@push.rocks/smartmta 5.1.3 → 5.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/changelog.md +15 -0
  2. package/dist_ts/00_commitinfo_data.d.ts +8 -0
  3. package/dist_ts/00_commitinfo_data.js +9 -0
  4. package/dist_ts/index.d.ts +3 -0
  5. package/dist_ts/index.js +4 -0
  6. package/dist_ts/logger.d.ts +17 -0
  7. package/dist_ts/logger.js +76 -0
  8. package/dist_ts/mail/core/classes.bouncemanager.d.ts +185 -0
  9. package/dist_ts/mail/core/classes.bouncemanager.js +569 -0
  10. package/dist_ts/mail/core/classes.email.d.ts +291 -0
  11. package/dist_ts/mail/core/classes.email.js +802 -0
  12. package/dist_ts/mail/core/classes.emailvalidator.d.ts +61 -0
  13. package/dist_ts/mail/core/classes.emailvalidator.js +184 -0
  14. package/dist_ts/mail/core/classes.templatemanager.d.ts +95 -0
  15. package/dist_ts/mail/core/classes.templatemanager.js +240 -0
  16. package/dist_ts/mail/core/index.d.ts +4 -0
  17. package/dist_ts/mail/core/index.js +6 -0
  18. package/dist_ts/mail/delivery/classes.delivery.queue.d.ts +163 -0
  19. package/dist_ts/mail/delivery/classes.delivery.queue.js +488 -0
  20. package/dist_ts/mail/delivery/classes.delivery.system.d.ts +160 -0
  21. package/dist_ts/mail/delivery/classes.delivery.system.js +630 -0
  22. package/dist_ts/mail/delivery/classes.unified.rate.limiter.d.ts +200 -0
  23. package/dist_ts/mail/delivery/classes.unified.rate.limiter.js +820 -0
  24. package/dist_ts/mail/delivery/index.d.ts +4 -0
  25. package/dist_ts/mail/delivery/index.js +6 -0
  26. package/dist_ts/mail/delivery/interfaces.d.ts +140 -0
  27. package/dist_ts/mail/delivery/interfaces.js +17 -0
  28. package/dist_ts/mail/index.d.ts +7 -0
  29. package/dist_ts/mail/index.js +12 -0
  30. package/dist_ts/mail/routing/classes.dkim.manager.d.ts +25 -0
  31. package/dist_ts/mail/routing/classes.dkim.manager.js +127 -0
  32. package/dist_ts/mail/routing/classes.dns.manager.d.ts +79 -0
  33. package/dist_ts/mail/routing/classes.dns.manager.js +415 -0
  34. package/dist_ts/mail/routing/classes.domain.registry.d.ts +54 -0
  35. package/dist_ts/mail/routing/classes.domain.registry.js +119 -0
  36. package/dist_ts/mail/routing/classes.email.action.executor.d.ts +33 -0
  37. package/dist_ts/mail/routing/classes.email.action.executor.js +137 -0
  38. package/dist_ts/mail/routing/classes.email.router.d.ts +171 -0
  39. package/dist_ts/mail/routing/classes.email.router.js +494 -0
  40. package/dist_ts/mail/routing/classes.unified.email.server.d.ts +241 -0
  41. package/dist_ts/mail/routing/classes.unified.email.server.js +935 -0
  42. package/dist_ts/mail/routing/index.d.ts +7 -0
  43. package/dist_ts/mail/routing/index.js +9 -0
  44. package/dist_ts/mail/routing/interfaces.d.ts +187 -0
  45. package/dist_ts/mail/routing/interfaces.js +2 -0
  46. package/dist_ts/mail/security/classes.dkimcreator.d.ts +72 -0
  47. package/dist_ts/mail/security/classes.dkimcreator.js +360 -0
  48. package/dist_ts/mail/security/classes.spfverifier.d.ts +62 -0
  49. package/dist_ts/mail/security/classes.spfverifier.js +87 -0
  50. package/dist_ts/mail/security/index.d.ts +2 -0
  51. package/dist_ts/mail/security/index.js +4 -0
  52. package/dist_ts/paths.d.ts +14 -0
  53. package/dist_ts/paths.js +39 -0
  54. package/dist_ts/plugins.d.ts +24 -0
  55. package/dist_ts/plugins.js +28 -0
  56. package/dist_ts/security/classes.contentscanner.d.ts +130 -0
  57. package/dist_ts/security/classes.contentscanner.js +338 -0
  58. package/dist_ts/security/classes.ipreputationchecker.d.ts +73 -0
  59. package/dist_ts/security/classes.ipreputationchecker.js +263 -0
  60. package/dist_ts/security/classes.rustsecuritybridge.d.ts +403 -0
