@push.rocks/smartmta 5.1.3 → 5.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/changelog.md +15 -0
  2. package/dist_ts/00_commitinfo_data.d.ts +8 -0
  3. package/dist_ts/00_commitinfo_data.js +9 -0
  4. package/dist_ts/index.d.ts +3 -0
  5. package/dist_ts/index.js +4 -0
  6. package/dist_ts/logger.d.ts +17 -0
  7. package/dist_ts/logger.js +76 -0
  8. package/dist_ts/mail/core/classes.bouncemanager.d.ts +185 -0
  9. package/dist_ts/mail/core/classes.bouncemanager.js +569 -0
  10. package/dist_ts/mail/core/classes.email.d.ts +291 -0
  11. package/dist_ts/mail/core/classes.email.js +802 -0
  12. package/dist_ts/mail/core/classes.emailvalidator.d.ts +61 -0
  13. package/dist_ts/mail/core/classes.emailvalidator.js +184 -0
  14. package/dist_ts/mail/core/classes.templatemanager.d.ts +95 -0
  15. package/dist_ts/mail/core/classes.templatemanager.js +240 -0
  16. package/dist_ts/mail/core/index.d.ts +4 -0
  17. package/dist_ts/mail/core/index.js +6 -0
  18. package/dist_ts/mail/delivery/classes.delivery.queue.d.ts +163 -0
  19. package/dist_ts/mail/delivery/classes.delivery.queue.js +488 -0
  20. package/dist_ts/mail/delivery/classes.delivery.system.d.ts +160 -0
  21. package/dist_ts/mail/delivery/classes.delivery.system.js +630 -0
  22. package/dist_ts/mail/delivery/classes.unified.rate.limiter.d.ts +200 -0
  23. package/dist_ts/mail/delivery/classes.unified.rate.limiter.js +820 -0
  24. package/dist_ts/mail/delivery/index.d.ts +4 -0
  25. package/dist_ts/mail/delivery/index.js +6 -0
  26. package/dist_ts/mail/delivery/interfaces.d.ts +140 -0
  27. package/dist_ts/mail/delivery/interfaces.js +17 -0
  28. package/dist_ts/mail/index.d.ts +7 -0
  29. package/dist_ts/mail/index.js +12 -0
  30. package/dist_ts/mail/routing/classes.dkim.manager.d.ts +25 -0
  31. package/dist_ts/mail/routing/classes.dkim.manager.js +127 -0
  32. package/dist_ts/mail/routing/classes.dns.manager.d.ts +79 -0
  33. package/dist_ts/mail/routing/classes.dns.manager.js +415 -0
  34. package/dist_ts/mail/routing/classes.domain.registry.d.ts +54 -0
  35. package/dist_ts/mail/routing/classes.domain.registry.js +119 -0
  36. package/dist_ts/mail/routing/classes.email.action.executor.d.ts +33 -0
  37. package/dist_ts/mail/routing/classes.email.action.executor.js +137 -0
  38. package/dist_ts/mail/routing/classes.email.router.d.ts +171 -0
  39. package/dist_ts/mail/routing/classes.email.router.js +494 -0
  40. package/dist_ts/mail/routing/classes.unified.email.server.d.ts +241 -0
  41. package/dist_ts/mail/routing/classes.unified.email.server.js +935 -0
  42. package/dist_ts/mail/routing/index.d.ts +7 -0
  43. package/dist_ts/mail/routing/index.js +9 -0
  44. package/dist_ts/mail/routing/interfaces.d.ts +187 -0
  45. package/dist_ts/mail/routing/interfaces.js +2 -0
  46. package/dist_ts/mail/security/classes.dkimcreator.d.ts +72 -0
  47. package/dist_ts/mail/security/classes.dkimcreator.js +360 -0
  48. package/dist_ts/mail/security/classes.spfverifier.d.ts +62 -0
  49. package/dist_ts/mail/security/classes.spfverifier.js +87 -0
  50. package/dist_ts/mail/security/index.d.ts +2 -0
  51. package/dist_ts/mail/security/index.js +4 -0
  52. package/dist_ts/paths.d.ts +14 -0
  53. package/dist_ts/paths.js +39 -0
  54. package/dist_ts/plugins.d.ts +24 -0
  55. package/dist_ts/plugins.js +28 -0
  56. package/dist_ts/security/classes.contentscanner.d.ts +130 -0
  57. package/dist_ts/security/classes.contentscanner.js +338 -0
  58. package/dist_ts/security/classes.ipreputationchecker.d.ts +73 -0
  59. package/dist_ts/security/classes.ipreputationchecker.js +263 -0
  60. package/dist_ts/security/classes.rustsecuritybridge.d.ts +403 -0
  61. package/dist_ts/security/classes.rustsecuritybridge.js +502 -0
  62. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  63. package/dist_ts/security/classes.securitylogger.js +235 -0
  64. package/dist_ts/security/index.d.ts +4 -0
  65. package/dist_ts/security/index.js +5 -0
  66. package/package.json +6 -1
  67. package/ts/00_commitinfo_data.ts +8 -0
  68. package/ts/index.ts +3 -0
  69. package/ts/logger.ts +91 -0
  70. package/ts/mail/core/classes.bouncemanager.ts +731 -0
  71. package/ts/mail/core/classes.email.ts +942 -0
  72. package/ts/mail/core/classes.emailvalidator.ts +239 -0
  73. package/ts/mail/core/classes.templatemanager.ts +320 -0
  74. package/ts/mail/core/index.ts +5 -0
  75. package/ts/mail/delivery/classes.delivery.queue.ts +645 -0
  76. package/ts/mail/delivery/classes.delivery.system.ts +816 -0
  77. package/ts/mail/delivery/classes.unified.rate.limiter.ts +1053 -0
  78. package/ts/mail/delivery/index.ts +5 -0
  79. package/ts/mail/delivery/interfaces.ts +167 -0
  80. package/ts/mail/index.ts +17 -0
  81. package/ts/mail/routing/classes.dkim.manager.ts +157 -0
  82. package/ts/mail/routing/classes.dns.manager.ts +573 -0
  83. package/ts/mail/routing/classes.domain.registry.ts +139 -0
  84. package/ts/mail/routing/classes.email.action.executor.ts +175 -0
  85. package/ts/mail/routing/classes.email.router.ts +575 -0
  86. package/ts/mail/routing/classes.unified.email.server.ts +1207 -0
  87. package/ts/mail/routing/index.ts +9 -0
  88. package/ts/mail/routing/interfaces.ts +202 -0
  89. package/ts/mail/security/classes.dkimcreator.ts +447 -0
  90. package/ts/mail/security/classes.spfverifier.ts +126 -0
  91. package/ts/mail/security/index.ts +3 -0
