2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-06-11 03:33:37 +08:00
|
|
|
#
|
|
|
|
# A helper class to send an email. It will also handle a nil message, which it considers
|
|
|
|
# to be "do nothing". This is because some Mailers will decide not to do work for some
|
|
|
|
# reason. For example, emailing a user too frequently. A nil to address is also considered
|
|
|
|
# "do nothing"
|
|
|
|
#
|
|
|
|
# It also adds an HTML part for the plain text body
|
|
|
|
#
|
2013-07-03 02:13:46 +08:00
|
|
|
require 'uri'
|
2014-03-12 18:55:08 +08:00
|
|
|
require 'net/smtp'
|
2013-06-11 03:33:37 +08:00
|
|
|
|
2014-03-07 23:33:15 +08:00
|
|
|
SMTP_CLIENT_ERRORS = [Net::SMTPFatalError, Net::SMTPSyntaxError]
|
2020-10-08 11:52:17 +08:00
|
|
|
BYPASS_DISABLE_TYPES = %w(
|
|
|
|
admin_login
|
|
|
|
test_message
|
|
|
|
new_version
|
|
|
|
group_smtp
|
2020-11-04 07:18:22 +08:00
|
|
|
invite_password_instructions
|
2020-10-08 11:52:17 +08:00
|
|
|
download_backup_message
|
|
|
|
admin_confirmation_message
|
|
|
|
)
|
2014-03-07 23:33:15 +08:00
|
|
|
|
2013-06-11 03:33:37 +08:00
|
|
|
module Email
|
|
|
|
class Sender
|
|
|
|
|
|
|
|
def initialize(message, email_type, user = nil)
|
2021-08-03 23:58:34 +08:00
|
|
|
@message = message
|
|
|
|
@message_attachments_index = {}
|
2013-06-11 03:33:37 +08:00
|
|
|
@email_type = email_type
|
|
|
|
@user = user
|
|
|
|
end
|
|
|
|
|
2019-03-22 05:57:09 +08:00
|
|
|
def send
|
|
|
|
bypass_disable = BYPASS_DISABLE_TYPES.include?(@email_type.to_s)
|
2019-03-12 09:39:16 +08:00
|
|
|
|
2019-03-22 05:57:09 +08:00
|
|
|
if SiteSetting.disable_emails == "yes" && !bypass_disable
|
2019-03-12 09:39:16 +08:00
|
|
|
return
|
|
|
|
end
|
2016-02-18 00:31:46 +08:00
|
|
|
|
|
|
|
return if ActionMailer::Base::NullMail === @message
|
|
|
|
return if ActionMailer::Base::NullMail === (@message.message rescue nil)
|
|
|
|
|
2018-07-24 12:55:43 +08:00
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_message_blank]) if @message.blank?
|
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_message_to_blank]) if @message.to.blank?
|
2013-11-29 06:20:56 +08:00
|
|
|
|
2019-03-22 05:57:09 +08:00
|
|
|
if SiteSetting.disable_emails == "non-staff" && !bypass_disable
|
2020-10-08 11:52:17 +08:00
|
|
|
return unless find_user&.staff?
|
2019-03-22 04:46:14 +08:00
|
|
|
end
|
|
|
|
|
2019-03-14 00:17:59 +08:00
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_message_to_invalid]) if to_address.end_with?(".invalid")
|
|
|
|
|
2013-11-29 06:20:56 +08:00
|
|
|
if @message.text_part
|
2018-07-24 12:55:43 +08:00
|
|
|
if @message.text_part.body.to_s.blank?
|
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_text_part_body_blank])
|
|
|
|
end
|
2013-11-29 06:20:56 +08:00
|
|
|
else
|
2018-07-24 12:55:43 +08:00
|
|
|
if @message.body.to_s.blank?