  61. package/dist_ts/security/classes.rustsecuritybridge.js +502 -0
  62. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  63. package/dist_ts/security/classes.securitylogger.js +235 -0
  64. package/dist_ts/security/index.d.ts +4 -0
  65. package/dist_ts/security/index.js +5 -0
  66. package/package.json +6 -1
  67. package/ts/00_commitinfo_data.ts +8 -0
  68. package/ts/index.ts +3 -0
  69. package/ts/logger.ts +91 -0
  70. package/ts/mail/core/classes.bouncemanager.ts +731 -0
  71. package/ts/mail/core/classes.email.ts +942 -0
  72. package/ts/mail/core/classes.emailvalidator.ts +239 -0
  73. package/ts/mail/core/classes.templatemanager.ts +320 -0
  74. package/ts/mail/core/index.ts +5 -0
  75. package/ts/mail/delivery/classes.delivery.queue.ts +645 -0
  76. package/ts/mail/delivery/classes.delivery.system.ts +816 -0
  77. package/ts/mail/delivery/classes.unified.rate.limiter.ts +1053 -0
  78. package/ts/mail/delivery/index.ts +5 -0
  79. package/ts/mail/delivery/interfaces.ts +167 -0
  80. package/ts/mail/index.ts +17 -0
  81. package/ts/mail/routing/classes.dkim.manager.ts +157 -0
  82. package/ts/mail/routing/classes.dns.manager.ts +573 -0
  83. package/ts/mail/routing/classes.domain.registry.ts +139 -0
  84. package/ts/mail/routing/classes.email.action.executor.ts +175 -0
  85. package/ts/mail/routing/classes.email.router.ts +575 -0
  86. package/ts/mail/routing/classes.unified.email.server.ts +1207 -0
  87. package/ts/mail/routing/index.ts +9 -0
  88. package/ts/mail/routing/interfaces.ts +202 -0
  89. package/ts/mail/security/classes.dkimcreator.ts +447 -0
  90. package/ts/mail/security/classes.spfverifier.ts +126 -0
  91. package/ts/mail/security/index.ts +3 -0
  92. package/ts/paths.ts +48 -0
  93. package/ts/plugins.ts +53 -0
  94. package/ts/security/classes.contentscanner.ts +400 -0
  95. package/ts/security/classes.ipreputationchecker.ts +315 -0
  96. package/ts/security/classes.rustsecuritybridge.ts +964 -0
  97. package/ts/security/classes.securitylogger.ts +299 -0
  98. package/ts/security/index.ts +40 -0
@@ -0,0 +1,235 @@
1
+ import * as plugins from '../plugins.js';
2
+ import { logger } from '../logger.js';
3
+ /**
4
+ * Log level for security events
5
+ */
6
+ export var SecurityLogLevel;
7
+ (function (SecurityLogLevel) {
8
+ SecurityLogLevel["INFO"] = "info";
9
+ SecurityLogLevel["WARN"] = "warn";
10
+ SecurityLogLevel["ERROR"] = "error";
11
+ SecurityLogLevel["CRITICAL"] = "critical";
12
+ })(SecurityLogLevel || (SecurityLogLevel = {}));
13
+ /**
14
+ * Security event types for categorization
15
+ */
16
+ export var SecurityEventType;
17
+ (function (SecurityEventType) {
18
+ SecurityEventType["AUTHENTICATION"] = "authentication";
19
+ SecurityEventType["ACCESS_CONTROL"] = "access_control";
20
+ SecurityEventType["EMAIL_VALIDATION"] = "email_validation";
21
+ SecurityEventType["EMAIL_PROCESSING"] = "email_processing";
22
+ SecurityEventType["EMAIL_FORWARDING"] = "email_forwarding";
23
+ SecurityEventType["EMAIL_DELIVERY"] = "email_delivery";
24
+ SecurityEventType["DKIM"] = "dkim";
25
+ SecurityEventType["SPF"] = "spf";
26
+ SecurityEventType["DMARC"] = "dmarc";
27
+ SecurityEventType["RATE_LIMIT"] = "rate_limit";
28
+ SecurityEventType["RATE_LIMITING"] = "rate_limiting";
29
+ SecurityEventType["SPAM"] = "spam";
30
+ SecurityEventType["MALWARE"] = "malware";
31
+ SecurityEventType["CONNECTION"] = "connection";
32
+ SecurityEventType["DATA_EXPOSURE"] = "data_exposure";
33
+ SecurityEventType["CONFIGURATION"] = "configuration";
34
+ SecurityEventType["IP_REPUTATION"] = "ip_reputation";
35
+ SecurityEventType["REJECTED_CONNECTION"] = "rejected_connection";
36
+ })(SecurityEventType || (SecurityEventType = {}));