  92. package/ts/paths.ts +48 -0
  93. package/ts/plugins.ts +53 -0
  94. package/ts/security/classes.contentscanner.ts +400 -0
  95. package/ts/security/classes.ipreputationchecker.ts +315 -0
  96. package/ts/security/classes.rustsecuritybridge.ts +964 -0
  97. package/ts/security/classes.securitylogger.ts +299 -0
  98. package/ts/security/index.ts +40 -0
@@ -0,0 +1,415 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { logger } from '../../logger.js';
3
+ /**
4
+ * Manages DNS configuration for email domains
5
+ * Handles both validation and creation of DNS records
6
+ */
7
+ export class DnsManager {
8
+ dcRouter;
9
+ storageManager;
10
+ constructor(dcRouter) {
11
+ this.dcRouter = dcRouter;
12
+ this.storageManager = dcRouter.storageManager;
13
+ }
14
+ /**
15
+ * Validate all domain configurations
16
+ */
17
+ async validateAllDomains(domainConfigs) {
18
+ const results = new Map();
19
+ for (const config of domainConfigs) {
20
+ const result = await this.validateDomain(config);
21
+ results.set(config.domain, result);
22
+ }
23
+ return results;
24
+ }
25
+ /**
26
+ * Validate a single domain configuration
27
+ */
28
+ async validateDomain(config) {
29
+ switch (config.dnsMode) {
30
+ case 'forward':
31
+ return this.validateForwardMode(config);
32
+ case 'internal-dns':
33
+ return this.validateInternalDnsMode(config);
34
+ case 'external-dns':
35
+ return this.validateExternalDnsMode(config);
36
+ default:
37
+ return {
38
+ valid: false,
39
+ errors: [`Unknown DNS mode: ${config.dnsMode}`],
40
+ warnings: [],
41
+ requiredChanges: []
42
+ };
43
+ }
44
+ }
45
+ /**
46
+ * Validate forward mode configuration
47
+ */
48
+ async validateForwardMode(config) {
49
+ const result = {
50
+ valid: true,
51
+ errors: [],
52
+ warnings: [],
53
+ requiredChanges: []
54
+ };
55
+ // Forward mode doesn't require DNS validation by default
56
+ if (!config.dns?.forward?.skipDnsValidation) {
57
+ logger.log('info', `DNS validation skipped for forward mode domain: ${config.domain}`);
58
+ }
59
+ // DKIM keys are still generated for consistency
60
+ result.warnings.push(`Domain "${config.domain}" uses forward mode. DKIM keys will be generated but signing only happens if email is processed.`);
61
+ return result;
62
+ }
63
+ /**
64
+ * Validate internal DNS mode configuration
65
+ */
66
+ async validateInternalDnsMode(config) {
67
+ const result = {
68
+ valid: true,
69
+ errors: [],
70
+ warnings: [],
71
+ requiredChanges: []
72
+ };
73
+ // Check if DNS configuration is set up
74
+ const dnsNsDomains = this.dcRouter.options?.dnsNsDomains;
75
+ const dnsScopes = this.dcRouter.options?.dnsScopes;
76
+ if (!dnsNsDomains || dnsNsDomains.length === 0) {
77
+ result.valid = false;
78
+ result.errors.push(`Domain "${config.domain}" is configured to use internal DNS, but dnsNsDomains is not set in DcRouter configuration.`);
79
+ console.error(`❌ ERROR: Domain "${config.domain}" is configured to use internal DNS,\n` +
80
+ ' but dnsNsDomains is not set in DcRouter configuration.\n' +
81
+ ' Please configure dnsNsDomains to enable the DNS server.\n' +
82
+ ' Example: dnsNsDomains: ["ns1.myservice.com", "ns2.myservice.com"]');
83
+ return result;
84
+ }
85
+ if (!dnsScopes || dnsScopes.length === 0) {
86
+ result.valid = false;
87
+ result.errors.push(`Domain "${config.domain}" is configured to use internal DNS, but dnsScopes is not set in DcRouter configuration.`);
88
+ console.error(`❌ ERROR: Domain "${config.domain}" is configured to use internal DNS,\n` +
89
+ ' but dnsScopes is not set in DcRouter configuration.\n' +
90
+ ' Please configure dnsScopes to define authoritative domains.\n' +
91
+ ' Example: dnsScopes: ["myservice.com", "mail.myservice.com"]');
92
+ return result;
93
+ }
94
+ // Check if the email domain is in dnsScopes
95
+ if (!dnsScopes.includes(config.domain)) {
96
+ result.valid = false;
97
+ result.errors.push(`Domain "${config.domain}" is configured to use internal DNS, but is not included in dnsScopes.`);
98
+ console.error(`❌ ERROR: Domain "${config.domain}" is configured to use internal DNS,\n` +
99
+ ` but is not included in dnsScopes: [${dnsScopes.join(', ')}].\n` +
100
+ ' Please add this domain to dnsScopes to enable internal DNS.\n' +
101
+ ` Example: dnsScopes: [..., "${config.domain}"]`);
102
+ return result;
103
+ }
104
+ const primaryNameserver = dnsNsDomains[0];
105
+ // Check NS delegation
106
+ try {
107
+ const nsRecords = await this.resolveNs(config.domain);
108
+ const delegatedNameservers = dnsNsDomains.filter(ns => nsRecords.includes(ns));
109
+ const isDelegated = delegatedNameservers.length > 0;
110
+ if (!isDelegated) {
111
+ result.warnings.push(`NS delegation not found for ${config.domain}. Please add NS records at your registrar.`);
112
+ dnsNsDomains.forEach(ns => {
113
+ result.requiredChanges.push(`Add NS record: ${config.domain}. NS ${ns}.`);
114
+ });
115
+ console.log(`📋 DNS Delegation Required for ${config.domain}:\n` +
116
+ '━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\n' +
117
+ 'Please add these NS records at your domain registrar:\n' +
118
+ dnsNsDomains.map(ns => ` ${config.domain}. NS ${ns}.`).join('\n') + '\n' +
119
+ '━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\n' +
120
+ 'This delegation is required for internal DNS mode to work.');
121
+ }
122
+ else {
123