|
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_body_blank])
|
|
|
|
end
|
2013-11-29 06:20:56 +08:00
|
|
|
end
|
2013-06-11 03:33:37 +08:00
|
|
|
|
|
|
|
@message.charset = 'UTF-8'
|
|
|
|
|
|
|
|
opts = {}
|
|
|
|
|
|
|
|
renderer = Email::Renderer.new(@message, opts)
|
|
|
|
|
2013-11-30 01:21:21 +08:00
|
|
|
if @message.html_part
|
|
|
|
@message.html_part.body = renderer.html
|
|
|
|
else
|
2013-07-24 15:13:15 +08:00
|
|
|
@message.html_part = Mail::Part.new do
|
|
|
|
content_type 'text/html; charset=UTF-8'
|
|
|
|
body renderer.html
|
|
|
|
end
|
2013-06-11 03:33:37 +08:00
|
|
|
end
|
|
|
|
|
2015-01-17 18:07:58 +08:00
|
|
|
# Fix relative (ie upload) HTML links in markdown which do not work well in plain text emails.
|
|
|
|
# These are the links we add when a user uploads a file or image.
|
|
|
|
# Ideally we would parse general markdown into plain text, but that is almost an intractable problem.
|
|
|
|
url_prefix = Discourse.base_url
|
2019-06-11 16:00:59 +08:00
|
|
|
@message.parts[0].body = @message.parts[0].body.to_s.gsub(/<a class="attachment" href="(\/uploads\/default\/[^"]+)">([^<]*)<\/a>/, '[\2|attachment](' + url_prefix + '\1)')
|
2015-01-17 18:07:58 +08:00
|
|
|
@message.parts[0].body = @message.parts[0].body.to_s.gsub(/<img src="(\/uploads\/default\/[^"]+)"([^>]*)>/, '![](' + url_prefix + '\1)')
|
|
|
|
|
2013-06-11 03:33:37 +08:00
|
|
|
@message.text_part.content_type = 'text/plain; charset=UTF-8'
|
2018-07-18 16:28:44 +08:00
|
|
|
user_id = @user&.id
|
2013-06-11 03:33:37 +08:00
|
|
|
|
2013-06-25 23:35:26 +08:00
|
|
|
# Set up the email log
|
2018-07-18 16:28:44 +08:00
|
|
|
email_log = EmailLog.new(
|
|
|
|
email_type: @email_type,
|
|
|
|
to_address: to_address,
|
|
|
|
user_id: user_id
|
|
|
|
)
|
2013-07-03 02:13:46 +08:00
|
|
|
|
2021-06-22 06:32:01 +08:00
|
|
|
if cc_addresses.any?
|
|
|
|
email_log.cc_addresses = cc_addresses.join(";")
|
|
|
|
email_log.cc_user_ids = User.with_email(cc_addresses).pluck(:id)
|
|
|
|
end
|
|
|
|
|
2013-07-08 23:48:40 +08:00
|
|
|
host = Email::Sender.host_for(Discourse.base_url)
|
2013-07-03 02:13:46 +08:00
|
|
|
|
2017-02-02 06:02:41 +08:00
|
|
|
post_id = header_value('X-Discourse-Post-Id')
|
|
|
|
topic_id = header_value('X-Discourse-Topic-Id')
|
2021-10-12 01:57:42 +08:00
|
|
|
reply_key = get_reply_key(post_id, user_id)
|
2021-06-15 09:29:46 +08:00
|
|
|
from_address = @message.from&.first
|
2021-06-18 12:36:17 +08:00
|
|
|
smtp_group_id = from_address.blank? ? nil : Group.where(
|
|
|
|
email_username: from_address, smtp_enabled: true
|
|
|
|
).pluck_first(:id)
|
2013-07-08 23:48:40 +08:00
|
|
|
|
2015-01-28 17:12:49 +08:00
|
|
|
# always set a default Message ID from the host
|
2021-12-06 08:34:39 +08:00
|
|
|
@message.header['Message-ID'] = Email::MessageIdService.generate_default
|
2015-01-28 17:12:49 +08:00
|
|
|
|
2018-07-18 10:21:54 +08:00
|
|
|
if topic_id.present? && post_id.present?
