1
0
mirror of https://github.com/invoiceninja/invoiceninja.git synced 2024-11-15 15:42:51 +01:00
invoiceninja/app/Services/InboundMail/InboundMailEngine.php

269 lines
10 KiB
PHP
Raw Normal View History

<?php
/**
* Invoice Ninja (https://invoiceninja.com).
*
* @link https://github.com/invoiceninja/invoiceninja source repository
*
* @copyright Copyright (c) 2023. Invoice Ninja LLC (https://invoiceninja.com)
*
* @license https://www.elastic.co/licensing/elastic-license
*/
namespace App\Services\InboundMail;
use App\Events\Expense\ExpenseWasCreated;
use App\Factory\ExpenseFactory;
use App\Jobs\Util\SystemLogger;
use App\Libraries\MultiDB;
use App\Models\ClientContact;
use App\Models\Company;
use App\Models\SystemLog;
use App\Models\Vendor;
use App\Models\VendorContact;
use App\Services\InboundMail\InboundMail;
use App\Utils\Ninja;
use App\Utils\TempFile;
use App\Utils\Traits\GeneratesCounter;
use App\Utils\Traits\SavesDocuments;
use App\Utils\Traits\MakesHash;
2023-12-18 17:21:15 +01:00
use Cache;
use Illuminate\Queue\SerializesModels;
2024-03-19 07:39:35 +01:00
use Log;
class InboundMailEngine
{
2024-03-18 08:04:54 +01:00
use SerializesModels, MakesHash;
use GeneratesCounter, SavesDocuments;
private ?Company $company;
2023-12-18 17:21:15 +01:00
private ?bool $isUnknownRecipent = null;
private array $globalBlacklistDomains = [];
private array $globalBlacklistSenders = [];
public function __construct()
{
}
/**
* if there is not a company with an matching mailbox, we only do monitoring
2023-12-18 17:21:15 +01:00
* reuse this method to add more mail-parsing behaviors
*/
public function handle(InboundMail $email)
{
if ($this->isInvalidOrBlocked($email->from, $email->to))
2023-12-18 17:21:15 +01:00
return;
2024-03-18 08:04:54 +01:00
$isUnknownRecipent = true;
2023-12-18 17:21:15 +01:00
// Expense Mailbox => will create an expense
$company = MultiDB::findAndSetDbByInboundMailbox($email->to);
if ($company) {
$isUnknownRecipent = false;
$this->createExpense($company, $email);
}
$this->saveMeta($email->from, $email->to, $isUnknownRecipent);
}
2023-12-18 17:21:15 +01:00
// SPAM Protection
public function isInvalidOrBlocked(string $from, string $to)
2023-12-18 17:21:15 +01:00
{
// invalid email
if (!filter_var($from, FILTER_VALIDATE_EMAIL)) {
Log::info('E-Mail blocked, because from e-mail has the wrong format: ' . $from);
2023-12-18 17:21:15 +01:00
return true;
}
$parts = explode('@', $from);
2023-12-18 17:21:15 +01:00
$domain = array_pop($parts);
// global blacklist
if (in_array($domain, $this->globalBlacklistDomains)) {
Log::info('E-Mail blocked, because the domain was found on globalBlocklistDomains: ' . $from);
return true;
}
if (in_array($from, $this->globalBlacklistSenders)) {
Log::info('E-Mail blocked, because the email was found on globalBlocklistEmails: ' . $from);
2023-12-18 17:21:15 +01:00
return true;
}
if (Cache::has('inboundMailBlockedSender:' . $from)) { // was marked as blocked before, so we block without any console output
2023-12-18 17:21:15 +01:00
return true;
}
// sender occured in more than 500 emails in the last 12 hours
$senderMailCountTotal = Cache::get('inboundMailSender:' . $from, 0);
2023-12-18 17:21:15 +01:00
if ($senderMailCountTotal >= 5000) {
Log::info('E-Mail blocked permanent, because the sender sended more than ' . $senderMailCountTotal . ' emails in the last 12 hours: ' . $from);
$this->blockSender($from);
$this->saveMeta($from, $to);
2023-12-18 17:21:15 +01:00