+ console.log(`✅ NS delegation verified: ${config.domain} -> [${delegatedNameservers.join(', ')}]`);
124
+ }
125
+ }
126
+ catch (error) {
127
+ result.warnings.push(`Could not verify NS delegation for ${config.domain}: ${error.message}`);
128
+ }
129
+ return result;
130
+ }
131
+ /**
132
+ * Validate external DNS mode configuration
133
+ */
134
+ async validateExternalDnsMode(config) {
135
+ const result = {
136
+ valid: true,
137
+ errors: [],
138
+ warnings: [],
139
+ requiredChanges: []
140
+ };
141
+ try {
142
+ // Get current DNS records
143
+ const records = await this.checkDnsRecords(config);
144
+ const requiredRecords = config.dns?.external?.requiredRecords || ['MX', 'SPF', 'DKIM', 'DMARC'];
145
+ // Check MX record
146
+ if (requiredRecords.includes('MX') && !records.mx?.length) {
147
+ result.requiredChanges.push(`Add MX record: ${this.getBaseDomain(config.domain)} -> ${config.domain} (priority 10)`);
148
+ }
149
+ // Check SPF record
150
+ if (requiredRecords.includes('SPF') && !records.spf) {
151
+ result.requiredChanges.push(`Add TXT record: ${this.getBaseDomain(config.domain)} -> "v=spf1 a mx ~all"`);
152
+ }
153
+ // Check DKIM record
154
+ if (requiredRecords.includes('DKIM') && !records.dkim) {
155
+ const selector = config.dkim?.selector || 'default';
156
+ const dkimPublicKey = await this.storageManager.get(`/email/dkim/${config.domain}/public.key`);
157
+ if (dkimPublicKey) {
158
+ const publicKeyBase64 = dkimPublicKey
159
+ .replace(/-----BEGIN PUBLIC KEY-----/g, '')
160
+ .replace(/-----END PUBLIC KEY-----/g, '')
161
+ .replace(/\s/g, '');
162
+ result.requiredChanges.push(`Add TXT record: ${selector}._domainkey.${config.domain} -> "v=DKIM1; k=rsa; p=${publicKeyBase64}"`);
163
+ }
164
+ else {
165
+ result.warnings.push(`DKIM public key not found for ${config.domain}. It will be generated on first use.`);
166
+ }
167
+ }
168
+ // Check DMARC record
169
+ if (requiredRecords.includes('DMARC') && !records.dmarc) {
170
+ result.requiredChanges.push(`Add TXT record: _dmarc.${this.getBaseDomain(config.domain)} -> "v=DMARC1; p=none; rua=mailto:dmarc@${config.domain}"`);
171
+ }
172
+ // Show setup instructions if needed
173
+ if (result.requiredChanges.length > 0) {
174
+ console.log(`📋 DNS Configuration Required for ${config.domain}:\n` +
175
+ '━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\n' +
176
+ result.requiredChanges.map((change, i) => `${i + 1}. ${change}`).join('\n') +
177
+ '\n━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━');
178
+ }
179
+ }
180
+ catch (error) {
181
+ result.errors.push(`DNS validation failed: ${error.message}`);
182
+ result.valid = false;
183
+ }
184
+ return result;
185
+ }
186
+ /**
187
+ * Check DNS records for a domain
188
+ */
189
+ async checkDnsRecords(config) {
190
+ const records = {};
191
+ const baseDomain = this.getBaseDomain(config.domain);
192
+ const selector = config.dkim?.selector || 'default';
193
+ // Use custom DNS servers if specified
194
+ const resolver = new plugins.dns.promises.Resolver();
195
+ if (config.dns?.external?.servers?.length) {
196
+ resolver.setServers(config.dns.external.servers);
197
+ }
198
+ // Check MX records
199
+ try {
200
+ const mxRecords = await resolver.resolveMx(baseDomain);
201
+ records.mx = mxRecords.map(mx => mx.exchange);
202
+ }
203
+ catch (error) {
204
+ logger.log('debug', `No MX records found for ${baseDomain}`);
205
+ }
206
+ // Check SPF record
207
+ try {
208
+ const txtRecords = await resolver.resolveTxt(baseDomain);
209
+ const spfRecord = txtRecords.find(records => records.some(record => record.startsWith('v=spf1')));
210
+ if (spfRecord) {
211
+ records.spf = spfRecord.join('');
212
+ }
213
+ }
214
+ catch (error) {
215
+ logger.log('debug', `No SPF record found for ${baseDomain}`);
216
+ }
217
+ // Check DKIM record
218
+ try {
219
+ const dkimRecords = await resolver.resolveTxt(`${selector}._domainkey.${config.domain}`);
220
+ const dkimRecord = dkimRecords.find(records => records.some(record => record.includes('v=DKIM1')));
221
+ if (dkimRecord) {
222
+ records.dkim = dkimRecord.join('');
223
+ }
224
+ }
225
+ catch (error) {
226
+ logger.log('debug', `No DKIM record found for ${selector}._domainkey.${config.domain}`);
227
+ }
228
+ // Check DMARC record
229
+ try {
230
+ const dmarcRecords = await resolver.resolveTxt(`_dmarc.${baseDomain}`);
231
+ const dmarcRecord = dmarcRecords.find(records => records.some(record => record.startsWith('v=DMARC1')));
232
+ if (dmarcRecord) {
233
+ records.dmarc = dmarcRecord.join('');
234
+ }
235
+ }
236
+ catch (error) {
237
+ logger.log('debug', `No DMARC record found for _dmarc.${baseDomain}`);
238
+ }
239
+ return records;
240
+ }
241
+ /**
242
+ * Resolve NS records for a domain
243
+ */
244
+ async resolveNs(domain) {
245
+ try {
246
+ const resolver = new plugins.dns.promises.Resolver();
247
+ const nsRecords = await resolver.resolveNs(domain);
248
+ return nsRecords;
249
+ }
250
+ catch (error) {
251
+ logger.log('warn', `Failed to resolve NS records for ${domain}: ${error.message}`);
252
+ return [];
253
+ }
254
+ }
255
+ /**
256
+ * Get base domain from email domain (e.g., mail.example.com -> example.com)
257
+ */
258
+ getBaseDomain(domain) {
259
+ const parts = domain.split('.');
260
+ if (parts.length <= 2) {
261
+ return domain;
262
+ }
263
+ // For subdomains like mail.example.com, return example.com