37
+ /**
38
+ * Security logger for enhanced security monitoring
39
+ */
40
+ export class SecurityLogger {
41
+ static instance;
42
+ securityEvents = [];
43
+ maxEventHistory;
44
+ enableNotifications;
45
+ constructor(options) {
46
+ this.maxEventHistory = options?.maxEventHistory || 1000;
47
+ this.enableNotifications = options?.enableNotifications || false;
48
+ }
49
+ /**
50
+ * Get singleton instance
51
+ */
52
+ static getInstance(options) {
53
+ if (!SecurityLogger.instance) {
54
+ SecurityLogger.instance = new SecurityLogger(options);
55
+ }
56
+ return SecurityLogger.instance;
57
+ }
58
+ /**
59
+ * Log a security event
60
+ * @param event The security event to log
61
+ */
62
+ logEvent(event) {
63
+ const fullEvent = {
64
+ ...event,
65
+ timestamp: Date.now()
66
+ };
67
+ // Store in memory buffer
68
+ this.securityEvents.push(fullEvent);
69
+ // Trim history if needed
70
+ if (this.securityEvents.length > this.maxEventHistory) {
71
+ this.securityEvents.shift();
72
+ }
73
+ // Log to regular logger with appropriate level
74
+ switch (event.level) {
75
+ case SecurityLogLevel.INFO:
76
+ logger.log('info', `[SECURITY:${event.type}] ${event.message}`, event.details);
77
+ break;
78
+ case SecurityLogLevel.WARN:
79
+ logger.log('warn', `[SECURITY:${event.type}] ${event.message}`, event.details);
80
+ break;
81
+ case SecurityLogLevel.ERROR:
82
+ case SecurityLogLevel.CRITICAL:
83
+ logger.log('error', `[SECURITY:${event.type}] ${event.message}`, event.details);
84
+ // Send notification for critical events if enabled
85
+ if (event.level === SecurityLogLevel.CRITICAL && this.enableNotifications) {
86
+ this.sendNotification(fullEvent);
87
+ }
88
+ break;
89
+ }
90
+ }
91
+ /**
92
+ * Get recent security events
93
+ * @param limit Maximum number of events to return
94
+ * @param filter Filter for specific event types
95
+ * @returns Recent security events
96
+ */
97
+ getRecentEvents(limit = 100, filter) {
98
+ let filteredEvents = this.securityEvents;
99
+ // Apply filters
100
+ if (filter) {
101
+ if (filter.level) {
102
+ filteredEvents = filteredEvents.filter(event => event.level === filter.level);
103
+ }
104
+ if (filter.type) {
105
+ filteredEvents = filteredEvents.filter(event => event.type === filter.type);
106
+ }
107
+ if (filter.fromTimestamp) {
108
+ filteredEvents = filteredEvents.filter(event => event.timestamp >= filter.fromTimestamp);
109
+ }
110
+ if (filter.toTimestamp) {
111
+ filteredEvents = filteredEvents.filter(event => event.timestamp <= filter.toTimestamp);
112
+ }
113
+ }
114
+ // Return most recent events up to limit
115
+ return filteredEvents
116
+ .sort((a, b) => b.timestamp - a.timestamp)
117
+ .slice(0, limit);
118
+ }
119
+ /**
120
+ * Get events by security level
121
+ * @param level The security level to filter by
122
+ * @param limit Maximum number of events to return
123
+ * @returns Security events matching the level
124
+ */
125
+ getEventsByLevel(level, limit = 100) {
126
+ return this.getRecentEvents(limit, { level });
127
+ }
128
+ /**
129
+ * Get events by security type
130
+ * @param type The event type to filter by
131
+ * @param limit Maximum number of events to return
132
+ * @returns Security events matching the type
133
+ */
134
+ getEventsByType(type, limit = 100) {
135
+ return this.getRecentEvents(limit, { type });
136
+ }
137
+ /**
138
+ * Get security events for a specific IP address
139
+ * @param ipAddress The IP address to filter by
140
+ * @param limit Maximum number of events to return
141
+ * @returns Security events for the IP address
142
+ */
143
+ getEventsByIP(ipAddress, limit = 100) {
144
+ return this.securityEvents
145