|
|
|
|
post = Post.find_by(id: post_id, topic_id: topic_id)
|
2018-08-22 19:13:58 +08:00
|
|
|
|
2020-03-13 08:04:15 +08:00
|
|
|
# guards against deleted posts and topics
|
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_post_deleted]) if post.blank?
|
2019-07-25 20:04:00 +08:00
|
|
|
|
2018-07-18 10:21:54 +08:00
|
|
|
topic = post.topic
|
2020-03-13 08:04:15 +08:00
|
|
|
return skip(SkippedEmailLog.reason_types[:sender_topic_deleted]) if topic.blank?
|
|
|
|
|
|
|
|
add_attachments(post)
|
2016-04-07 03:04:30 +08:00
|
|
|
|
2021-12-06 08:34:39 +08:00
|
|
|
topic_message_id = Email::MessageIdService.generate_for_topic(topic, use_incoming_email_if_present: true)
|
|
|
|
post_message_id = Email::MessageIdService.generate_for_post(post, use_incoming_email_if_present: true)
|
2016-11-26 06:25:39 +08:00
|
|
|
|
|
|
|
referenced_posts = Post.includes(:incoming_email)
|
2019-04-10 13:56:44 +08:00
|
|
|
.joins("INNER JOIN post_replies ON post_replies.post_id = posts.id ")
|
2020-01-18 00:24:49 +08:00
|
|
|
.where("post_replies.reply_post_id = ?", post_id)
|
2016-11-26 06:25:39 +08:00
|
|
|
.order(id: :desc)
|
|
|
|
|
2018-09-04 10:16:21 +08:00
|
|
|
referenced_post_message_ids = referenced_posts.map do |referenced_post|
|
|
|
|
if referenced_post.incoming_email&.message_id.present?
|
|
|
|
"<#{referenced_post.incoming_email.message_id}>"
|
2016-11-26 06:25:39 +08:00
|
|
|
else
|
2018-09-04 10:16:21 +08:00
|
|
|
if referenced_post.post_number == 1
|
2021-12-06 08:34:39 +08:00
|
|
|
Email::MessageIdService.generate_for_topic(topic)
|
2017-02-02 06:02:41 +08:00
|
|
|
else
|
2021-12-06 08:34:39 +08:00
|
|
|
Email::MessageIdService.generate_for_post(referenced_post)
|
2017-02-02 06:02:41 +08:00
|
|
|
end
|
2016-11-26 06:25:39 +08:00
|
|
|
end
|
|
|
|
end
|
2014-06-14 06:42:14 +08:00
|
|
|
|
2017-02-02 06:02:41 +08:00
|
|
|
# https://www.ietf.org/rfc/rfc2822.txt
|
|
|
|
if post.post_number == 1
|
|
|
|
@message.header['Message-ID'] = topic_message_id
|
|
|
|
else
|
|
|
|
@message.header['Message-ID'] = post_message_id
|
|
|
|
@message.header['In-Reply-To'] = referenced_post_message_ids[0] || topic_message_id
|
2018-02-22 17:48:23 +08:00
|
|
|
@message.header['References'] = [topic_message_id, referenced_post_message_ids].flatten.compact.uniq
|
2016-11-26 06:25:39 +08:00
|
|
|
end
|
2014-10-09 02:09:21 +08:00
|
|
|
|
2017-02-02 06:02:41 +08:00
|
|
|
# https://www.ietf.org/rfc/rfc2919.txt
|
2018-08-22 19:13:58 +08:00
|
|
|
if topic&.category && !topic.category.uncategorized?
|
2018-05-03 22:39:25 +08:00
|
|
|
list_id = "#{SiteSetting.title} | #{topic.category.name} <#{topic.category.name.downcase.tr(' ', '-')}.#{host}>"
|
2014-10-09 02:09:21 +08:00
|
|
|
|
|
|
|
# subcategory case
|
|
|
|
if !topic.category.parent_category_id.nil?