264
+ // But preserve domain structure for longer TLDs like .co.uk
265
+ if (parts[parts.length - 2].length <= 3 && parts[parts.length - 1].length === 2) {
266
+ // Likely a country code TLD like .co.uk
267
+ return parts.slice(-3).join('.');
268
+ }
269
+ return parts.slice(-2).join('.');
270
+ }
271
+ /**
272
+ * Ensure all DNS records are created for configured domains
273
+ * This is the main entry point for DNS record management
274
+ */
275
+ async ensureDnsRecords(domainConfigs, dkimCreator) {
276
+ logger.log('info', `Ensuring DNS records for ${domainConfigs.length} domains`);
277
+ // First, validate all domains
278
+ const validationResults = await this.validateAllDomains(domainConfigs);
279
+ // Then create records for internal-dns domains
280
+ const internalDnsDomains = domainConfigs.filter(config => config.dnsMode === 'internal-dns');
281
+ if (internalDnsDomains.length > 0) {
282
+ await this.createInternalDnsRecords(internalDnsDomains);
283
+ // Create DKIM records if DKIMCreator is provided
284
+ if (dkimCreator) {
285
+ await this.createDkimRecords(domainConfigs, dkimCreator);
286
+ }
287
+ }
288
+ // Log validation results for external-dns domains
289
+ for (const [domain, result] of validationResults) {
290
+ const config = domainConfigs.find(c => c.domain === domain);
291
+ if (config?.dnsMode === 'external-dns' && result.requiredChanges.length > 0) {
292
+ logger.log('warn', `External DNS configuration required for ${domain}`);
293
+ }
294
+ }
295
+ }
296
+ /**
297
+ * Create DNS records for internal-dns mode domains
298
+ */
299
+ async createInternalDnsRecords(domainConfigs) {
300
+ // Check if DNS server is available
301
+ if (!this.dcRouter.dnsServer) {
302
+ logger.log('warn', 'DNS server not available, skipping internal DNS record creation');
303
+ return;
304
+ }
305
+ logger.log('info', `Creating DNS records for ${domainConfigs.length} internal-dns domains`);
306
+ for (const domainConfig of domainConfigs) {
307
+ const domain = domainConfig.domain;
308
+ const ttl = domainConfig.dns?.internal?.ttl || 3600;
309
+ const mxPriority = domainConfig.dns?.internal?.mxPriority || 10;
310
+ try {
311
+ // 1. Register MX record - points to the email domain itself
312
+ this.dcRouter.dnsServer.registerHandler(domain, ['MX'], () => ({
313
+ name: domain,
314
+ type: 'MX',
315
+ class: 'IN',
316
+ ttl: ttl,
317
+ data: {
318
+ priority: mxPriority,
319
+ exchange: domain
320
+ }
321
+ }));
322
+ logger.log('info', `MX record registered for ${domain} -> ${domain} (priority ${mxPriority})`);
323
+ // Store MX record in StorageManager
324
+ await this.storageManager.set(`/email/dns/${domain}/mx`, JSON.stringify({
325
+ type: 'MX',
326
+ priority: mxPriority,
327
+ exchange: domain,
328
+ ttl: ttl
329
+ }));
330
+ // 2. Register SPF record - allows the domain to send emails
331
+ const spfRecord = `v=spf1 a mx ~all`;
332
+ this.dcRouter.dnsServer.registerHandler(domain, ['TXT'], () => ({
333
+ name: domain,
334
+ type: 'TXT',
335
+ class: 'IN',
336
+ ttl: ttl,
337
+ data: spfRecord
338
+ }));
339
+ logger.log('info', `SPF record registered for ${domain}: "${spfRecord}"`);
340
+ // Store SPF record in StorageManager
341
+ await this.storageManager.set(`/email/dns/${domain}/spf`, JSON.stringify({
342
+ type: 'TXT',
343
+ data: spfRecord,
344
+ ttl: ttl
345
+ }));
346
+ // 3. Register DMARC record - policy for handling email authentication
347
+ const dmarcRecord = `v=DMARC1; p=none; rua=mailto:dmarc@${domain}`;
348
+ this.dcRouter.dnsServer.registerHandler(`_dmarc.${domain}`, ['TXT'], () => ({
349
+ name: `_dmarc.${domain}`,
350
+ type: 'TXT',
351
+ class: 'IN',
352
+ ttl: ttl,
353
+ data: dmarcRecord
354
+ }));
355
+ logger.log('info', `DMARC record registered for _dmarc.${domain}: "${dmarcRecord}"`);
356
+ // Store DMARC record in StorageManager
357
+ await this.storageManager.set(`/email/dns/${domain}/dmarc`, JSON.stringify({
358
+ type: 'TXT',
359
+ name: `_dmarc.${domain}`,
360
+ data: dmarcRecord,
361
+ ttl: ttl
362
+ }));
363
+ // Log summary of DNS records created
364
+ logger.log('info', `✅ DNS records created for ${domain}:
365
+ - MX: ${domain} (priority ${mxPriority})
366
+ - SPF: ${spfRecord}
367
+ - DMARC: ${dmarcRecord}
368
+ - DKIM: Will be created when keys are generated`);
369
+ }
370
+ catch (error) {
371
+ logger.log('error', `Failed to create DNS records for ${domain}: ${error.message}`);
372
+ }
373
+ }
374
+ }
375
+ /**
376
+ * Create DKIM DNS records for all domains
377
+ */
378
+ async createDkimRecords(domainConfigs, dkimCreator) {
379
+ for (const domainConfig of domainConfigs) {
380
+ const domain = domainConfig.domain;
381
+ const selector = domainConfig.dkim?.selector || 'default';
382
+ try {
383
+ // Get DKIM DNS record from DKIMCreator
384
+ const dnsRecord = await dkimCreator.getDNSRecordForDomain(domain);
385
+ // For internal-dns domains, register the DNS handler
386
+ if (domainConfig.dnsMode === 'internal-dns' && this.dcRouter.dnsServer) {
387
+ const ttl = domainConfig.dns?.internal?.ttl || 3600;
388
+ this.dcRouter.dnsServer.registerHandler(`${selector}._domainkey.${domain}`, ['TXT'], () => ({
389
+ name: `${selector}._domainkey.${domain}`,
390
+ type: 'TXT',
391
+ class: 'IN',
392
+ ttl: ttl,
393
+ data: dnsRecord.value
394
+ }));
395
+ logger.log('info', `DKIM DNS record registered for ${selector}._domainkey.${domain}`);
396
+ // Store DKIM record in StorageManager
397
+ await this.storageManager.set(`/email/dns/${domain}/dkim`, JSON.stringify({
398
+ type: 'TXT',
399
+ name: `${selector}._domainkey.${domain}`,
400
+ data: dnsRecord.value,
401
+ ttl: ttl
402
+ }));
403
+ }
404
+ // For external-dns domains, just log what should be configured
405
+ if (domainConfig.dnsMode === 'external-dns') {
406
+ logger.log('info', `DKIM record for external DNS: ${dnsRecord.name} -> "${dnsRecord.value}"`);
407
+ }
408
+ }
409
+ catch (error) {
410
+ logger.log('warn', `Could not create DKIM DNS record for ${domain}: ${error.message}`);
411
+ }
412
+ }
413
+ }
414
+ }
415
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.dns.manager.js","sourceRoot":"","sources":["../../../ts/mail/routing/classes.dns.manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AAmCzC;;;GAGG;AACH,MAAM,OAAO,UAAU;IACb,QAAQ,CAAgB;IACxB,cAAc,CAAsB;IAE5C,YAAY,QAAuB;QACjC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QACzB,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,cAAc,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,kBAAkB,CAAC,aAAmC;QAC1D,MAAM,OAAO,GAAG,IAAI,GAAG,EAAgC,CAAC;QAExD,KAAK,MAAM,MAAM,IAAI,aAAa,EAAE,CAAC;YACnC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;YACjD,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QACrC,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,cAAc,CAAC,MAA0B;QAC7C,QAAQ,MAAM,CAAC,OAAO,EAAE,CAAC;YACvB,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;YAC1C,KAAK,cAAc;gBACjB,OAAO,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;YAC9C,KAAK,cAAc;gBACjB,OAAO,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;YAC9C;gBACE,OAAO;oBACL,KAAK,EAAE,KAAK;oBACZ,MAAM,EAAE,CAAC,qBAAqB,MAAM,CAAC,OAAO,EAAE,CAAC;oBAC/C,QAAQ,EAAE,EAAE;oBACZ,eAAe,EAAE,EAAE;iBACpB,CAAC;QACN,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,mBAAmB,CAAC,MAA0B;QAC1D,MAAM,MAAM,GAAyB;YACnC,KAAK,EAAE,IAAI;YACX,MAAM,EAAE,EAAE;YACV,QAAQ,EAAE,EAAE;YACZ,eAAe,EAAE,EAAE;SACpB,CAAC;QAEF,yDAAyD;QACzD,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,OAAO,EAAE,iBAAiB,EAAE,CAAC;YAC5C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mDAAmD,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;QACzF,CAAC;QAED,gDAAgD;QAChD,MAAM,CAAC,QAAQ,CAAC,IAAI,CAClB,WAAW,MAAM,CAAC,MAAM,kGAAkG,CAC3H,CAAC;QAEF,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,uBAAuB,CAAC,MAA0B;QAC9D,MAAM,MAAM,GAAyB;YACnC,KAAK,EAAE,IAAI;YACX,MAAM,EAAE,EAAE;YACV,QAAQ,EAAE,EAAE;YACZ,eAAe,EAAE,EAAE;SACpB,CAAC;QAEF,uCAAuC;QACvC,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,YAAY,CAAC;QACzD,MAAM,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,SAAS,CAAC;QAEnD,IAAI,CAAC,YAAY,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC/C,MAAM,CAAC,KAAK,GAAG,KAAK,CAAC;YACrB,MAAM,CAAC,MAAM,CAAC,IAAI,CAChB,WAAW,MAAM,CAAC,MAAM,6FAA6F,CACtH,CAAC;YACF,OAAO,CAAC,KAAK,CACX,oBAAoB,MAAM,CAAC,MAAM,wCAAwC;gBACzE,6DAA6D;gBAC7D,8DAA8D;gBAC9D,sEAAsE,CACvE,CAAC;YACF,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,IAAI,CAAC,SAAS,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACzC,MAAM,CAAC,KAAK,GAAG,KAAK,CAAC;YACrB,MAAM,CAAC,MAAM,CAAC,IAAI,CAChB,WAAW,MAAM,CAAC,MAAM,0FAA0F,CACnH,CAAC;YACF,OAAO,CAAC,KAAK,CACX,oBAAoB,MAAM,CAAC,MAAM,wCAAwC;gBACzE,0DAA0D;gBAC1D,kEAAkE;gBAClE,gEAAgE,CACjE,CAAC;YACF,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,4CAA4C;QAC5C,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;YACvC,MAAM,CAAC,KAAK,GAAG,KAAK,CAAC;YACrB,MAAM,CAAC,MAAM,CAAC,IAAI,CAChB,WAAW,MAAM,CAAC,MAAM,wEAAwE,CACjG,CAAC;YACF,OAAO,CAAC,KAAK,CACX,oBAAoB,MAAM,CAAC,MAAM,wCAAwC;gBACzE,yCAAyC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM;gBACnE,kEAAkE;gBAClE,iCAAiC,MAAM,CAAC,MAAM,IAAI,CACnD,CAAC;YACF,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;QAE1C,sBAAsB;QACtB,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,oBAAoB,GAAG,YAAY,CAAC,MAAM,CAAC,EAAE,CAAC,EAAE,CAAC,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC;YAC/E,MAAM,WAAW,GAAG,oBAAoB,CAAC,MAAM,GAAG,CAAC,CAAC;YAEpD,IAAI,CAAC,WAAW,EAAE,CAAC;gBACjB,MAAM,CAAC,QAAQ,CAAC,IAAI,CAClB,+BAA+B,MAAM,CAAC,MAAM,4CAA4C,CACzF,CAAC;gBACF,YAAY,CAAC,OAAO,CAAC,EAAE,CAAC,EAAE;oBACxB,MAAM,CAAC,eAAe,CAAC,IAAI,CACzB,kBAAkB,MAAM,CAAC,MAAM,QAAQ,EAAE,GAAG,CAC7C,CAAC;gBACJ,CAAC,CAAC,CAAC;gBAEH,OAAO,CAAC,GAAG,CACT,kCAAkC,MAAM,CAAC,MAAM,KAAK;oBACpD,kDAAkD;oBAClD,yDAAyD;oBACzD,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC,KAAK,MAAM,CAAC,MAAM,QAAQ,EAAE,GAAG,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI;oBACzE,kDAAkD;oBAClD,4DAA4D,CAC7D,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,6BAA6B,MAAM,CAAC,MAAM,QAAQ,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CACrF,CAAC;YACJ,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,QAAQ,CAAC,IAAI,CAClB,sCAAsC,MAAM,CAAC,MAAM,KAAK,KAAK,CAAC,OAAO,EAAE,CACxE,CAAC;QACJ,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,uBAAuB,CAAC,MAA0B;QAC9D,MAAM,MAAM,GAAyB;YACnC,KAAK,EAAE,IAAI;YACX,MAAM,EAAE,EAAE;YACV,QAAQ,EAAE,EAAE;YACZ,eAAe,EAAE,EAAE;SACpB,CAAC;QAEF,IAAI,CAAC;YACH,0BAA0B;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;YACnD,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,EAAE,QAAQ,EAAE,eAAe,IAAI,CAAC,IAAI,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,CAAC;YAEhG,kBAAkB;YAClB,IAAI,eAAe,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