+ .filter(event => event.ipAddress === ipAddress)
146
+ .sort((a, b) => b.timestamp - a.timestamp)
147
+ .slice(0, limit);
148
+ }
149
+ /**
150
+ * Get security events for a specific domain
151
+ * @param domain The domain to filter by
152
+ * @param limit Maximum number of events to return
153
+ * @returns Security events for the domain
154
+ */
155
+ getEventsByDomain(domain, limit = 100) {
156
+ return this.securityEvents
157
+ .filter(event => event.domain === domain)
158
+ .sort((a, b) => b.timestamp - a.timestamp)
159
+ .slice(0, limit);
160
+ }
161
+ /**
162
+ * Send a notification for critical security events
163
+ * @param event The security event to notify about
164
+ * @private
165
+ */
166
+ sendNotification(event) {
167
+ // In a production environment, this would integrate with a notification service
168
+ // For now, we'll just log that we would send a notification
169
+ logger.log('error', `[SECURITY NOTIFICATION] ${event.message}`, {
170
+ ...event,
171
+ notificationSent: true
172
+ });
173
+ // Future integration with alerting systems would go here
174
+ }
175
+ /**
176
+ * Clear event history
177
+ */
178
+ clearEvents() {
179
+ this.securityEvents = [];
180
+ }
181
+ /**
182
+ * Get statistical summary of security events
183
+ * @param timeWindow Optional time window in milliseconds
184
+ * @returns Summary of security events
185
+ */
186
+ getEventsSummary(timeWindow) {
187
+ // Filter by time window if provided
188
+ let events = this.securityEvents;
189
+ if (timeWindow) {
190
+ const cutoff = Date.now() - timeWindow;
191
+ events = events.filter(e => e.timestamp >= cutoff);
192
+ }
193
+ // Count by level
194
+ const byLevel = Object.values(SecurityLogLevel).reduce((acc, level) => {
195
+ acc[level] = events.filter(e => e.level === level).length;
196
+ return acc;
197
+ }, {});
198
+ // Count by type
199
+ const byType = Object.values(SecurityEventType).reduce((acc, type) => {
200
+ acc[type] = events.filter(e => e.type === type).length;
201
+ return acc;
202
+ }, {});
203
+ // Count by IP
204
+ const ipCounts = new Map();
205
+ events.forEach(e => {
206
+ if (e.ipAddress) {
207
+ ipCounts.set(e.ipAddress, (ipCounts.get(e.ipAddress) || 0) + 1);
208
+ }
209
+ });
210
+ // Count by domain
211
+ const domainCounts = new Map();
212
+ events.forEach(e => {
213
+ if (e.domain) {
214
+ domainCounts.set(e.domain, (domainCounts.get(e.domain) || 0) + 1);
215
+ }
216
+ });
217
+ // Sort and limit top entries
218
+ const topIPs = Array.from(ipCounts.entries())
219
+ .map(([ip, count]) => ({ ip, count }))
220
+ .sort((a, b) => b.count - a.count)
221
+ .slice(0, 10);
222
+ const topDomains = Array.from(domainCounts.entries())
223
+ .map(([domain, count]) => ({ domain, count }))
224
+ .sort((a, b) => b.count - a.count)
225
+ .slice(0, 10);
226
+ return {
227
+ total: events.length,
228
+ byLevel,
229
+ byType,
230
+ topIPs,
231
+ topDomains
232
+ };
233
+ }
234
+ }
235
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.securitylogger.js","sourceRoot":"","sources":["../../ts/security/classes.securitylogger.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AAEtC;;GAEG;AACH,MAAM,CAAN,IAAY,gBAKX;AALD,WAAY,gBAAgB;IAC1B,iCAAa,CAAA;IACb,iCAAa,CAAA;IACb,mCAAe,CAAA;IACf,yCAAqB,CAAA;AACvB,CAAC,EALW,gBAAgB,KAAhB,gBAAgB,QAK3B;AAED;;GAEG;AACH,MAAM,CAAN,IAAY,iBAmBX;AAnBD,WAAY,iBAAiB;IAC3B,sDAAiC,CAAA;IACjC,sDAAiC,CAAA;IACjC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,sDAAiC,CAAA;IACjC,kCAAa,CAAA;IACb,gCAAW,CAAA;IACX,oCAAe,CAAA;IACf,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,kCAAa,CAAA;IACb,wCAAmB,CAAA;IACnB,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,gEAA2C,CAAA;AAC7C,CAAC,EAnBW,iBAAiB,KAAjB,iBAAiB,QAmB5B;AAqBD;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,cAAc,GAAqB,EAAE,CAAC;IACtC,eAAe,CAAS;IACxB,mBAAmB,CAAU;IAErC,YAAoB,OAGnB;QACC,IAAI,CAAC,eAAe,GAAG,OAAO,EAAE,eAAe,IAAI,IAAI,CAAC;QACxD,IAAI,CAAC,mBAAmB,GAAG,OAAO,EAAE,mBAAmB,IAAI,KAAK,CAAC;IACnE,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,WAAW,CAAC,OAGzB;QACC,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,KAAwC;QACtD,MAAM,SAAS,GAAmB;YAChC,GAAG,KAAK;YACR,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB,CAAC;QAEF,yBAAyB;QACzB,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEpC,yBAAyB;QACzB,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;YACtD,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAC9B,CAAC;QAED,+CAA+C;QAC/C,QAAQ,KAAK,CAAC,KAAK,EAAE,CAAC;YACpB,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,KAAK,CAAC;YAC5B,KAAK,gBAAgB,CAAC,QAAQ;gBAC5B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAEhF,mDAAmD;gBACnD,IAAI,KAAK,CAAC,KAAK,KAAK,gBAAgB,CAAC,QAAQ,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBAC1E,IAAI,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;gBACnC,CAAC;gBACD,MAAM;QACV,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,QAAgB,GAAG,EAAE,MAK3C;QACC,IAAI,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QAEzC,gBAAgB;QAChB,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,KAAK,MAAM,CAAC,KAAK,CAAC,CAAC;YAChF,CAAC;YAED,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC;gBAChB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC;YAC9E,CAAC;YAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;gBACzB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,aAAa,CAAC,CAAC;YAC3F,CAAC;YAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;gBACvB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,WAAW,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;QAED,wCAAwC;QACxC,OAAO,cAAc;aAClB,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,gBAAgB,CAAC,KAAuB,EAAE,QAAgB,GAAG;QAClE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAChD,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,IAAuB,EAAE,QAAgB,GAAG;QACjE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,IAAI,EAAE,CAAC,CAAC;IAC/C,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,SAAiB,EAAE,QAAgB,GAAG;QACzD,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC;aAC9C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,iBAAiB,CAAC,MAAc,EAAE,QAAgB,GAAG;QAC1D,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,MAAM,KAAK,MAAM,CAAC;aACxC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAqB;QAC5C,gFAAgF;QAChF,4DAA4D;QAC5D,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,KAAK,CAAC,OAAO,EAAE,EAAE;YAC9D,GAAG,KAAK;YACR,gBAAgB,EAAE,IAAI;SACvB,CAAC,CAAC;QAEH,yDAAyD;IAC3D,CAAC;IAED;;OAEG;IACI,WAAW;QAChB,IAAI,CAAC,cAAc,GAAG,EAAE,CAAC;IAC3B,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,UAAmB;QAOzC,oCAAoC;QACpC,IAAI,MAAM,GAAG,IAAI,CAAC,cAAc,CAAC;QACjC,IAAI,UAAU,EAAE,CAAC;YACf,MAAM,MAAM,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC;YACvC,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,IAAI,MAAM,CAAC,CAAC;QACrD,CAAC;QAED,iBAAiB;QACjB,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,MAAM,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACpE,GAAG,CAAC,KAAK,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,KAAK,KAAK,CAAC,CAAC,MAAM,CAAC;YAC1D,OAAO,GAAG,CAAC;QACb,CAAC,EAAE,EAAsC,CAAC,CAAC;QAE3C,gBAAgB;QAChB,MAAM,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC,MAAM,CAAC,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE;YACnE,GAAG,CAAC,IAAI,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,IAAI,CAAC,CAAC,MAAM,CAAC;YACvD,OAAO,GAAG,CAAC;QACb,CAAC,EAAE,EAAuC,CAAC,CAAC;QAE5C,cAAc;QACd,MAAM,QAAQ,GAAG,IAAI,GAAG,EAAkB,CAAC;QAC3C,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE;YACjB,IAAI,CAAC,CAAC,SAAS,EAAE,CAAC;gBAChB,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAClE,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,kBAAkB;QAClB,MAAM,YAAY,GAAG,IAAI,GAAG,EAAkB,CAAC;QAC/C,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE;YACjB,IAAI,CAAC,CAAC,MAAM,EAAE,CAAC;gBACb,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YACpE,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,MAAM,GAAG,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;aAC1C,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;aACrC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;aAClD,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,CAAC;aAC7C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,OAAO;YACL,KAAK,EAAE,MAAM,CAAC,MAAM;YACpB,OAAO;YACP,MAAM;YACN,MAAM;YACN,UAAU;SACX,CAAC;IACJ,CAAC;CACF"}
@@ -0,0 +1,4 @@
1
+ export { SecurityLogger, SecurityLogLevel, SecurityEventType, type ISecurityEvent } from './classes.securitylogger.js';
2
+ export { IPReputationChecker, ReputationThreshold, IPType, type IReputationResult, type IIPReputationOptions } from './classes.ipreputationchecker.js';
3
+ export { ContentScanner, ThreatCategory, type IScanResult, type IContentScannerOptions } from './classes.contentscanner.js';
4
+ export { RustSecurityBridge, BridgeState, type IBridgeResilienceConfig, type IDkimVerificationResult, type ISpfResult, type IDmarcResult, type IEmailSecurityResult, type IValidationResult, type IBounceDetection, type IRustReputationResult, type IVersionInfo, type IOutboundEmail, type ISmtpSendResult, type ISmtpSendOptions, type ISmtpVerifyResult, type ISmtpPoolStatus, } from './classes.rustsecuritybridge.js';
@@ -0,0 +1,5 @@
1
+ export { SecurityLogger, SecurityLogLevel, SecurityEventType } from './classes.securitylogger.js';
2
+ export { IPReputationChecker, ReputationThreshold, IPType } from './classes.ipreputationchecker.js';
3
+ export { ContentScanner, ThreatCategory } from './classes.contentscanner.js';
4
+ export { RustSecurityBridge, BridgeState, } from './classes.rustsecuritybridge.js';
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi90cy9zZWN1cml0eS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEVBQ0wsY0FBYyxFQUNkLGdCQUFnQixFQUNoQixpQkFBaUIsRUFFbEIsTUFBTSw2QkFBNkIsQ0FBQztBQUVyQyxPQUFPLEVBQ0wsbUJBQW1CLEVBQ25CLG1CQUFtQixFQUNuQixNQUFNLEVBR1AsTUFBTSxrQ0FBa0MsQ0FBQztBQUUxQyxPQUFPLEVBQ0wsY0FBYyxFQUNkLGNBQWMsRUFHZixNQUFNLDZCQUE2QixDQUFDO0FBRXJDLE9BQU8sRUFDTCxrQkFBa0IsRUFDbEIsV0FBVyxHQWVaLE1BQU0saUNBQWlDLENBQUMifQ==
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@push.rocks/smartmta",
3
- "version": "5.1.3",
3
+ "version": "5.2.1",
4
4
  "description": "A high-performance, enterprise-grade Mail Transfer Agent (MTA) built from scratch in TypeScript with Rust acceleration.",
5
5
  "keywords": [
6
6
  "mta",
@@ -27,6 +27,9 @@
27
27
  "author": "Task Venture Capital GmbH",
28
28
  "license": "MIT",
29
29
  "type": "module",
30
+ "exports": {
31
+ ".": "./dist_ts/index.js"
32
+ },
30
33
  "bin": {
31
34
  "mailer": "./bin/mailer-wrapper.js"
32
35
  },
@@ -56,6 +59,8 @@
56
59
  "uuid": "^13.0.0"
57
60
  },
58
61
  "files": [
62
+ "ts/**/*",
63
+ "dist_ts/**/*",
59
64
  "bin/",
60
65
  "scripts/install-binary.js",
61
66
  "dist_rust/**/*",
@@ -0,0 +1,8 @@
1
+ /**
2
+ * autocreated commitinfo by @push.rocks/commitinfo
3
+ */
4
+ export const commitinfo = {
5
+ name: '@push.rocks/smartmta',
6
+ version: '5.2.1',
7
+ description: 'A high-performance, enterprise-grade Mail Transfer Agent (MTA) built from scratch in TypeScript with Rust acceleration.'
8
+ }
package/ts/index.ts ADDED
@@ -0,0 +1,3 @@
1
+ export * from './00_commitinfo_data.js';
2
+ export * from './mail/index.js';
3
+ export * from './security/index.js';
package/ts/logger.ts ADDED
@@ -0,0 +1,91 @@
1
+ import * as plugins from './plugins.js';
2
+ import { randomUUID } from 'node:crypto';
3
+
4
+ // Map NODE_ENV to valid TEnvironment
5
+ const nodeEnv = process.env.NODE_ENV || 'production';
6
+ const envMap: Record<string, 'local' | 'test' | 'staging' | 'production'> = {
7
+ 'development': 'local',
8
+ 'test': 'test',
9
+ 'staging': 'staging',
10
+ 'production': 'production'
11
+ };
12
+
13
+ // Default Smartlog instance
14
+ const baseLogger = new plugins.smartlog.Smartlog({
15
+ logContext: {
16
+ environment: envMap[nodeEnv] || 'production',
17
+ runtime: 'node',
18
+ zone: 'serve.zone',
19
+ }
20
+ });
21
+
22
+ // Extended logger compatible with the original enhanced logger API
23
+ class StandardLogger {
24
+ private defaultContext: Record<string, any> = {};
25
+ private correlationId: string | null = null;
26
+
27
+ constructor() {}
28
+
29
+ // Log methods
30
+ public log(level: 'error' | 'warn' | 'info' | 'success' | 'debug', message: string, context: Record<string, any> = {}) {
31
+ const combinedContext = {
32
+ ...this.defaultContext,
33
+ ...context
34
+ };
35
+
36
+ if (this.correlationId) {
37
+ combinedContext.correlation_id = this.correlationId;
38
+ }
39
+
40
+ baseLogger.log(level, message, combinedContext);
41
+ }
42
+
43
+ public error(message: string, context: Record<string, any> = {}) {
44
+ this.log('error', message, context);
45
+ }
46
+
47
+ public warn(message: string, context: Record<string, any> = {}) {
48
+ this.log('warn', message, context);
49
+ }
50
+
51
+ public info(message: string, context: Record<string, any> = {}) {
52
+ this.log('info', message, context);
53
+ }
54
+
55
+ public success(message: string, context: Record<string, any> = {}) {
56
+ this.log('success', message, context);
57
+ }
58
+
59
+ public debug(message: string, context: Record<string, any> = {}) {
60
+ this.log('debug', message, context);
61
+ }
62
+
63
+ // Context management
64
+ public setContext(context: Record<string, any>, overwrite: boolean = false) {
65
+ if (overwrite) {
66
+ this.defaultContext = context;
67
+ } else {
68
+ this.defaultContext = {
69
+ ...this.defaultContext,
70
+ ...context
71
+ };
72
+ }
73
+ }
74
+
75
+ // Correlation ID management
76
+ public setCorrelationId(id: string | null = null): string {
77
+ this.correlationId = id || randomUUID();
78
+ return this.correlationId;
79
+ }
80
+
81
+ public getCorrelationId(): string | null {
82
+ return this.correlationId;
83
+ }
84
+
85
+ public clearCorrelationId(): void {
86
+ this.correlationId = null;
87
+ }
88
+ }
89
+
90
+ // Export a singleton instance
91
+ export const logger = new StandardLogger();