|
|
|
|
parent_category_name = Category.find_by(id: topic.category.parent_category_id).name
|
2018-05-05 07:51:53 +08:00
|
|
|
list_id = "#{SiteSetting.title} | #{parent_category_name} #{topic.category.name} <#{topic.category.name.downcase.tr(' ', '-')}.#{parent_category_name.downcase.tr(' ', '-')}.#{host}>"
|
2014-10-09 02:09:21 +08:00
|
|
|
end
|
|
|
|
else
|
2018-05-03 22:39:25 +08:00
|
|
|
list_id = "#{SiteSetting.title} <#{host}>"
|
2014-10-09 02:09:21 +08:00
|
|
|
end
|
2014-10-09 03:57:30 +08:00
|
|
|
|
2021-06-18 12:36:17 +08:00
|
|
|
# When we are emailing people from a group inbox, we are having a PM
|
|
|
|
# conversation with them, as a support account would. In this case
|
|
|
|
# mailing list headers do not make sense. It is not like a forum topic
|
|
|
|
# where you may have tens or hundreds of participants -- it is a
|
|
|
|
# conversation between the group and a small handful of people
|
|
|
|
# directly contacting the group, often just one person.
|
|
|
|
if !smtp_group_id
|
|
|
|
|
|
|
|
# https://www.ietf.org/rfc/rfc3834.txt
|
|
|
|
@message.header['Precedence'] = 'list'
|
|
|
|
@message.header['List-ID'] = list_id
|
|
|
|
|
|
|
|
if topic
|
|
|
|
if SiteSetting.private_email?
|
|
|
|
@message.header['List-Archive'] = "#{Discourse.base_url}#{topic.slugless_url}"
|
|
|
|
else
|
|
|
|
@message.header['List-Archive'] = topic.url
|
|
|
|
end
|
2017-04-25 03:26:06 +08:00
|
|
|
end
|
|
|
|
end
|
2014-06-14 06:49:11 +08:00
|
|
|
end
|
|
|
|
|
2019-03-27 00:59:56 +08:00
|
|
|
if Email::Sender.bounceable_reply_address?
|
2016-04-18 15:13:41 +08:00
|
|
|
email_log.bounce_key = SecureRandom.hex
|
|
|
|
|
|
|
|
# WARNING: RFC claims you can not set the Return Path header, this is 100% correct
|
|
|
|
# however Rails has special handling for this header and ends up using this value
|
|
|
|
# as the Envelope From address so stuff works as expected
|
2019-03-27 00:59:56 +08:00
|
|
|
@message.header[:return_path] = Email::Sender.bounce_address(email_log.bounce_key)
|
2016-04-18 15:13:41 +08:00
|
|
|
end
|
|
|
|
|
2013-07-08 23:48:40 +08:00
|
|
|
email_log.post_id = post_id if post_id.present?
|
2021-06-22 06:32:01 +08:00
|
|
|
email_log.topic_id = topic_id if topic_id.present?
|
2013-06-13 22:56:16 +08:00
|
|
|
|
2013-06-25 23:35:26 +08:00
|
|
|
# Remove headers we don't need anymore
|
2018-08-22 19:13:58 +08:00
|
|
|
@message.header['X-Discourse-Topic-Id'] = nil if topic_id.present?
|
|
|
|
@message.header['X-Discourse-Post-Id'] = nil if post_id.present?
|
2018-07-18 16:28:44 +08:00
|
|
|
|
|
|
|
if reply_key.present?
|
2021-10-12 01:57:42 +08:00
|
|
|
@message.header['Reply-To'] = header_value('Reply-To').gsub!("%{reply_key}", reply_key)
|
2018-07-18 16:28:44 +08:00
|
|
|
@message.header[Email::MessageBuilder::ALLOW_REPLY_BY_EMAIL_HEADER] = nil
|
|
|
|
end
|
2013-06-25 23:35:26 +08:00
|
|
|
|
2021-10-12 01:57:42 +08:00
|
|
|
MessageBuilder.custom_headers(SiteSetting.email_custom_headers).each do |key, _|
|
|
|
|
value = header_value(key)