,EAAE,MAAM,EAAE,CAAC;gBAC1D,MAAM,CAAC,eAAe,CAAC,IAAI,CACzB,kBAAkB,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,OAAO,MAAM,CAAC,MAAM,gBAAgB,CACxF,CAAC;YACJ,CAAC;YAED,mBAAmB;YACnB,IAAI,eAAe,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC;gBACpD,MAAM,CAAC,eAAe,CAAC,IAAI,CACzB,mBAAmB,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,wBAAwB,CAC7E,CAAC;YACJ,CAAC;YAED,oBAAoB;YACpB,IAAI,eAAe,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;gBACtD,MAAM,QAAQ,GAAG,MAAM,CAAC,IAAI,EAAE,QAAQ,IAAI,SAAS,CAAC;gBACpD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,eAAe,MAAM,CAAC,MAAM,aAAa,CAAC,CAAC;gBAE/F,IAAI,aAAa,EAAE,CAAC;oBAClB,MAAM,eAAe,GAAG,aAAa;yBAClC,OAAO,CAAC,6BAA6B,EAAE,EAAE,CAAC;yBAC1C,OAAO,CAAC,2BAA2B,EAAE,EAAE,CAAC;yBACxC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;oBAEtB,MAAM,CAAC,eAAe,CAAC,IAAI,CACzB,mBAAmB,QAAQ,eAAe,MAAM,CAAC,MAAM,0BAA0B,eAAe,GAAG,CACpG,CAAC;gBACJ,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,QAAQ,CAAC,IAAI,CAClB,iCAAiC,MAAM,CAAC,MAAM,sCAAsC,CACrF,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,qBAAqB;YACrB,IAAI,eAAe,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC;gBACxD,MAAM,CAAC,eAAe,CAAC,IAAI,CACzB,0BAA0B,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,2CAA2C,MAAM,CAAC,MAAM,GAAG,CACvH,CAAC;YACJ,CAAC;YAED,oCAAoC;YACpC,IAAI,MAAM,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtC,OAAO,CAAC,GAAG,CACT,qCAAqC,MAAM,CAAC,MAAM,KAAK;oBACvD,kDAAkD;oBAClD,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC,GAAG,CAAC,GAAG,CAAC,KAAK,MAAM,EAAE,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC;oBAC3E,kDAAkD,CACnD,CAAC;YACJ,CAAC;QAEH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,0BAA0B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC9D,MAAM,CAAC,KAAK,GAAG,KAAK,CAAC;QACvB,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe,CAAC,MAA0B;QACtD,MAAM,OAAO,GAAgB,EAAE,CAAC;QAChC,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QACrD,MAAM,QAAQ,GAAG,MAAM,CAAC,IAAI,EAAE,QAAQ,IAAI,SAAS,CAAC;QAEpD,sCAAsC;QACtC,MAAM,QAAQ,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;QACrD,IAAI,MAAM,CAAC,GAAG,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC;YAC1C,QAAQ,CAAC,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC;QAED,mBAAmB;QACnB,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,MAAM,QAAQ,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC;YACvD,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,QAAQ,CAAC,CAAC;QAChD,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,UAAU,EAAE,CAAC,CAAC;QAC/D,CAAC;QAED,mBAAmB;QACnB,IAAI,CAAC;YACH,MAAM,UAAU,GAAG,MAAM,QAAQ,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC;YACzD,MAAM,SAAS,GAAG,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAC1C,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,CACpD,CAAC;YACF,IAAI,SAAS,EAAE,CAAC;gBACd,OAAO,CAAC,GAAG,GAAG,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACnC,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,UAAU,EAAE,CAAC,CAAC;QAC/D,CAAC;QAED,oBAAoB;QACpB,IAAI,CAAC;YACH,MAAM,WAAW,GAAG,MAAM,QAAQ,CAAC,UAAU,CAAC,GAAG,QAAQ,eAAe,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;YACzF,MAAM,UAAU,GAAG,WAAW,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAC5C,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CACnD,CAAC;YACF,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,GAAG,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACrC,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,4BAA4B,QAAQ,eAAe,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1F,CAAC;QAED,qBAAqB;QACrB,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,UAAU,CAAC,UAAU,UAAU,EAAE,CAAC,CAAC;YACvE,MAAM,WAAW,GAAG,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAC9C,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,CACtD,CAAC;YACF,IAAI,WAAW,EAAE,CAAC;gBAChB,OAAO,CAAC,KAAK,GAAG,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACvC,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,UAAU,EAAE,CAAC,CAAC;QACxE,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,SAAS,CAAC,MAAc;QACpC,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACrD,MAAM,SAAS,GAAG,MAAM,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;YACnD,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,KAAK,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACnF,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;OAEG;IACK,aAAa,CAAC,MAAc;QAClC,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAChC,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;YACtB,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,2DAA2D;QAC3D,4DAA4D;QAC5D,IAAI,KAAK,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,MAAM,IAAI,CAAC,IAAI,KAAK,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAChF,wCAAwC;YACxC,OAAO,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACnC,CAAC;QAED,OAAO,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACnC,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,gBAAgB,CAAC,aAAmC,EAAE,WAAiB;QAC3E,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,aAAa,CAAC,MAAM,UAAU,CAAC,CAAC;QAE/E,8BAA8B;QAC9B,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,aAAa,CAAC,CAAC;QAEvE,+CAA+C;QAC/C,MAAM,kBAAkB,GAAG,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,OAAO,KAAK,cAAc,CAAC,CAAC;QAC7F,IAAI,kBAAkB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAClC,MAAM,IAAI,CAAC,wBAAwB,CAAC,kBAAkB,CAAC,CAAC;YAExD,iDAAiD;YACjD,IAAI,WAAW,EAAE,CAAC;gBAChB,MAAM,IAAI,CAAC,iBAAiB,CAAC,aAAa,EAAE,WAAW,CAAC,CAAC;YAC3D,CAAC;QACH,CAAC;QAED,kDAAkD;QAClD,KAAK,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,IAAI,iBAAiB,EAAE,CAAC;YACjD,MAAM,MAAM,GAAG,aAAa,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;YAC5D,IAAI,MAAM,EAAE,OAAO,KAAK,cAAc,IAAI,MAAM,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC5E,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,MAAM,EAAE,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB,CAAC,aAAmC;QACxE,mCAAmC;QACnC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC7B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iEAAiE,CAAC,CAAC;YACtF,OAAO;QACT,CAAC;QAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,aAAa,CAAC,MAAM,uBAAuB,CAAC,CAAC;QAE5F,KAAK,MAAM,YAAY,IAAI,aAAa,EAAE,CAAC;YACzC,MAAM,MAAM,GAAG,YAAY,CAAC,MAAM,CAAC;YACnC,MAAM,GAAG,GAAG,YAAY,CAAC,GAAG,EAAE,QAAQ,EAAE,GAAG,IAAI,IAAI,CAAC;YACpD,MAAM,UAAU,GAAG,YAAY,CAAC,GAAG,EAAE,QAAQ,EAAE,UAAU,IAAI,EAAE,CAAC;YAEhE,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,eAAe,CACrC,MAAM,EACN,CAAC,IAAI,CAAC,EACN,GAAG,EAAE,CAAC,CAAC;oBACL,IAAI,EAAE,MAAM;oBACZ,IAAI,EAAE,IAAI;oBACV,KAAK,EAAE,IAAI;oBACX,GAAG,EAAE,GAAG;oBACR,IAAI,EAAE;wBACJ,QAAQ,EAAE,UAAU;wBACpB,QAAQ,EAAE,MAAM;qBACjB;iBACF,CAAC,CACH,CAAC;gBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,MAAM,OAAO,MAAM,cAAc,UAAU,GAAG,CAAC,CAAC;gBAE/F,oCAAoC;gBACpC,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAC3B,cAAc,MAAM,KAAK,EACzB,IAAI,CAAC,SAAS,CAAC;oBACb,IAAI,EAAE,IAAI;oBACV,QAAQ,EAAE,UAAU;oBACpB,QAAQ,EAAE,MAAM;oBAChB,GAAG,EAAE,GAAG;iBACT,CAAC,CACH,CAAC;gBAEF,4DAA4D;gBAC5D,MAAM,SAAS,GAAG,kBAAkB,CAAC;gBACrC,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,eAAe,CACrC,MAAM,EACN,CAAC,KAAK,CAAC,EACP,GAAG,EAAE,CAAC,CAAC;oBACL,IAAI,EAAE,MAAM;oBACZ,IAAI,EAAE,KAAK;oBACX,KAAK,EAAE,IAAI;oBACX,GAAG,EAAE,GAAG;oBACR,IAAI,EAAE,SAAS;iBAChB,CAAC,CACH,CAAC;gBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,MAAM,MAAM,SAAS,GAAG,CAAC,CAAC;gBAE1E,qCAAqC;gBACrC,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAC3B,cAAc,MAAM,MAAM,EAC1B,IAAI,CAAC,SAAS,CAAC;oBACb,IAAI,EAAE,KAAK;oBACX,IAAI,EAAE,SAAS;oBACf,GAAG,EAAE,GAAG;iBACT,CAAC,CACH,CAAC;gBAEF,sEAAsE;gBACtE,MAAM,WAAW,GAAG,sCAAsC,MAAM,EAAE,CAAC;gBACnE,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,eAAe,CACrC,UAAU,MAAM,EAAE,EAClB,CAAC,KAAK,CAAC,EACP,GAAG,EAAE,CAAC,CAAC;oBACL,IAAI,EAAE,UAAU,MAAM,EAAE;oBACxB,IAAI,EAAE,KAAK;oBACX,KAAK,EAAE,IAAI;oBACX,GAAG,EAAE,GAAG;oBACR,IAAI,EAAE,WAAW;iBAClB,CAAC,CACH,CAAC;gBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,MAAM,MAAM,WAAW,GAAG,CAAC,CAAC;gBAErF,uCAAuC;gBACvC,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAC3B,cAAc,MAAM,QAAQ,EAC5B,IAAI,CAAC,SAAS,CAAC;oBACb,IAAI,EAAE,KAAK;oBACX,IAAI,EAAE,UAAU,MAAM,EAAE;oBACxB,IAAI,EAAE,WAAW;oBACjB,GAAG,EAAE,GAAG;iBACT,CAAC,CACH,CAAC;gBAEF,qCAAqC;gBACrC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,MAAM;UACpD,MAAM,cAAc,UAAU;WAC7B,SAAS;aACP,WAAW;kDAC0B,CAAC,CAAC;YAE9C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,MAAM,KAAK,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACtF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,aAAmC,EAAE,WAAgB;QACnF,KAAK,MAAM,YAAY,IAAI,aAAa,EAAE,CAAC;YACzC,MAAM,MAAM,GAAG,YAAY,CAAC,MAAM,CAAC;YACnC,MAAM,QAAQ,GAAG,YAAY,CAAC,IAAI,EAAE,QAAQ,IAAI,SAAS,CAAC;YAE1D,IAAI,CAAC;gBACH,uCAAuC;gBACvC,MAAM,SAAS,GAAG,MAAM,WAAW,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;gBAElE,qDAAqD;gBACrD,IAAI,YAAY,CAAC,OAAO,KAAK,cAAc,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;oBACvE,MAAM,GAAG,GAAG,YAAY,CAAC,GAAG,EAAE,QAAQ,EAAE,GAAG,IAAI,IAAI,CAAC;oBAEpD,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,eAAe,CACrC,GAAG,QAAQ,eAAe,MAAM,EAAE,EAClC,CAAC,KAAK,CAAC,EACP,GAAG,EAAE,CAAC,CAAC;wBACL,IAAI,EAAE,GAAG,QAAQ,eAAe,MAAM,EAAE;wBACxC,IAAI,EAAE,KAAK;wBACX,KAAK,EAAE,IAAI;wBACX,GAAG,EAAE,GAAG;wBACR,IAAI,EAAE,SAAS,CAAC,KAAK;qBACtB,CAAC,CACH,CAAC;oBAEF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,QAAQ,eAAe,MAAM,EAAE,CAAC,CAAC;oBAEtF,sCAAsC;oBACtC,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAC3B,cAAc,MAAM,OAAO,EAC3B,IAAI,CAAC,SAAS,CAAC;wBACb,IAAI,EAAE,KAAK;wBACX,IAAI,EAAE,GAAG,QAAQ,eAAe,MAAM,EAAE;wBACxC,IAAI,EAAE,SAAS,CAAC,KAAK;wBACrB,GAAG,EAAE,GAAG;qBACT,CAAC,CACH,CAAC;gBACJ,CAAC;gBAED,+DAA+D;gBAC/D,IAAI,YAAY,CAAC,OAAO,KAAK,cAAc,EAAE,CAAC;oBAC5C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iCAAiC,SAAS,CAAC,IAAI,QAAQ,SAAS,CAAC,KAAK,GAAG,CAAC,CAAC;gBAChG,CAAC;YAEH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,MAAM,KAAK,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
@@ -0,0 +1,54 @@
1
+ import type { IEmailDomainConfig } from './interfaces.js';
2
+ /**
3
+ * Registry for email domain configurations
4
+ * Provides fast lookups and validation for domains
5
+ */
6
+ export declare class DomainRegistry {
7
+ private domains;
8
+ private defaults;
9
+ constructor(domainConfigs: IEmailDomainConfig[], defaults?: {
10
+ dnsMode?: 'forward' | 'internal-dns' | 'external-dns';
11
+ dkim?: IEmailDomainConfig['dkim'];
12
+ rateLimits?: IEmailDomainConfig['rateLimits'];
13
+ });
14
+ /**
15
+ * Get default DKIM configuration
16
+ */
17
+ private getDefaultDkimConfig;
18
+ /**
19
+ * Apply defaults to a domain configuration
20
+ */
21
+ private applyDefaults;
22