return true;
}
if ($senderMailCountTotal >= 1000) {
Log::info('E-Mail blocked, because the sender sended more than ' . $senderMailCountTotal . ' emails in the last 12 hours: ' . $from);
$this->saveMeta($from, $to);
2023-12-18 17:21:15 +01:00
return true;
}
// sender sended more than 50 emails to the wrong mailbox in the last 6 hours
$senderMailCountUnknownRecipent = Cache::get('inboundMailSenderUnknownRecipent:' . $from, 0);
2023-12-18 17:21:15 +01:00
if ($senderMailCountUnknownRecipent >= 50) {
Log::info('E-Mail blocked, because the sender sended more than ' . $senderMailCountUnknownRecipent . ' emails to the wrong mailbox in the last 6 hours: ' . $from);
$this->saveMeta($from, $to);
2023-12-18 17:21:15 +01:00
return true;
}
// wrong recipent occurs in more than 100 emails in the last 12 hours, so the processing is blocked
$mailCountUnknownRecipent = Cache::get('inboundMailUnknownRecipent:' . $to, 0); // @turbo124 maybe use many to save resources in case of spam with multiple to addresses each time
2024-03-18 08:04:54 +01:00
if ($mailCountUnknownRecipent >= 100) {
Log::info('E-Mail blocked, because anyone sended more than ' . $mailCountUnknownRecipent . ' emails to the wrong mailbox in the last 12 hours. Current sender was blocked as well: ' . $from);
$this->blockSender($from);
$this->saveMeta($from, $to);
2024-03-18 08:04:54 +01:00
return true;
2023-12-18 17:21:15 +01:00
}
return false;
}
public function blockSender(string $from)
2023-12-18 17:21:15 +01:00
{
Cache::add('inboundMailBlockedSender:' . $from, true, now()->addHours(12));
2023-12-18 17:21:15 +01:00
2023-12-18 17:24:59 +01:00
// TODO: ignore, when known sender (for heavy email-usage mostly on isHosted())
2023-12-18 17:21:15 +01:00
// TODO: handle external blocking
}
public function saveMeta(string $from, string $to, bool $isUnknownRecipent = false)
2023-12-18 17:21:15 +01:00
{
// save cache
Cache::add('inboundMailSender:' . $from, 0, now()->addHours(12));
Cache::increment('inboundMailSender:' . $from);
2023-12-18 17:21:15 +01:00
if ($isUnknownRecipent) {
Cache::add('inboundMailSenderUnknownRecipent:' . $from, 0, now()->addHours(6));
Cache::increment('inboundMailSenderUnknownRecipent:' . $from); // we save the sender, to may block him
2023-12-18 17:21:15 +01:00
Cache::add('inboundMailUnknownRecipent:' . $to, 0, now()->addHours(12));
Cache::increment('inboundMailUnknownRecipent:' . $to); // we save the sender, to may block him
2023-12-18 17:21:15 +01:00
}
}
2023-12-18 17:24:59 +01:00
// MAIN-PROCESSORS
protected function createExpense(Company $company, InboundMail $email)
2023-12-18 17:24:59 +01:00
{
// Skipping executions: will not result in not saving Metadata to prevent usage of these conditions, to spam
if (!($company?->inbound_mailbox_active ?: false)) {
$this->logBlocked($company, 'mailbox not active for this company. from: ' . $email->from);
return;
}
if (!$this->validateExpenseSender($company, $email)) {
$this->logBlocked($company, 'invalid sender of an ingest email for this company. from: ' . $email->from);
2023-12-18 17:24:59 +01:00
return;
}
if (sizeOf($email->documents) == 0) {
$this->logBlocked($company, 'email does not contain any attachments and is likly not an expense. from: ' . $email->from);
return;
}
2023-12-18 17:24:59 +01:00
// create expense
$expense = ExpenseFactory::create($company->id, $company->owner()->id);
2023-12-18 17:24:59 +01:00
$expense->public_notes = $email->subject;
$expense->private_notes = $email->text_body;