|
2021-11-24 08:54:01 +08:00
|
|
|
|
|
|
|
# Remove Auto-Submitted header for group private message emails, it does
|
|
|
|
# not make sense there and may hurt deliverability.
|
|
|
|
#
|
|
|
|
# From https://www.iana.org/assignments/auto-submitted-keywords/auto-submitted-keywords.xhtml:
|
|
|
|
#
|
|
|
|
# > Indicates that a message was generated by an automatic process, and is not a direct response to another message.
|
|
|
|
if key.downcase == "auto-submitted" && smtp_group_id
|
|
|
|
@message.header[key] = nil
|
|
|
|
end
|
|
|
|
|
|
|
|
# Replace reply_key in custom headers or remove
|
2021-10-12 01:57:42 +08:00
|
|
|
if value&.include?('%{reply_key}')
|
|
|
|
# Delete old header first or else the same header will be added twice
|
|
|
|
@message.header[key] = nil
|
|
|
|
if reply_key.present?
|
|
|
|
@message.header[key] = value.gsub!('%{reply_key}', reply_key)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-10-28 01:35:50 +08:00
|
|
|
# pass the original message_id when using mailjet/mandrill/sparkpost
|
2016-06-13 18:31:01 +08:00
|
|
|
case ActionMailer::Base.smtp_settings[:address]
|
|
|
|
when /\.mailjet\.com/
|
2016-06-07 01:47:45 +08:00
|
|
|
@message.header['X-MJ-CustomID'] = @message.message_id
|
2016-06-13 18:31:01 +08:00
|
|
|
when "smtp.mandrillapp.com"
|
2016-10-30 18:38:55 +08:00
|
|
|
merge_json_x_header('X-MC-Metadata', message_id: @message.message_id)
|
2016-10-28 01:35:50 +08:00
|
|
|
when "smtp.sparkpostmail.com"
|
2016-10-30 18:38:55 +08:00
|
|
|
merge_json_x_header('X-MSYS-API', metadata: { message_id: @message.message_id })
|
2016-06-07 01:47:45 +08:00
|
|
|
end
|
|
|
|
|
2020-09-10 07:50:16 +08:00
|
|
|
# Parse the HTML again so we can make any final changes before
|
|
|
|
# sending
|
|
|
|
style = Email::Styles.new(@message.html_part.body.to_s)
|
|
|
|
|
2014-09-13 13:26:31 +08:00
|
|
|
# Suppress images from short emails
|
2016-01-29 23:49:49 +08:00
|
|
|
if SiteSetting.strip_images_from_short_emails &&
|
2016-05-10 02:37:33 +08:00
|
|
|
@message.html_part.body.to_s.bytesize <= SiteSetting.short_email_length &&
|
|
|
|
@message.html_part.body =~ /<img[^>]+>/
|
2020-09-10 07:50:16 +08:00
|
|
|
style.strip_avatars_and_emojis
|
|
|
|
end
|
|
|
|
|
|
|
|
# Embeds any of the secure images that have been attached inline,
|
|
|
|
# removing the redaction notice.
|
|
|
|
if SiteSetting.secure_media_allow_embed_images_in_emails
|
2021-08-03 23:58:34 +08:00
|
|
|
style.inline_secure_images(@message.attachments, @message_attachments_index)
