 'debug', 'mailer-bin'),
|
|
59
|
+
],
|
|
60
|
+
searchSystemPath: false,
|
|
61
|
+
});
|
|
62
|
+
// Forward lifecycle events
|
|
63
|
+
this.bridge.on('ready', () => {
|
|
64
|
+
this._running = true;
|
|
65
|
+
logger.log('info', 'Rust security bridge is ready');
|
|
66
|
+
});
|
|
67
|
+
this.bridge.on('exit', (code, signal) => {
|
|
68
|
+
this._running = false;
|
|
69
|
+
logger.log('warn', `Rust security bridge exited (code=${code}, signal=${signal})`);
|
|
70
|
+
if (this._deliberateStop) {
|
|
71
|
+
this.setState(BridgeState.Stopped);
|
|
72
|
+
}
|
|
73
|
+
else if (this._state === BridgeState.Running) {
|
|
74
|
+
// Unexpected exit — attempt restart
|
|
75
|
+
this.attemptRestart();
|
|
76
|
+
}
|
|
77
|
+
});
|
|
78
|
+
this.bridge.on('stderr', (line) => {
|
|
79
|
+
logger.log('debug', `[rust-bridge] ${line}`);
|
|
80
|
+
});
|
|
81
|
+
}
|
|
82
|
+
// -----------------------------------------------------------------------
|
|
83
|
+
// Static configuration & singleton
|
|
84
|
+
// -----------------------------------------------------------------------
|
|
85
|
+
/** Get or create the singleton instance. */
|
|
86
|
+
static getInstance() {
|
|
87
|
+
if (!RustSecurityBridge.instance) {
|
|
88
|
+
RustSecurityBridge.instance = new RustSecurityBridge();
|
|
89
|
+
}
|
|
90
|
+
return RustSecurityBridge.instance;
|
|
91
|
+
}
|
|
92
|
+
/** Reset the singleton instance (for testing). */
|
|
93
|
+
static resetInstance() {
|
|
94
|
+
if (RustSecurityBridge.instance) {
|
|
95
|
+
RustSecurityBridge.instance.stopHealthCheck();
|
|
96
|
+
if (RustSecurityBridge.instance._restartTimer) {
|
|
97
|
+
clearTimeout(RustSecurityBridge.instance._restartTimer);
|
|
98
|
+
RustSecurityBridge.instance._restartTimer = null;
|
|
99
|
+
}
|
|
100
|
+
RustSecurityBridge.instance.removeAllListeners();
|
|
101
|
+
}
|
|
102
|
+
RustSecurityBridge.instance = null;
|
|
103
|
+
}
|
|
104
|
+
/** Configure resilience parameters. Can be called before or after getInstance(). */
|
|
105
|
+
static configure(config) {
|
|
106
|
+
RustSecurityBridge._resilienceConfig = {
|
|
107
|
+
...RustSecurityBridge._resilienceConfig,
|
|
108
|
+
...config,
|
|
109
|
+
};
|
|
110
|
+
}
|
|
111
|
+
// -----------------------------------------------------------------------
|
|
112
|
+
// State management
|
|
113
|
+
// -----------------------------------------------------------------------
|
|
114
|
+
/** Current bridge state. */
|
|
115
|
+
get state() {
|
|
116
|
+
return this._state;
|
|
117
|
+
}
|
|
118
|
+
/** Whether the Rust process is currently running and accepting commands. */
|
|
119
|
+
get running() {
|
|
120
|
+
return this._running;
|
|
121
|
+
}
|
|
122
|
+
setState(newState) {
|
|
123
|
+
const oldState = this._state;
|
|
124
|
+
if (oldState === newState)
|
|
125
|
+
return;
|
|
126
|
+
this._state = newState;
|
|
127
|
+
logger.log('info', `Rust bridge state: ${oldState} -> ${newState}`);
|
|
128
|
+
this.emit('stateChange', { oldState, newState });
|
|
129
|
+
}
|
|
130
|
+
/**
|
|
131
|
+
* Throws a descriptive error if the bridge is not in Running state.
|
|
132
|
+
* Called at the top of every command method.
|
|
133
|
+
*/
|
|
134
|
+
ensureRunning() {
|
|
135
|
+
if (this._state === BridgeState.Running && this._running) {
|
|
136
|
+
return;
|
|
137
|
+
}
|
|
138
|
+
switch (this._state) {
|
|
139
|
+
case BridgeState.Idle:
|
|
140
|
+
throw new Error('Rust bridge has not been started yet. Call start() first.');
|
|
141
|
+
case BridgeState.Starting:
|
|
142
|
+
throw new Error('Rust bridge is still starting. Wait for start() to resolve.');
|
|
143
|
+
case BridgeState.Restarting:
|
|
144
|
+
throw new Error('Rust bridge is restarting after a crash. Commands will resume once it recovers.');
|
|
145
|
+
case BridgeState.Failed:
|
|
146
|
+
throw new Error('Rust bridge has failed after exhausting all restart attempts.');
|
|
147
|
+
case BridgeState.Stopped:
|
|
148
|
+
throw new Error('Rust bridge has been stopped. Call start() to restart it.');
|
|
149
|
+
default:
|
|
150
|
+
throw new Error(`Rust bridge is not running (state=${this._state}).`);
|
|
151
|
+
}
|
|
152
|
+
}
|
|
153
|
+
// -----------------------------------------------------------------------
|
|
154
|
+
// Lifecycle
|
|
155
|
+
// -----------------------------------------------------------------------
|
|
156
|
+
/**
|
|
157
|
+
* Spawn the Rust binary and wait for the ready signal.
|
|
158
|
+
* @returns `true` if the binary started successfully, `false` otherwise.
|
|
159
|
+
*/
|
|
160
|
+
async start() {
|
|
161
|
+
if (this._running && this._state === BridgeState.Running) {
|
|
162
|
+
return true;
|
|
163
|
+
}
|
|
164
|
+
this._deliberateStop = false;
|
|
165
|
+
this._restartAttempts = 0;
|
|
166
|
+
this.setState(BridgeState.Starting);
|
|
167
|
+
try {
|
|
168
|
+
const ok = await this.bridge.spawn();
|
|
169
|
+
this._running = ok;
|
|
170
|
+
if (ok) {
|
|
171
|
+
this.setState(BridgeState.Running);
|
|
172
|
+
this.startHealthCheck();
|
|
173
|
+
logger.log('info', 'Rust security bridge started');
|
|
174
|
+
}
|
|
175
|
+
else {
|
|
176
|
+
this.setState(BridgeState.Failed);
|
|
177
|
+
logger.log('warn', 'Rust security bridge failed to start (binary not found or timeout)');
|
|
178
|
+
}
|
|
179
|
+
return ok;
|
|
180
|
+
}
|
|
181
|
+
catch (err) {
|
|
182
|
+
this.setState(BridgeState.Failed);
|
|
183
|
+
logger.log('error', `Failed to start Rust security bridge: ${err.message}`);
|
|
184
|
+
return false;
|
|
185
|
+
}
|
|
186
|
+
}
|
|
187
|
+
/** Kill the Rust process deliberately. */
|
|
188
|
+
async stop() {
|
|
189
|
+
this._deliberateStop = true;
|
|
190
|
+
// Cancel any pending restart
|
|
191
|
+
if (this._restartTimer) {
|
|
192
|
+
clearTimeout(this._restartTimer);
|
|
193
|
+
this._restartTimer = null;
|
|
194
|
+
}
|
|
195
|
+
this.stopHealthCheck();
|
|
196
|
+
this._smtpServerConfig = null;
|
|
197
|
+
if (!this._running) {
|
|
198
|
+
this.setState(BridgeState.Stopped);
|
|
199
|
+
return;
|
|
200
|
+
}
|
|
201
|
+
try {
|
|
202
|
+
this.bridge.kill();
|
|
203
|
+
this._running = false;
|
|
204
|
+
this.setState(BridgeState.Stopped);
|
|
205
|
+
logger.log('info', 'Rust security bridge stopped');
|
|
206
|
+
}
|
|
207
|
+
catch (err) {
|
|
208
|
+
logger.log('error', `Error stopping Rust security bridge: ${err.message}`);
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
// -----------------------------------------------------------------------
|
|
212
|
+
// Auto-restart with exponential backoff
|
|
213
|
+
// -----------------------------------------------------------------------
|
|
214
|
+
attemptRestart() {
|
|
215
|
+
const config = RustSecurityBridge._resilienceConfig;
|
|
216
|
+
this._restartAttempts++;
|
|
217
|
+
if (this._restartAttempts > config.maxRestartAttempts) {
|
|
218
|
+
logger.log('error', `Rust bridge exceeded max restart attempts (${config.maxRestartAttempts}). Giving up.`);
|
|
219
|
+
this.setState(BridgeState.Failed);
|
|
220
|
+
return;
|
|
221
|
+
}
|
|
222
|
+
this.setState(BridgeState.Restarting);
|
|
223
|
+
this.stopHealthCheck();
|
|
224
|
+
const delay = Math.min(config.restartBackoffBaseMs * Math.pow(2, this._restartAttempts - 1), config.restartBackoffMaxMs);
|
|
225
|
+
logger.log('info', `Rust bridge restart attempt ${this._restartAttempts}/${config.maxRestartAttempts} in ${delay}ms`);
|
|
226
|
+
this._restartTimer = setTimeout(async () => {
|
|
227
|
+
this._restartTimer = null;
|
|
228
|
+
// Guard: if stop() was called while we were waiting, don't restart
|
|
229
|
+
if (this._deliberateStop) {
|
|
230
|
+
this.setState(BridgeState.Stopped);
|
|
231
|
+
return;
|
|
232
|
+
}
|
|
233
|
+
try {
|
|
234
|
+
const ok = await this.bridge.spawn();
|
|
235
|
+
this._running = ok;
|
|
236
|
+
if (ok) {
|
|
237
|
+
logger.log('info', 'Rust bridge restarted successfully');
|
|
238
|
+
this._restartAttempts = 0;
|
|
239
|
+
this.setState(BridgeState.Running);
|
|
240
|
+
this.startHealthCheck();
|
|
241
|
+
await this.restoreAfterRestart();
|
|
242
|
+
}
|
|
243
|
+
else {
|
|
244
|
+
logger.log('warn', 'Rust bridge restart failed (spawn returned false)');
|
|
245
|
+
this.attemptRestart();
|
|
246
|
+
}
|
|
247
|
+
}
|
|
248
|
+
catch (err) {
|
|
249
|
+
logger.log('error', `Rust bridge restart failed: ${err.message}`);
|
|
250
|
+
this.attemptRestart();
|
|
251
|
+
}
|
|
252
|
+
}, delay);
|
|
253
|
+
}
|
|
254
|
+
/**
|
|
255
|
+
* Restore state after a successful restart:
|
|
256
|
+
* - Re-send startSmtpServer command if the SMTP server was running
|
|
257
|
+
*/
|
|
258
|
+
async restoreAfterRestart() {
|
|
259
|
+
if (this._smtpServerConfig) {
|
|
260
|
+
try {
|
|
261
|
+
logger.log('info', 'Restoring SMTP server after bridge restart');
|
|
262
|
+
const result = await this.bridge.sendCommand('startSmtpServer', this._smtpServerConfig);
|
|
263
|
+
if (result?.started) {
|
|
264
|
+
logger.log('info', 'SMTP server restored after bridge restart');
|
|
265
|
+
}
|
|
266
|
+
else {
|
|
267
|
+
logger.log('warn', 'SMTP server failed to restore after bridge restart');
|
|
268
|
+
}
|
|
269
|
+
}
|
|
270
|
+
catch (err) {
|
|
271
|
+
logger.log('error', `Failed to restore SMTP server after restart: ${err.message}`);
|
|
272
|
+
}
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
// -----------------------------------------------------------------------
|
|
276
|
+
// Health check
|
|
277
|
+
// -----------------------------------------------------------------------
|
|
278
|
+
startHealthCheck() {
|
|
279
|
+
this.stopHealthCheck();
|
|
280
|
+
const config = RustSecurityBridge._resilienceConfig;
|
|
281
|
+
this._healthCheckTimer = setInterval(async () => {
|
|
282
|
+
if (this._state !== BridgeState.Running || !this._running) {
|
|
283
|
+
return;
|
|
284
|
+
}
|
|
285
|
+
try {
|
|
286
|
+
const pongPromise = this.bridge.sendCommand('ping', {});
|
|
287
|
+
const timeoutPromise = new Promise((_, reject) => setTimeout(() => reject(new Error('Health check timeout')), config.healthCheckTimeoutMs));
|
|
288
|
+
const res = await Promise.race([pongPromise, timeoutPromise]);
|
|
289
|
+
if (!res?.pong) {
|
|
290
|
+
throw new Error('Health check: unexpected ping response');
|
|
291
|
+
}
|
|
292
|
+
}
|
|
293
|
+
catch (err) {
|
|
294
|
+
logger.log('warn', `Rust bridge health check failed: ${err.message}. Killing process to trigger restart.`);
|
|
295
|
+
try {
|
|
296
|
+
this.bridge.kill();
|
|
297
|
+
}
|
|
298
|
+
catch {
|
|
299
|
+
// Already dead
|
|
300
|
+
}
|
|
301
|
+
// The exit handler will trigger attemptRestart()
|
|
302
|
+
}
|
|
303
|
+
}, config.healthCheckIntervalMs);
|
|
304
|
+
}
|
|
305
|
+
stopHealthCheck() {
|
|
306
|
+
if (this._healthCheckTimer) {
|
|
307
|
+
clearInterval(this._healthCheckTimer);
|
|
308
|
+
this._healthCheckTimer = null;
|
|
309
|
+
}
|
|
310
|
+
}
|
|
311
|
+
// -----------------------------------------------------------------------
|
|
312
|
+
// Commands — thin typed wrappers over sendCommand
|
|
313
|
+
// -----------------------------------------------------------------------
|
|
314
|
+
/** Ping the Rust process. */
|
|
315
|
+
async ping() {
|
|
316
|
+
this.ensureRunning();
|
|
317
|
+
const res = await this.bridge.sendCommand('ping', {});
|
|
318
|
+
return res?.pong === true;
|
|
319
|
+
}
|
|
320
|
+
/** Get version information for all Rust crates. */
|
|
321
|
+
async getVersion() {
|
|
322
|
+
this.ensureRunning();
|
|
323
|
+
return this.bridge.sendCommand('version', {});
|
|
324
|
+
}
|
|
325
|
+
/** Validate an email address. */
|
|
326
|
+
async validateEmail(email) {
|
|
327
|
+
this.ensureRunning();
|
|
328
|
+
return this.bridge.sendCommand('validateEmail', { email });
|
|
329
|
+
}
|
|
330
|
+
/** Detect bounce type from SMTP response / diagnostic code. */
|
|
331
|
+
async detectBounce(opts) {
|
|
332
|
+
this.ensureRunning();
|
|
333
|
+
return this.bridge.sendCommand('detectBounce', opts);
|
|
334
|
+
}
|
|
335
|
+
/** Scan email content for threats (phishing, spam, malware, etc.). */
|
|
336
|
+
async scanContent(opts) {
|
|
337
|
+
this.ensureRunning();
|
|
338
|
+
return this.bridge.sendCommand('scanContent', opts);
|
|
339
|
+
}
|
|
340
|
+
/** Check IP reputation via DNSBL. */
|
|
341
|
+
async checkIpReputation(ip) {
|
|
342
|
+
this.ensureRunning();
|
|
343
|
+
return this.bridge.sendCommand('checkIpReputation', { ip });
|
|
344
|
+
}
|
|
345
|
+
/** Verify DKIM signatures on a raw email message. */
|
|
346
|
+
async verifyDkim(rawMessage) {
|
|
347
|
+
this.ensureRunning();
|
|
348
|
+
return this.bridge.sendCommand('verifyDkim', { rawMessage });
|
|
349
|
+
}
|
|
350
|
+
/** Sign an email with DKIM (RSA or Ed25519). */
|
|
351
|
+
async signDkim(opts) {
|
|
352
|
+
this.ensureRunning();
|
|
353
|
+
return this.bridge.sendCommand('signDkim', opts);
|
|
354
|
+
}
|
|
355
|
+
/** Check SPF for a sender. */
|
|
356
|
+
async checkSpf(opts) {
|
|
357
|
+
this.ensureRunning();
|
|
358
|
+
return this.bridge.sendCommand('checkSpf', opts);
|
|
359
|
+
}
|
|
360
|
+
/**
|
|
361
|
+
* Compound email security verification: DKIM + SPF + DMARC in one IPC call.
|
|
362
|
+
*
|
|
363
|
+
* This is the preferred method for inbound email verification — it avoids
|
|
364
|
+
* 3 sequential round-trips and correctly passes raw mail-auth types internally.
|
|
365
|
+
*/
|
|
366
|
+
async verifyEmail(opts) {
|
|
367
|
+
this.ensureRunning();
|
|
368
|
+
return this.bridge.sendCommand('verifyEmail', opts);
|
|
369
|
+
}
|
|
370
|
+
// -----------------------------------------------------------------------
|
|
371
|
+
// SMTP Client — outbound email delivery via Rust
|
|
372
|
+
// -----------------------------------------------------------------------
|
|
373
|
+
/** Send a structured email via the Rust SMTP client. */
|
|
374
|
+
async sendOutboundEmail(opts) {
|
|
375
|
+
this.ensureRunning();
|
|
376
|
+
return this.bridge.sendCommand('sendEmail', opts);
|
|
377
|
+
}
|
|
378
|
+
/** Send a pre-formatted raw email via the Rust SMTP client. */
|
|
379
|
+
async sendRawEmail(opts) {
|
|
380
|
+
this.ensureRunning();
|
|
381
|
+
return this.bridge.sendCommand('sendRawEmail', opts);
|
|
382
|
+
}
|
|
383
|
+
/** Verify connectivity to an SMTP server. */
|
|
384
|
+
async verifySmtpConnection(opts) {
|
|
385
|
+
this.ensureRunning();
|
|
386
|
+
return this.bridge.sendCommand('verifySmtpConnection', opts);
|
|
387
|
+
}
|
|
388
|
+
/** Close a specific connection pool (or all pools if no key is given). */
|
|
389
|
+
async closeSmtpPool(poolKey) {
|
|
390
|
+
this.ensureRunning();
|
|
391
|
+
await this.bridge.sendCommand('closeSmtpPool', poolKey ? { poolKey } : {});
|
|
392
|
+
}
|
|
393
|
+
/** Get status of all SMTP client connection pools. */
|
|
394
|
+
async getSmtpPoolStatus() {
|
|
395
|
+
this.ensureRunning();
|
|
396
|
+
return this.bridge.sendCommand('getSmtpPoolStatus', {});
|
|
397
|
+
}
|
|
398
|
+
// -----------------------------------------------------------------------
|
|
399
|
+
// SMTP Server lifecycle
|
|
400
|
+
// -----------------------------------------------------------------------
|
|
401
|
+
/**
|
|
402
|
+
* Start the Rust SMTP server.
|
|
403
|
+
* The server will listen on the configured ports and emit events for
|
|
404
|
+
* emailReceived and authRequest that must be handled by the caller.
|
|
405
|
+
*/
|
|
406
|
+
async startSmtpServer(config) {
|
|
407
|
+
this.ensureRunning();
|
|
408
|
+
this._smtpServerConfig = config;
|
|
409
|
+
const result = await this.bridge.sendCommand('startSmtpServer', config);
|
|
410
|
+
return result?.started === true;
|
|
411
|
+
}
|
|
412
|
+
/** Stop the Rust SMTP server. */
|
|
413
|
+
async stopSmtpServer() {
|
|
414
|
+
this.ensureRunning();
|
|
415
|
+
this._smtpServerConfig = null;
|
|
416
|
+
await this.bridge.sendCommand('stopSmtpServer', {});
|
|
417
|
+
}
|
|
418
|
+
/**
|
|
419
|
+
* Send the result of email processing back to the Rust SMTP server.
|
|
420
|
+
* This resolves a pending correlation-ID callback, allowing the Rust
|
|
421
|
+
* server to send the SMTP response to the client.
|
|
422
|
+
*/
|
|
423
|
+
async sendEmailProcessingResult(opts) {
|
|
424
|
+
this.ensureRunning();
|
|
425
|
+
await this.bridge.sendCommand('emailProcessingResult', opts);
|
|
426
|
+
}
|
|
427
|
+
/**
|
|
428
|
+
* Send the result of authentication validation back to the Rust SMTP server.
|
|
429
|
+
*/
|
|
430
|
+
async sendAuthResult(opts) {
|
|
431
|
+
this.ensureRunning();
|
|
432
|
+
await this.bridge.sendCommand('authResult', opts);
|
|
433
|
+
}
|
|
434
|
+
/**
|
|
435
|
+
* Send SCRAM credentials back to the Rust SMTP server.
|
|
436
|
+
* Values (salt, storedKey, serverKey) must be base64-encoded.
|
|
437
|
+
*/
|
|
438
|
+
async sendScramCredentialResult(opts) {
|
|
439
|
+
this.ensureRunning();
|
|
440
|
+
await this.bridge.sendCommand('scramCredentialResult', opts);
|
|
441
|
+
}
|
|
442
|
+
/** Update rate limit configuration at runtime. */
|
|
443
|
+
async configureRateLimits(config) {
|
|
444
|
+
this.ensureRunning();
|
|
445
|
+
await this.bridge.sendCommand('configureRateLimits', config);
|
|
446
|
+
}
|
|
447
|
+
// -----------------------------------------------------------------------
|
|
448
|
+
// Event registration — delegates to the underlying bridge EventEmitter
|
|
449
|
+
// -----------------------------------------------------------------------
|
|
450
|
+
/**
|
|
451
|
+
* Register a handler for emailReceived events from the Rust SMTP server.
|
|
452
|
+
* These events fire when a complete email has been received and needs processing.
|
|
453
|
+
*/
|
|
454
|
+
onEmailReceived(handler) {
|
|
455
|
+
this.bridge.on('management:emailReceived', handler);
|
|
456
|
+
}
|
|
457
|
+
/**
|
|
458
|
+
* Register a handler for authRequest events from the Rust SMTP server.
|
|
459
|
+
* The handler must call sendAuthResult() with the correlationId.
|
|
460
|
+
*/
|
|
461
|
+
onAuthRequest(handler) {
|
|
462
|
+
this.bridge.on('management:authRequest', handler);
|
|
463
|
+
}
|
|
464
|
+
/**
|
|
465
|
+
* Register a handler for scramCredentialRequest events from the Rust SMTP server.
|
|
466
|
+
* The handler must call sendScramCredentialResult() with the correlationId.
|
|
467
|
+
*/
|
|
468
|
+
onScramCredentialRequest(handler) {
|
|
469
|
+
this.bridge.on('management:scramCredentialRequest', handler);
|
|
470
|
+
}
|
|
471
|
+
/** Remove an emailReceived event handler. */
|
|
472
|
+
offEmailReceived(handler) {
|
|
473
|
+
this.bridge.off('management:emailReceived', handler);
|
|
474
|
+
}
|
|
475
|
+
/** Remove an authRequest event handler. */
|
|
476
|
+
offAuthRequest(handler) {
|
|
477
|
+
this.bridge.off('management:authRequest', handler);
|
|
478
|
+
}
|
|
479
|
+
/** Remove a scramCredentialRequest event handler. */
|
|
480
|
+
offScramCredentialRequest(handler) {
|
|
481
|
+
this.bridge.off('management:scramCredentialRequest', handler);
|
|
482
|
+
}
|
|
483
|
+
}
|
|
484
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.rustsecuritybridge.js","sourceRoot":"","sources":["../../ts/security/classes.rustsecuritybridge.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,KAAK,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AA8TtC,8EAA8E;AAC9E,uBAAuB;AACvB,8EAA8E;AAE9E,MAAM,CAAN,IAAY,WAOX;AAPD,WAAY,WAAW;IACrB,4BAAa,CAAA;IACb,oCAAqB,CAAA;IACrB,kCAAmB,CAAA;IACnB,wCAAyB,CAAA;IACzB,gCAAiB,CAAA;IACjB,kCAAmB,CAAA;AACrB,CAAC,EAPW,WAAW,KAAX,WAAW,QAOtB;AAUD,MAAM,yBAAyB,GAA4B;IACzD,kBAAkB,EAAE,CAAC;IACrB,qBAAqB,EAAE,MAAM;IAC7B,oBAAoB,EAAE,KAAK;IAC3B,mBAAmB,EAAE,MAAM;IAC3B,oBAAoB,EAAE,KAAK;CAC5B,CAAC;AAEF,8EAA8E;AAC9E,qEAAqE;AACrE,8EAA8E;AAE9E;;;;;;;;;GASG;AACH,MAAM,OAAO,kBAAmB,SAAQ,YAAY;IAC1C,MAAM,CAAC,QAAQ,GAA8B,IAAI,CAAC;IAClD,MAAM,CAAC,iBAAiB,GAA4B,EAAE,GAAG,yBAAyB,EAAE,CAAC;IAErF,MAAM,CAAqE;IAC3E,QAAQ,GAAG,KAAK,CAAC;IACjB,MAAM,GAAgB,WAAW,CAAC,IAAI,CAAC;IACvC,gBAAgB,GAAG,CAAC,CAAC;IACrB,aAAa,GAAyC,IAAI,CAAC;IAC3D,iBAAiB,GAA0C,IAAI,CAAC;IAChE,eAAe,GAAG,KAAK,CAAC;IACxB,iBAAiB,GAA6B,IAAI,CAAC;IAE3D;QACE,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,MAAM,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,UAAU,CAAkB;YAC9D,UAAU,EAAE,YAAY;YACxB,OAAO,EAAE,CAAC,cAAc,CAAC;YACzB,gBAAgB,EAAE,MAAM;YACxB,cAAc,EAAE,MAAM;YACtB,UAAU,EAAE;gBACV,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,WAAW,EAAE,YAAY,CAAC;gBAC9D,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,YAAY,CAAC;gBAC9E,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,OAAO,EAAE,YAAY,CAAC;aAC7E;YACD,gBAAgB,EAAE,KAAK;SACxB,CAAC,CAAC;QAEH,2BAA2B;QAC3B,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;YAC3B,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC;YACrB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;QACtD,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAmB,EAAE,MAAqB,EAAE,EAAE;YACpE,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;YACtB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qCAAqC,IAAI,YAAY,MAAM,GAAG,CAAC,CAAC;YAEnF,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;gBACzB,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;YACrC,CAAC;iBAAM,IAAI,IAAI,CAAC,MAAM,KAAK,WAAW,CAAC,OAAO,EAAE,CAAC;gBAC/C,oCAAoC;gBACpC,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,QAAQ,EAAE,CAAC,IAAY,EAAE,EAAE;YACxC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,iBAAiB,IAAI,EAAE,CAAC,CAAC;QAC/C,CAAC,CAAC,CAAC;IACL,CAAC;IAED,0EAA0E;IAC1E,mCAAmC;IACnC,0EAA0E;IAE1E,4CAA4C;IACrC,MAAM,CAAC,WAAW;QACvB,IAAI,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjC,kBAAkB,CAAC,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAC;QACzD,CAAC;QACD,OAAO,kBAAkB,CAAC,QAAQ,CAAC;IACrC,CAAC;IAED,kDAAkD;IAC3C,MAAM,CAAC,aAAa;QACzB,IAAI,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YAChC,kBAAkB,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YAC9C,IAAI,kBAAkB,CAAC,QAAQ,CAAC,aAAa,EAAE,CAAC;gBAC9C,YAAY,CAAC,kBAAkB,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;gBACxD,kBAAkB,CAAC,QAAQ,CAAC,aAAa,GAAG,IAAI,CAAC;YACnD,CAAC;YACD,kBAAkB,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;QACnD,CAAC;QACD,kBAAkB,CAAC,QAAQ,GAAG,IAAI,CAAC;IACrC,CAAC;IAED,oFAAoF;IAC7E,MAAM,CAAC,SAAS,CAAC,MAAwC;QAC9D,kBAAkB,CAAC,iBAAiB,GAAG;YACrC,GAAG,kBAAkB,CAAC,iBAAiB;YACvC,GAAG,MAAM;SACV,CAAC;IACJ,CAAC;IAED,0EAA0E;IAC1E,mBAAmB;IACnB,0EAA0E;IAE1E,4BAA4B;IAC5B,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED,4EAA4E;IAC5E,IAAW,OAAO;QAChB,OAAO,IAAI,CAAC,QAAQ,CAAC;IACvB,CAAC;IAEO,QAAQ,CAAC,QAAqB;QACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC;QAC7B,IAAI,QAAQ,KAAK,QAAQ;YAAE,OAAO;QAClC,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC;QACvB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sBAAsB,QAAQ,OAAO,QAAQ,EAAE,CAAC,CAAC;QACpE,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC,CAAC;IACnD,CAAC;IAED;;;OAGG;IACK,aAAa;QACnB,IAAI,IAAI,CAAC,MAAM,KAAK,WAAW,CAAC,OAAO,IAAI,IAAI,CAAC,QAAQ,EAAE,CAAC;YACzD,OAAO;QACT,CAAC;QACD,QAAQ,IAAI,CAAC,MAAM,EAAE,CAAC;YACpB,KAAK,WAAW,CAAC,IAAI;gBACnB,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;YAC/E,KAAK,WAAW,CAAC,QAAQ;gBACvB,MAAM,IAAI,KAAK,CAAC,6DAA6D,CAAC,CAAC;YACjF,KAAK,WAAW,CAAC,UAAU;gBACzB,MAAM,IAAI,KAAK,CAAC,iFAAiF,CAAC,CAAC;YACrG,KAAK,WAAW,CAAC,MAAM;gBACrB,MAAM,IAAI,KAAK,CAAC,+DAA+D,CAAC,CAAC;YACnF,KAAK,WAAW,CAAC,OAAO;gBACtB,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;YAC/E;gBACE,MAAM,IAAI,KAAK,CAAC,qCAAqC,IAAI,CAAC,MAAM,IAAI,CAAC,CAAC;QAC1E,CAAC;IACH,CAAC;IAED,0EAA0E;IAC1E,YAAY;IACZ,0EAA0E;IAE1E;;;OAGG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,MAAM,KAAK,WAAW,CAAC,OAAO,EAAE,CAAC;YACzD,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,CAAC,eAAe,GAAG,KAAK,CAAC;QAC7B,IAAI,CAAC,gBAAgB,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QAEpC,IAAI,CAAC;YACH,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YACrC,IAAI,CAAC,QAAQ,GAAG,EAAE,CAAC;YACnB,IAAI,EAAE,EAAE,CAAC;gBACP,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;gBACnC,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,CAAC,CAAC;YACrD,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;gBAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oEAAoE,CAAC,CAAC;YAC3F,CAAC;YACD,OAAO,EAAE,CAAC;QACZ,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;YAClC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yCAA0C,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;YACvF,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED,0CAA0C;IACnC,KAAK,CAAC,IAAI;QACf,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC;QAE5B,6BAA6B;QAC7B,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,YAAY,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;YACjC,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC;QAC5B,CAAC;QAED,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAE9B,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;YACnB,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;YACnC,OAAO;QACT,CAAC;QACD,IAAI,CAAC;YACH,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;YACtB,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;YACnC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,CAAC,CAAC;QACrD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAyC,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;QACxF,CAAC;IACH,CAAC;IAED,0EAA0E;IAC1E,wCAAwC;IACxC,0EAA0E;IAElE,cAAc;QACpB,MAAM,MAAM,GAAG,kBAAkB,CAAC,iBAAiB,CAAC;QACpD,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAExB,IAAI,IAAI,CAAC,gBAAgB,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;YACtD,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,MAAM,CAAC,kBAAkB,eAAe,CAAC,CAAC;YAC5G,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;YAClC,OAAO;QACT,CAAC;QAED,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,UAAU,CAAC,CAAC;QACtC,IAAI,CAAC,eAAe,EAAE,CAAC;QAEvB,MAAM,KAAK,GAAG,IAAI,CAAC,GAAG,CACpB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,CAAC,gBAAgB,GAAG,CAAC,CAAC,EACpE,MAAM,CAAC,mBAAmB,CAC3B,CAAC;QAEF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,IAAI,CAAC,gBAAgB,IAAI,MAAM,CAAC,kBAAkB,OAAO,KAAK,IAAI,CAAC,CAAC;QAEtH,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,KAAK,IAAI,EAAE;YACzC,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC;YAE1B,mEAAmE;YACnE,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;gBACzB,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;gBACnC,OAAO;YACT,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBACrC,IAAI,CAAC,QAAQ,GAAG,EAAE,CAAC;gBAEnB,IAAI,EAAE,EAAE,CAAC;oBACP,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;oBACzD,IAAI,CAAC,gBAAgB,GAAG,CAAC,CAAC;oBAC1B,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;oBACnC,IAAI,CAAC,gBAAgB,EAAE,CAAC;oBACxB,MAAM,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACnC,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mDAAmD,CAAC,CAAC;oBACxE,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,+BAAgC,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;gBAC7E,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,CAAC;QACH,CAAC,EAAE,KAAK,CAAC,CAAC;IACZ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,mBAAmB;QAC/B,IAAI,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAC3B,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4CAA4C,CAAC,CAAC;gBACjE,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,iBAAiB,EAAE,IAAI,CAAC,iBAAiB,CAAC,CAAC;gBACxF,IAAI,MAAM,EAAE,OAAO,EAAE,CAAC;oBACpB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,CAAC,CAAC;gBAClE,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oDAAoD,CAAC,CAAC;gBAC3E,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,gDAAiD,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;YAChG,CAAC;QACH,CAAC;IACH,CAAC;IAED,0EAA0E;IAC1E,eAAe;IACf,0EAA0E;IAElE,gBAAgB;QACtB,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,kBAAkB,CAAC,iBAAiB,CAAC;QAEpD,IAAI,CAAC,iBAAiB,GAAG,WAAW,CAAC,KAAK,IAAI,EAAE;YAC9C,IAAI,IAAI,CAAC,MAAM,KAAK,WAAW,CAAC,OAAO,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;gBAC1D,OAAO;YACT,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,EAAS,CAAC,CAAC;gBAC/D,MAAM,cAAc,GAAG,IAAI,OAAO,CAAQ,CAAC,CAAC,EAAE,MAAM,EAAE,EAAE,CACtD,UAAU,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC,EAAE,MAAM,CAAC,oBAAoB,CAAC,CACzF,CAAC;gBACF,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,cAAc,CAAC,CAAC,CAAC;gBAC9D,IAAI,CAAE,GAAW,EAAE,IAAI,EAAE,CAAC;oBACxB,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;gBAC5D,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAqC,GAAa,CAAC,OAAO,uCAAuC,CAAC,CAAC;gBACtH,IAAI,CAAC;oBACH,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;gBACrB,CAAC;gBAAC,MAAM,CAAC;oBACP,eAAe;gBACjB,CAAC;gBACD,iDAAiD;YACnD,CAAC;QACH,CAAC,EAAE,MAAM,CAAC,qBAAqB,CAAC,CAAC;IACnC,CAAC;IAEO,eAAe;QACrB,IAAI,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAC3B,aAAa,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;YACtC,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAChC,CAAC;IACH,CAAC;IAED,0EAA0E;IAC1E,kDAAkD;IAClD,0EAA0E;IAE1E,6BAA6B;IACtB,KAAK,CAAC,IAAI;QACf,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,EAAS,CAAC,CAAC;QAC7D,OAAO,GAAG,EAAE,IAAI,KAAK,IAAI,CAAC;IAC5B,CAAC;IAED,mDAAmD;IAC5C,KAAK,CAAC,UAAU;QACrB,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,EAAS,CAAC,CAAC;IACvD,CAAC;IAED,iCAAiC;IAC1B,KAAK,CAAC,aAAa,CAAC,KAAa;QACtC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,eAAe,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAC7D,CAAC;IAED,+DAA+D;IACxD,KAAK,CAAC,YAAY,CAAC,IAIzB;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,IAAI,CAAC,CAAC;IACvD,CAAC;IAED,sEAAsE;IAC/D,KAAK,CAAC,WAAW,CAAC,IAKxB;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;IACtD,CAAC;IAED,qCAAqC;IAC9B,KAAK,CAAC,iBAAiB,CAAC,EAAU;QACvC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9D,CAAC;IAED,qDAAqD;IAC9C,KAAK,CAAC,UAAU,CAAC,UAAkB;QACxC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,EAAE,UAAU,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,gDAAgD;IACzC,KAAK,CAAC,QAAQ,CAAC,IAMrB;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;IACnD,CAAC;IAED,8BAA8B;IACvB,KAAK,CAAC,QAAQ,CAAC,IAKrB;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;IACnD,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,WAAW,CAAC,IAMxB;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;IACtD,CAAC;IAED,0EAA0E;IAC1E,iDAAiD;IACjD,0EAA0E;IAE1E,wDAAwD;IACjD,KAAK,CAAC,iBAAiB,CAAC,IAAsB;QACnD,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;IACpD,CAAC;IAED,+DAA+D;IACxD,KAAK,CAAC,YAAY,CAAC,IAAyB;QACjD,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,IAAI,CAAC,CAAC;IACvD,CAAC;IAED,6CAA6C;IACtC,KAAK,CAAC,oBAAoB,CAAC,IAAwB;QACxD,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,sBAAsB,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IAED,0EAA0E;IACnE,KAAK,CAAC,aAAa,CAAC,OAAgB;QACzC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,eAAe,EAAE,OAAO,CAAC,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAE,EAAU,CAAC,CAAC;IACtF,CAAC;IAED,sDAAsD;IAC/C,KAAK,CAAC,iBAAiB;QAC5B,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,EAAS,CAAC,CAAC;IACjE,CAAC;IAED,0EAA0E;IAC1E,wBAAwB;IACxB,0EAA0E;IAE1E;;;;OAIG;IACI,KAAK,CAAC,eAAe,CAAC,MAAyB;QACpD,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC;QAChC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,iBAAiB,EAAE,MAAM,CAAC,CAAC;QACxE,OAAO,MAAM,EAAE,OAAO,KAAK,IAAI,CAAC;IAClC,CAAC;IAED,iCAAiC;IAC1B,KAAK,CAAC,cAAc;QACzB,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAC9B,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,gBAAgB,EAAE,EAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,yBAAyB,CAAC,IAKtC;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,uBAAuB,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,IAI3B;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;IACpD,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,yBAAyB,CAAC,IAOtC;QACC,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,uBAAuB,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IAED,kDAAkD;IAC3C,KAAK,CAAC,mBAAmB,CAAC,MAAwB;QACvD,IAAI,CAAC,aAAa,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,qBAAqB,EAAE,MAAM,CAAC,CAAC;IAC/D,CAAC;IAED,0EAA0E;IAC1E,uEAAuE;IACvE,0EAA0E;IAE1E;;;OAGG;IACI,eAAe,CAAC,OAA4C;QACjE,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,0BAA0B,EAAE,OAAO,CAAC,CAAC;IACtD,CAAC;IAED;;;OAGG;IACI,aAAa,CAAC,OAA0C;QAC7D,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,wBAAwB,EAAE,OAAO,CAAC,CAAC;IACpD,CAAC;IAED;;;OAGG;IACI,wBAAwB,CAAC,OAAqD;QACnF,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,mCAAmC,EAAE,OAAO,CAAC,CAAC;IAC/D,CAAC;IAED,6CAA6C;IACtC,gBAAgB,CAAC,OAA4C;QAClE,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,0BAA0B,EAAE,OAAO,CAAC,CAAC;IACvD,CAAC;IAED,2CAA2C;IACpC,cAAc,CAAC,OAA0C;QAC9D,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,wBAAwB,EAAE,OAAO,CAAC,CAAC;IACrD,CAAC;IAED,qDAAqD;IAC9C,yBAAyB,CAAC,OAAqD;QACpF,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,mCAAmC,EAAE,OAAO,CAAC,CAAC;IAChE,CAAC"}
|
|
@@ -0,0 +1,140 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Log level for security events
|
|
3
|
+
*/
|
|
4
|
+
export declare enum SecurityLogLevel {
|
|
5
|
+
INFO = "info",
|
|
6
|
+
WARN = "warn",
|
|
7
|
+
ERROR = "error",
|
|
8
|
+
CRITICAL = "critical"
|
|
9
|
+
}
|
|
10
|
+
/**
|
|
11
|
+
* Security event types for categorization
|
|
12
|
+
*/
|
|
13
|
+
export declare enum SecurityEventType {
|
|
14
|
+
AUTHENTICATION = "authentication",
|
|
15
|
+
ACCESS_CONTROL = "access_control",
|
|
16
|
+
EMAIL_VALIDATION = "email_validation",
|
|
17
|
+
EMAIL_PROCESSING = "email_processing",
|
|
18
|
+
EMAIL_FORWARDING = "email_forwarding",
|
|
19
|
+
EMAIL_DELIVERY = "email_delivery",
|
|
20
|
+
DKIM = "dkim",
|
|
21
|
+
SPF = "spf",
|
|
22
|
+
DMARC = "dmarc",
|
|
23
|
+
RATE_LIMIT = "rate_limit",
|
|
24
|
+
RATE_LIMITING = "rate_limiting",
|
|
25
|
+
SPAM = "spam",
|
|
26
|
+
MALWARE = "malware",
|
|
27
|
+
CONNECTION = "connection",
|
|
28
|
+
DATA_EXPOSURE = "data_exposure",
|
|
29
|
+
CONFIGURATION = "configuration",
|
|
30
|
+
IP_REPUTATION = "ip_reputation",
|
|
31
|
+
REJECTED_CONNECTION = "rejected_connection"
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Security event interface
|
|
35
|
+
*/
|
|
36
|
+
export interface ISecurityEvent {
|
|
37
|
+
timestamp: number;
|
|
38
|
+
level: SecurityLogLevel;
|
|
39
|
+
type: SecurityEventType;
|
|
40
|
+
message: string;
|
|
41
|
+
details?: any;
|
|
42
|
+
ipAddress?: string;
|
|
43
|
+
userId?: string;
|
|
44
|
+
sessionId?: string;
|
|
45
|
+
emailId?: string;
|
|
46
|
+
domain?: string;
|
|
47
|
+
action?: string;
|
|
48
|
+
result?: string;
|
|
49
|
+
success?: boolean;
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Security logger for enhanced security monitoring
|
|
53
|
+
*/
|
|
54
|
+
export declare class SecurityLogger {
|
|
55
|
+
private static instance;
|
|
56
|
+
private securityEvents;
|
|
57
|
+
private maxEventHistory;
|
|
58
|
+
private enableNotifications;
|
|
59
|
+
private constructor();
|
|
60
|
+
/**
|
|
61
|
+
* Get singleton instance
|
|
62
|
+
*/
|
|
63
|
+
static getInstance(options?: {
|
|
64
|
+
maxEventHistory?: number;
|
|
65
|
+
enableNotifications?: boolean;
|
|
66
|
+
}): SecurityLogger;
|
|
67
|
+
/**
|
|
68
|
+
* Log a security event
|
|
69
|
+
* @param event The security event to log
|
|
70
|
+
*/
|
|
71
|
+
logEvent(event: Omit<ISecurityEvent, 'timestamp'>): void;
|
|
72
|
+
/**
|
|
73
|
+
* Get recent security events
|
|
74
|
+
* @param limit Maximum number of events to return
|
|
75
|
+
* @param filter Filter for specific event types
|
|
76
|
+
* @returns Recent security events
|
|
77
|
+
*/
|
|
78
|
+
getRecentEvents(limit?: number, filter?: {
|
|
79
|
+
level?: SecurityLogLevel;
|
|
80
|
+
type?: SecurityEventType;
|
|
81
|
+
fromTimestamp?: number;
|
|
82
|
+
toTimestamp?: number;
|
|
83
|
+
}): ISecurityEvent[];
|
|
84
|
+
/**
|
|
85
|
+
* Get events by security level
|
|
86
|
+
* @param level The security level to filter by
|
|
87
|
+
* @param limit Maximum number of events to return
|
|
88
|
+
* @returns Security events matching the level
|
|
89
|
+
*/
|
|
90
|
+
getEventsByLevel(level: SecurityLogLevel, limit?: number): ISecurityEvent[];
|
|
91
|
+
/**
|
|
92
|
+
* Get events by security type
|
|
93
|
+
* @param type The event type to filter by
|
|
94
|
+
* @param limit Maximum number of events to return
|
|
95
|
+
* @returns Security events matching the type
|
|
96
|
+
*/
|
|
97
|
+
getEventsByType(type: SecurityEventType, limit?: number): ISecurityEvent[];
|
|
98
|
+
/**
|
|
99
|
+
* Get security events for a specific IP address
|
|
100
|
+
* @param ipAddress The IP address to filter by
|
|
101
|
+
* @param limit Maximum number of events to return
|
|
102
|
+
* @returns Security events for the IP address
|
|
103
|
+
*/
|
|
104
|
+
getEventsByIP(ipAddress: string, limit?: number): ISecurityEvent[];
|
|
105
|
+
/**
|
|
106
|
+
* Get security events for a specific domain
|
|
107
|
+
* @param domain The domain to filter by
|
|
108
|
+
* @param limit Maximum number of events to return
|
|
109
|
+
* @returns Security events for the domain
|
|
110
|
+
*/
|
|
111
|
+
getEventsByDomain(domain: string, limit?: number): ISecurityEvent[];
|
|
112
|
+
/**
|
|
113
|
+
* Send a notification for critical security events
|
|
114
|
+
* @param event The security event to notify about
|
|
115
|
+
* @private
|
|
116
|
+
*/
|
|
117
|
+
private sendNotification;
|
|
118
|
+
/**
|
|
119
|
+
* Clear event history
|
|
120
|
+
*/
|
|
121
|
+
clearEvents(): void;
|
|
122
|
+
/**
|
|
123
|
+
* Get statistical summary of security events
|
|
124
|
+
* @param timeWindow Optional time window in milliseconds
|
|
125
|
+
* @returns Summary of security events
|
|
126
|
+
*/
|
|
127
|
+
getEventsSummary(timeWindow?: number): {
|
|
128
|
+
total: number;
|
|
129
|
+
byLevel: Record<SecurityLogLevel, number>;
|
|
130
|
+
byType: Record<SecurityEventType, number>;
|
|
131
|
+
topIPs: Array<{
|
|
132
|
+
ip: string;
|
|
133
|
+
count: number;
|
|
134
|
+
}>;
|
|
135
|
+
topDomains: Array<{
|
|
136
|
+
domain: string;
|
|
137
|
+
count: number;
|
|
138
|
+
}>;
|
|
139
|
+
};
|
|
140
|
+
}
|