$expense->date = $email->date;
2023-12-18 17:24:59 +01:00
// handle vendor assignment
$expense_vendor = $this->getVendor($company, $email);
2023-12-18 17:24:59 +01:00
if ($expense_vendor)
$expense->vendor_id = $expense_vendor->id;
// handle documents
$this->processHtmlBodyToDocument($email);
2023-12-18 17:24:59 +01:00
$documents = [];
array_push($documents, ...$email->documents);
if ($email->body_document !== null)
array_push($documents, $email->body_document);
2023-12-18 17:24:59 +01:00
$expense->saveQuietly();
2024-03-19 07:39:35 +01:00
$this->saveDocuments($documents, $expense);
event(new ExpenseWasCreated($expense, $expense->company, Ninja::eventVars(null))); // @turbo124 please check, I copied from API-Controller
event('eloquent.created: App\Models\Expense', $expense); // @turbo124 please check, I copied from API-Controller
2023-12-18 17:24:59 +01:00
}
2023-12-18 17:21:15 +01:00
// HELPERS
private function processHtmlBodyToDocument(InboundMail $email)
{
if ($email->body !== null)
$email->body_document = TempFile::UploadedFileFromRaw($email->body, "E-Mail.html", "text/html");
}
private function validateExpenseSender(Company $company, InboundMail $email)
{
$parts = explode('@', $email->from);
$domain = array_pop($parts);
// whitelists
$email_whitelist = explode(",", $company->inbound_mailbox_whitelist_senders);
if (in_array($email->from, $email_whitelist))
return true;
$domain_whitelist = explode(",", $company->inbound_mailbox_whitelist_domains);
if (in_array($domain, $domain_whitelist))
return true;
$email_blacklist = explode(",", $company->inbound_mailbox_blacklist_senders);
if (in_array($email->from, $email_blacklist))
2024-03-19 07:55:55 +01:00
return false;
$domain_blacklist = explode(",", $company->inbound_mailbox_blacklist_domains);
2024-03-19 07:55:55 +01:00
if (in_array($domain, $domain_blacklist))
return false;
// allow unknown
if ($company->inbound_mailbox_allow_unknown)
return true;
// own users
if ($company->inbound_mailbox_allow_company_users && $company->users()->where("email", $email->from)->exists())
return true;
2024-03-25 07:08:41 +01:00
// from vendors
2024-04-03 08:20:36 +02:00
if ($company->inbound_mailbox_allow_vendors && VendorContact::where("company_id", $company->id)->where("email", $email->from)->exists())
return true;
2024-03-25 07:08:41 +01:00
// from clients
2024-04-03 08:20:36 +02:00
if ($company->inbound_mailbox_allow_clients && ClientContact::where("company_id", $company->id)->where("email", $email->from)->exists())
return true;
// denie
return false;
}
private function getClient(Company $company, InboundMail $email)
{
$clientContact = ClientContact::where("company_id", $company->id)->where("email", $email->from)->first();
2024-04-03 15:01:57 +02:00
if (!$clientContact)
return null;
2024-04-03 15:01:57 +02:00
return $clientContact->client();
}
private function getVendor(Company $company, InboundMail $email)
{
2024-04-03 08:33:40 +02:00
$vendorContact = VendorContact::where("company_id", $company->id)->where("email", $email->from)->first();
2024-04-03 15:01:57 +02:00
if (!$vendorContact)
return null;
2024-04-03 15:01:57 +02:00
return $vendorContact->vendor();
}
private function logBlocked(Company $company, string $data)
{
Log::info("[InboundMailEngine][company:" . $company->id . "] " . $data);
(
new SystemLogger(
$data,
SystemLog::CATEGORY_MAIL,
SystemLog::EVENT_INBOUND_MAIL_BLOCKED,
SystemLog::TYPE_CUSTOM,
null,
$company
)
)->handle();
}
}