|
2014-09-13 13:26:31 +08:00
|
|
|
end
|
|
|
|
|
2020-09-10 07:50:16 +08:00
|
|
|
@message.html_part.body = style.to_s
|
|
|
|
|
2016-06-02 03:48:06 +08:00
|
|
|
email_log.message_id = @message.message_id
|
|
|
|
|
2021-06-15 09:29:46 +08:00
|
|
|
# Log when a message is being sent from a group SMTP address, so we
|
|
|
|
# can debug deliverability issues.
|
2021-06-22 06:32:01 +08:00
|
|
|
if smtp_group_id
|
|
|
|
email_log.smtp_group_id = smtp_group_id
|
|
|
|
|
|
|
|
# Store contents of all outgoing emails using group SMTP
|
|
|
|
# for greater visibility and debugging. If the size of this
|
|
|
|
# gets out of hand, we should look into a group-level setting
|
|
|
|
# to enable this; size should be kept in check by regular purging
|
|
|
|
# of EmailLog though.
|
|
|
|
email_log.raw = Email::Cleaner.new(@message).execute
|
|
|
|
end
|
2021-06-15 09:29:46 +08:00
|
|
|
|
2020-06-19 00:36:14 +08:00
|
|
|
DiscourseEvent.trigger(:before_email_send, @message, @email_type)
|
|
|
|
|
2014-03-07 23:33:15 +08:00
|
|
|
begin
|
2014-10-15 15:04:47 +08:00
|
|
|
@message.deliver_now
|
2014-03-09 20:06:54 +08:00
|
|
|
rescue *SMTP_CLIENT_ERRORS => e
|
2018-07-24 12:55:43 +08:00
|
|
|
return skip(SkippedEmailLog.reason_types[:custom], custom_reason: e.message)
|
2014-03-07 23:33:15 +08:00
|
|
|
end
|
2013-06-25 23:35:26 +08:00
|
|
|
|
2013-06-13 22:56:16 +08:00
|
|
|
email_log.save!
|
|
|
|
email_log
|
2013-06-11 03:33:37 +08:00
|
|
|
end
|
|
|
|
|
2020-10-08 11:52:17 +08:00
|
|
|
def find_user
|
|
|
|
return @user if @user
|
|
|
|
User.find_by_email(to_address)
|
|
|
|
end
|
|
|
|
|
2014-02-15 02:06:21 +08:00
|
|
|
def to_address
|
|
|
|
@to_address ||= begin
|
2016-02-16 00:53:07 +08:00
|
|
|
to = @message.try(:to)
|
2016-01-29 23:49:49 +08:00
|
|
|
to = to.first if Array === to
|
|
|
|
to.presence || "no_email_found"
|
2014-02-15 02:06:21 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-06-22 06:32:01 +08:00
|
|
|
def cc_addresses
|
|
|
|
@cc_addresses ||= begin
|
|
|
|
@message.try(:cc) || []
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-08 23:48:40 +08:00
|
|
|
def self.host_for(base_url)
|
2013-07-03 02:13:46 +08:00
|
|
|
host = "localhost"
|
|
|
|
if base_url.present?
|
|
|
|
begin
|
|
|
|
uri = URI.parse(base_url)
|
|
|
|
host = uri.host.downcase if uri.host.present?
|
2018-08-14 18:23:32 +08:00
|
|
|
rescue URI::Error
|
2013-07-03 02:13:46 +08:00
|
|
|
end
|
|
|
|
end
|
2013-07-08 23:48:40 +08:00
|
|
|
host
|
|
|
|
end
|
2013-07-03 02:13:46 +08:00
|
|
|
|
2013-06-14 06:11:10 +08:00
|
|
|
private
|
|
|
|
|
2019-07-25 20:04:00 +08:00
|
|
|
def add_attachments(post)
|
|
|
|
max_email_size = SiteSetting.email_total_attachment_size_limit_kb.kilobytes
|
|
|
|
return if max_email_size == 0
|
|
|
|
|
|
|
|
email_size = 0
|
2020-11-02 07:52:21 +08:00
|
|
|
post.uploads.each do |original_upload|
|
|
|
|
optimized_1X = original_upload.optimized_images.first
|
|
|
|
|
|
|
|
if FileHelper.is_supported_image?(original_upload.original_filename) &&
|
|
|
|
!should_attach_image?(original_upload, optimized_1X)
|
2020-09-10 07:50:16 +08:00
|
|
|
next
|
|
|
|
end
|
|
|
|
|
2020-11-02 07:52:21 +08:00
|
|
|
attached_upload = optimized_1X || original_upload
|
2020-11-23 09:16:08 +08:00
|
|
|
next if email_size + attached_upload.filesize > max_email_size
|
2019-07-25 20:04:00 +08:00
|
|
|
|
|
|
|
begin
|
2020-11-02 07:52:21 +08:00
|
|
|
path = if attached_upload.local?
|
|
|
|
Discourse.store.path_for(attached_upload)
|
2019-07-25 20:04:00 +08:00
|
|
|
else
|
2020-11-02 07:52:21 +08:00
|
|
|
Discourse.store.download(attached_upload).path
|
2019-07-25 20:04:00 +08:00
|
|
|
end
|
|
|
|
|
2021-08-03 23:58:34 +08:00
|
|
|
@message_attachments_index[original_upload.sha1] = @message.attachments.size
|
2020-11-02 07:52:21 +08:00
|
|
|
@message.attachments[original_upload.original_filename] = File.read(path)
|
2019-07-25 20:04:00 +08:00
|
|
|
email_size += File.size(path)
|
|
|
|
rescue => e
|
|
|
|
Discourse.warn_exception(
|
|
|
|
e,
|
|
|
|
message: "Failed to attach file to email",
|
|
|
|
env: {
|
|
|
|
post_id: post.id,
|
2020-11-02 07:52:21 +08:00
|
|
|
upload_id: original_upload.id,
|
|
|
|
filename: original_upload.original_filename
|
2019-07-25 20:04:00 +08:00
|
|
|
}
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
2020-03-12 18:31:16 +08:00
|
|
|
|
|
|
|
fix_parts_after_attachments!
|
|
|
|
end
|
|
|
|
|
2020-11-02 07:52:21 +08:00
|
|
|
def should_attach_image?(upload, optimized_1X = nil)
|
2020-09-10 07:50:16 +08:00
|
|
|
return if !SiteSetting.secure_media_allow_embed_images_in_emails || !upload.secure?
|
2020-11-02 07:52:21 +08:00
|
|
|
return if (optimized_1X&.filesize || upload.filesize) > SiteSetting.secure_media_max_email_embed_image_size_kb.kilobytes
|
2020-09-10 07:50:16 +08:00
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2020-03-12 18:31:16 +08:00
|
|
|
#
|
|
|
|
# Two behaviors in the mail gem collide:
|
|
|
|
#
|
|
|
|
# 1. Attachments are added as extra parts at the top level,
|
|
|
|
# 2. When there are both text and html parts, the content type is set
|
|
|
|
# to 'multipart/alternative'.
|
|
|
|
#
|
|
|
|
# Since attachments aren't alternative renderings, for emails that contain
|
|
|
|
# attachments and both html and text parts, some coercing is necessary.
|
|
|
|
#
|
|
|
|
# When there are alternative rendering and attachments, this method causes
|
|
|
|
# the top level to be 'multipart/mixed' and puts the html and text parts
|
|
|
|
# into a nested 'multipart/alternative' part.
|
|
|
|
#
|
|
|
|
# Due to mail gem magic, @message.text_part and @message.html_part still
|
|
|
|
# refer to the same objects.
|
|
|
|
#
|
|
|
|
def fix_parts_after_attachments!
|
|
|
|
has_attachments = @message.attachments.present?
|
|
|
|
has_alternative_renderings =
|
|
|
|
@message.html_part.present? && @message.text_part.present?