+ /**
23
+ * Check if a domain is registered
24
+ */
25
+ isDomainRegistered(domain: string): boolean;
26
+ /**
27
+ * Check if an email address belongs to a registered domain
28
+ */
29
+ isEmailRegistered(email: string): boolean;
30
+ /**
31
+ * Get domain configuration
32
+ */
33
+ getDomainConfig(domain: string): IEmailDomainConfig | undefined;
34
+ /**
35
+ * Get domain configuration for an email address
36
+ */
37
+ getEmailDomainConfig(email: string): IEmailDomainConfig | undefined;
38
+ /**
39
+ * Extract domain from email address
40
+ */
41
+ private extractDomain;
42
+ /**
43
+ * Get all registered domains
44
+ */
45
+ getAllDomains(): string[];
46
+ /**
47
+ * Get all domain configurations
48
+ */
49
+ getAllConfigs(): IEmailDomainConfig[];
50
+ /**
51
+ * Get domains by DNS mode
52
+ */
53
+ getDomainsByMode(mode: 'forward' | 'internal-dns' | 'external-dns'): IEmailDomainConfig[];
54
+ }
@@ -0,0 +1,119 @@
1
+ import { logger } from '../../logger.js';
2
+ /**
3
+ * Registry for email domain configurations
4
+ * Provides fast lookups and validation for domains
5
+ */
6
+ export class DomainRegistry {
7
+ domains = new Map();
8
+ defaults;
9
+ constructor(domainConfigs, defaults) {
10
+ // Set defaults
11
+ this.defaults = {
12
+ dnsMode: defaults?.dnsMode || 'external-dns',
13
+ ...this.getDefaultDkimConfig(),
14
+ ...defaults?.dkim,
15
+ rateLimits: defaults?.rateLimits
16
+ };
17
+ // Process and store domain configurations
18
+ for (const config of domainConfigs) {
19
+ const processedConfig = this.applyDefaults(config);
20
+ this.domains.set(config.domain.toLowerCase(), processedConfig);
21
+ logger.log('info', `Registered domain: ${config.domain} with DNS mode: ${processedConfig.dnsMode}`);
22
+ }
23
+ }
24
+ /**
25
+ * Get default DKIM configuration
26
+ */
27
+ getDefaultDkimConfig() {
28
+ return {
29
+ selector: 'default',
30
+ keySize: 2048,
31
+ rotateKeys: false,
32
+ rotationInterval: 90
33
+ };
34
+ }
35
+ /**
36
+ * Apply defaults to a domain configuration
37
+ */
38
+ applyDefaults(config) {
39
+ return {
40
+ ...config,
41
+ dnsMode: config.dnsMode || this.defaults.dnsMode,
42
+ dkim: {
43
+ ...this.getDefaultDkimConfig(),
44
+ ...this.defaults,
45
+ ...config.dkim
46
+ },
47
+ rateLimits: {
48
+ ...this.defaults.rateLimits,
49
+ ...config.rateLimits,
50
+ outbound: {
51
+ ...this.defaults.rateLimits?.outbound,
52
+ ...config.rateLimits?.outbound
53
+ },
54
+ inbound: {
55
+ ...this.defaults.rateLimits?.inbound,
56
+ ...config.rateLimits?.inbound
57
+ }
58
+ }
59
+ };
60
+ }
61
+ /**
62
+ * Check if a domain is registered
63
+ */
64
+ isDomainRegistered(domain) {
65
+ return this.domains.has(domain.toLowerCase());
66
+ }
67
+ /**
68
+ * Check if an email address belongs to a registered domain
69
+ */
70
+ isEmailRegistered(email) {
71
+ const domain = this.extractDomain(email);
72
+ if (!domain)
73
+ return false;
74
+ return this.isDomainRegistered(domain);
75
+ }
76
+ /**
77
+ * Get domain configuration
78
+ */
79
+ getDomainConfig(domain) {
80
+ return this.domains.get(domain.toLowerCase());
81
+ }
82
+ /**
83
+ * Get domain configuration for an email address
84
+ */
85
+ getEmailDomainConfig(email) {
86
+ const domain = this.extractDomain(email);
87
+ if (!domain)
88
+ return undefined;
89
+ return this.getDomainConfig(domain);
90
+ }
91
+ /**
92
+ * Extract domain from email address
93
+ */
94
+ extractDomain(email) {
95
+ const parts = email.toLowerCase().split('@');
96
+ if (parts.length !== 2)
97
+ return null;
98
+ return parts[1];
99
+ }
100
+ /**
101
+ * Get all registered domains
102
+ */
103
+ getAllDomains() {
104
+ return Array.from(this.domains.keys());
105
+ }
106
+ /**
107
+ * Get all domain configurations
108
+ */
109
+ getAllConfigs() {
110
+ return Array.from(this.domains.values());
111
+ }
112
+ /**
113
+ * Get domains by DNS mode
114
+ */
115
+ getDomainsByMode(mode) {
116
+ return Array.from(this.domains.values()).filter(config => config.dnsMode === mode);
117
+ }
118
+ }
119
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,33 @@
1
+ import type { IEmailAction, IEmailContext } from './interfaces.js';
2
+ import { Email } from '../core/classes.email.js';
3
+ import { BounceManager } from '../core/classes.bouncemanager.js';
4
+ import { UnifiedDeliveryQueue } from '../delivery/classes.delivery.queue.js';
5
+ import type { ISmtpSendResult } from '../../security/classes.rustsecuritybridge.js';
6
+ /**
7
+ * Dependencies injected from UnifiedEmailServer to avoid circular imports
8
+ */
9
+ export interface IActionExecutorDeps {
10
+ sendOutboundEmail: (host: string, port: number, email: Email, options?: {
11
+ auth?: {
12
+ user: string;
13
+ pass: string;
14
+ };
15
+ dkimDomain?: string;
16
+ dkimSelector?: string;
17
+ tlsOpportunistic?: boolean;
18
+ }) => Promise<ISmtpSendResult>;
19
+ bounceManager: BounceManager;
20
+ deliveryQueue: UnifiedDeliveryQueue;
21
+ }
22
+ /**
23
+ * Executes email routing actions (forward, process, deliver, reject)
24
+ */
25
+ export declare class EmailActionExecutor {
26
+ private deps;
27
+ constructor(deps: IActionExecutorDeps);
28
+ executeAction(action: IEmailAction, email: Email, context: IEmailContext): Promise<void>;
29
+ private handleForwardAction;
30
+ private handleProcessAction;
31
+ private handleDeliverAction;
32
+ private handleRejectAction;
33
+ }