mistralmail

package module
v0.0.0-...-78c831c Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 18, 2024 License: MIT Imports: 25 Imported by: 0

README

MistralMail

MistralMail will be a production-ready, and easy to setup mail server. It consists of an SMTP server (both MSA and MTA) and an IMAP server all bundled in one executable (or just in one Docker image) with auto-generated TLS certificates.

⚠️ WIP: MistralMail is far from being production-ready! ⚠️

Usage

Setting up DNS records

MistralMail will not be able to generate TLS certificates without a correct DNS configuration. And of course you also won't be able to receive any emails. (But if you just want to configure it locally you can set TLS_DISABLE to true and skip this section.)

You need the following DNS records:

  • A record imap.yourdomain.com pointing to your MistralMail server ip.
  • A record mx.yourdomain.com pointing to your MistralMail server ip.
  • A record smtp.yourdomain.com pointing to your MistralMail server ip.
  • MX record point to mx.yourdomain.com.
  • SPF record pointing to your SMTP relay provider.
Running the MistralMail server

First you need to copy .env.sample to .env and configure all the needed environment variables.

When using HTTP challenge for TLS: make sure that ports 80 and 443 are opened for the automatic TLS certificate generation via Let's Encrypt.

Then you can run the Go main manually or with Docker.

Go:

source .env
go run cmd/mistralmail/*.go

Docker:

Everything needed is put into the docker-compose.yml file. If you don't want to build the image yourself you can use the prebuilt one present at denbeke/mistralmail.

docker-compose up mistralmail

Now you can create a user with the MistralMail CLI.

MistralMail exposes the following ports:

  • 25 for all incoming SMTP emails (MTA)
  • 587 for all outing SMTP emails (MSA)
  • 143 for IMAP
  • (443 & 80 for Let's Encrypt, when not using DNS challenge)
  • 9000 for the metrics
  • 8080 for the api & web server
Environment Variables
ENV Default value Description
HOSTNAME Hostname of the MistralMail mail server
SMTP_ADDRESS_INCOMING :25 Bind address for the listener of incoming email.
SMTP_ADDRESS_OUTGOING :587 Bind address for the listener of outgoing email.
IMAP_ADDRESS :143 Bind address for the listener of IMAP.
DATABASE_URL sqlite:test.db Database connection url.
Example using Postgres: postgresql://user:pass@localhost/mydatabase.
It defaults to a local Sqlite database.
SUBDOMAIN_INCOMING mx.{HOSTNAME} Domain for the incoming mail.
SUBDOMAIN_OUTGOING smtp.{HOSTNAME} Domain for the outgoing mail.
SUBDOMAIN_IMAP imap.{HOSTNAME} Domain for IMAP.
SMTP_OUTGOING_MODE RELAY Mode for delivering outgoing mail. Currently only RELAY mode is supported. So this means you have to configure an SMTP relay for sending out emails.
EXTERNAL_RELAY_HOSTNAME Hostname of the SMTP relay.
EXTERNAL_RELAY_PORT Port of the SMTP relay.
EXTERNAL_RELAY_USERNAME Username of the SMTP relay.
EXTERNAL_RELAY_PASSWORD Password of the SMTP relay.
EXTERNAL_RELAY_INSECURE_SKIP_VERIFY false Allow insecure connections to the SMTP relay.
TLS_DISABLE false Disable TLS for the MistralMail server.
TLS_ACME_CHALLENGE Type of the ACME challenge supports two types:
- HTTP: standard HTTP ACME challenge (need to open port 443 and 80 for this)
- DNS: challenge by DNS. Need to provide TLS_ACME_DNS_PROVIDER for this and configure the DNS provider API credentials.
TLS_ACME_EMAIL Email of the Let's Encrypt account.
TLS_ACME_ENDPOINT https://acme-v02.api.letsencrypt.org/directory Let's Encrypt endpoint. By default we use the production endpoint. If you want to test your configuration it is advised to test against staging to avoid rate limits: https://acme-staging-v02.api.letsencrypt.org/directory
TLS_ACME_DNS_PROVIDER DNS provider to be used for Let's Encrypt.
TLS_CERTIFICATES_DIRECTORY ./certificates Directory where TLS certificates are stored.
HTTP_ADDRESS :8080 Address of the webserver that serves the web interface and the API.
SECRET Encryption secret.
SENTRY_DSN Sentry DNS if you want to log errors to Sentry.
LOG_FULL_QUERIES false Log all queries with their parameters.
SPAM_CHECK_ENABLE false Enable the very basic spam check. Note that it sends all incoming messages to the Postmark Spam Check API.
METRICS_ADDRESS :9000 Prometheus metrics address.
Using the MistralMail Web UI

MistralMail comes with a basic web ui http://localhost:8080. At the moment it supports nothing more than basic user management and basic statistics.

mistralmail-web-ui

Using the MistralMail command line interface

You can use the MistralMail command line interface with Go or with Docker:

go run cmd/mistralmail-cli/*.go

or

docker-compose run mistralmail mistralmail-cli

Currently the CLI contains the following commands:

  • create-user: to create a new user.