|
|
|
|
|
|
|
|
if has_attachments && has_alternative_renderings
|
|
|
|
@message.content_type = "multipart/mixed"
|
|
|
|
|
|
|
|
html_part = @message.html_part
|
|
|
|
@message.html_part = nil
|
|
|
|
|
|
|
|
text_part = @message.text_part
|
|
|
|
@message.text_part = nil
|
|
|
|
|
|
|
|
content = Mail::Part.new do
|
|
|
|
content_type "multipart/alternative"
|
|
|
|
|
2020-09-29 12:10:57 +08:00
|
|
|
# we have to re-specify the charset and give the part the decoded body
|
|
|
|
# here otherwise the parts will get encoded with US-ASCII which makes
|
|
|
|
# a bunch of characters not render correctly in the email
|
|
|
|
part content_type: "text/html; charset=utf-8", body: html_part.body.decoded
|
|
|
|
part content_type: "text/plain; charset=utf-8", body: text_part.body.decoded
|
2020-03-12 18:31:16 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
@message.parts.unshift(content)
|
|
|
|
end
|
2019-07-25 20:04:00 +08:00
|
|
|
end
|
|
|
|
|
2013-07-08 23:48:40 +08:00
|
|
|
def header_value(name)
|
2013-06-14 06:11:10 +08:00
|
|
|
header = @message.header[name]
|
2013-07-08 23:48:40 +08:00
|
|
|
return nil unless header
|
|
|
|
header.value
|
2013-06-14 06:11:10 +08:00
|
|
|
end
|
|
|
|
|
2018-07-24 12:55:43 +08:00
|
|
|
def skip(reason_type, custom_reason: nil)
|
|
|
|
attributes = {
|
2016-01-29 23:49:49 +08:00
|
|
|
email_type: @email_type,
|
|
|
|
to_address: to_address,
|
2018-07-24 12:55:43 +08:00
|
|
|
user_id: @user&.id,
|
|
|
|
reason_type: reason_type
|
|
|
|
}
|
|
|
|
|
|
|
|
attributes[:custom_reason] = custom_reason if custom_reason
|
|
|
|
SkippedEmailLog.create!(attributes)
|
2014-02-15 02:06:21 +08:00
|
|
|
end
|
|
|
|
|
2016-10-30 18:38:55 +08:00
|
|
|
def merge_json_x_header(name, value)
|
2016-11-03 09:26:12 +08:00
|
|
|
data = JSON.parse(@message.header[name].to_s) rescue nil
|
|
|
|
data ||= {}
|
|
|
|
data.merge!(value)
|
|
|
|
# /!\ @message.header is not a standard ruby hash.
|
|
|
|
# It can have multiple values attached to the same key...
|
|
|
|
# In order to remove all the previous keys, we have to "nil" it.
|
|
|
|
# But for "nil" to work, there must already be a key...
|
|
|
|
@message.header[name] = ""
|
2016-10-30 18:38:55 +08:00
|
|
|
@message.header[name] = nil
|
2016-11-03 09:26:12 +08:00
|
|
|
@message.header[name] = data.to_json
|
2016-10-30 18:38:55 +08:00
|
|
|
end
|
|
|
|
|
2021-10-12 01:57:42 +08:00
|
|
|
def get_reply_key(post_id, user_id)
|
2021-06-28 06:55:13 +08:00
|
|
|
# ALLOW_REPLY_BY_EMAIL_HEADER is only added if we are _not_ sending
|
|
|
|
# via group SMTP and if reply by email site settings are configured
|
2020-10-22 08:49:08 +08:00
|
|
|
return if !user_id || !post_id || !header_value(Email::MessageBuilder::ALLOW_REPLY_BY_EMAIL_HEADER).present?
|
2018-07-18 16:28:44 +08:00
|
|
|
|
2018-08-21 08:59:18 +08:00
|
|
|
# use safe variant here cause we tend to see concurrency issue
|
|
|
|
reply_key = PostReplyKey.find_or_create_by_safe!(
|
2018-07-18 16:28:44 +08:00
|
|
|
post_id: post_id,
|
|
|
|
user_id: user_id
|
|
|
|
).reply_key
|
|
|
|
end
|
|
|
|
|
2019-03-27 00:59:56 +08:00
|
|
|
def self.bounceable_reply_address?
|
|
|
|
SiteSetting.reply_by_email_address.present? && SiteSetting.reply_by_email_address["+"]
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.bounce_address(bounce_key)
|
|
|
|
SiteSetting.reply_by_email_address.sub("%{reply_key}", "verp-#{bounce_key}")
|
|
|
|
end
|
2013-06-11 03:33:37 +08:00
|
|
|
end
|
2013-07-24 15:13:15 +08:00
|
|
|
end
|