  • reset-password to reset the password of a user.

Configuring your mail client

IMAP:

  • Server address: imap.yourdomain.com

  • Username: your email address

  • Port: 143

  • Security: STARTTLS

  • Authentication: password

SMTP:

  • Server address: smtp.yourdomain.com

  • Username: your email address

  • Port: 587

  • Security: STARTTLS

  • Authentication: password

Now you're all good to go!

Development

We use go work for updating files across multiple repo's:

go work init
go work use smtp
go work use imap-backend

Current state of MistralMail

SMTP server

The SMTP server is completely custom written and can be found here: mistralmail/smtp. It was written quite a while ago but it seems robust enough for now.

For outgoing emails we currently only support using an external relay like Mailgun or Sendgrid since we don't want to put too much time into debugging an MSA.

IMAP

For IMAP we wrote a SQL backend behind go-imap. It supports MySQL, Postgres and Sqlite. (Currently only Sqlite has actually been tested.)

This backend is very experimental and surely contains a lot of bug. The backend is also implemented in a very non-performant way. So don't expect that MistralMail will be able to handle large inboxes at its current state.

We dump the complete emails in the database at this moment. In the future we would like to add support for object storage for the actual mail bodies. But that's nothing for the near future.

Webmail

Currently there are no concrete plans to implement a webmail. But wouldn't it be nice to have it someday?

Web management

Instead of configuring everything via a CLI, it's also possible to use the very basic web ui. But this is still very basic.

SPAM

Another feature we are also not working on currently is anti-spam. Only SPF is checked at the moment. But nothing else.
A very basic X-Spam-Score header can be enabled by setting SPAM_CHECK_ENABLE to true. It is disabled by default because it sends the incoming messages to the Postmark Spam Check API.

Acknowledgements

Authors

Mathias Beke Timo Truyts

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func Serve

func Serve(config *Config)

Serve runs MistralMail

Types

type AcmeChallenge

type AcmeChallenge string

AcmeChallenge denotes the types of Let's Encrypt challenges

const (
	// AcmeChallengeHTTP is the standard HTTP-01 or TLS-ALPN-01 challenge.
	AcmeChallengeHTTP AcmeChallenge = "HTTP"
	// AcmeChallengeDNS is the DNS-01 challenge.
	AcmeChallengeDNS AcmeChallenge = "DNS"
)

type Config

type Config struct {
	Hostname            string
	SubDomainIncoming   string
	SMTPAddressIncoming string
	SubDomainOutgoing   string
	SMTPAddressOutgoing string
	SMTPOutgoingMode    SMTPOutgoingMode
	SubDomainIMAP       string
	IMAPAddress         string
	HTTPAddress         string
	DatabaseURL         string
	Secret              string
	MetricsAddress      string
	SentryDSN           string
	LogFullQueries      bool
	EnableSpamCheck     bool

	DisableTLS               bool
	TLSCertificatesDirectory string
	TLSCertificateFile       string
	TLSPrivateKeyFile        string
	AcmeChallenge            AcmeChallenge
	AcmeEndpoint             string
	AcmeEmail                string
	AcmeDNSProvider          string

	ExternalRelayHostname           string
	ExternalRelayPort               int
	ExternalRelayUsername           string
	ExternalRelayPassword           string
	ExternalRelayInsecureSkipVerify bool
}

Config contains all the config for serving MistralMail

func BuildConfigFromEnv

func BuildConfigFromEnv() (*Config, error)

BuildConfigFromEnv populates a MistralMail config from env variables

func (*Config) GenerateIMAPBackendConfig

func (config *Config) GenerateIMAPBackendConfig() *imap.Config

GenerateIMAPBackendConfig generates the config object for the IMAP backend

func (*Config) GenerateMSAConfig

func (config *Config) GenerateMSAConfig() *server.Config

GenerateMSAConfig generates the SMTP config for the MSA

func (*Config) GenerateMTAConfig

func (config *Config) GenerateMTAConfig() *server.Config

GenerateMTAConfig generates the SMTP config for the MTA

func (*Config) Validate

func (config *Config) Validate() error

Validate validates whether all config is set and valid

type SMTPOutgoingMode

type SMTPOutgoingMode string

SMTPOutgoingMode denotes the types of SMTP MSA modes.

const (
	// SMTPOutgoingModeRelay is the MSA Relay mode
	SMTPOutgoingModeRelay SMTPOutgoingMode = "RELAY"
)

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL