-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathapp.py
490 lines (455 loc) · 23.6 KB
/
app.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
import json
import os
import random
import requests
import logging
import sqlite3
from datetime import datetime, timedelta, timezone
from pathlib import Path
import re
import atexit
from flask import Flask, jsonify, request
from dotenv import load_dotenv
from apscheduler.schedulers.background import BackgroundScheduler
from flask_limiter import Limiter # Added
from flask_limiter.util import get_remote_address # Added
load_dotenv()
app = Flask(__name__)
logging.basicConfig(level=logging.INFO, format='%(asctime)s - %(levelname)s - %(message)s')
logger = app.logger
# --- Rate Limiting Setup ---
limiter = Limiter(
get_remote_address,
app=app,
default_limits=[os.getenv("RATE_LIMIT_DEFAULT", "60 per minute")],
storage_uri="memory://",
strategy="fixed-window"
)
DATABASE_PATH = '/app/data/emails.db'
WORDS = [
"apple", "banana", "cherry", "date", "elderberry", "fig", "grape", "honeydew",
"kiwi", "lemon", "mango", "nectarine", "orange", "papaya", "quince", "raspberry",
"strawberry", "tangerine", "ugli", "vanilla", "watermelon", "xigua", "yam", "zucchini",
"alpha", "bravo", "charlie", "delta", "echo", "foxtrot", "golf", "hotel",
"india", "juliett", "kilo", "lima", "mike", "november", "oscar", "papa",
"quebec", "romeo", "sierra", "tango", "uniform", "victor", "whiskey", "xray",
"yankee", "zulu", "red", "blue", "green", "yellow", "purple", "silver", "gold"
]
RULE_NAME_PREFIX = "temp_email_api:"
# Custom Exception for expiry errors
class InvalidExpiryError(ValueError):
pass
# --- Database Setup ---
def init_db():
try:
db_path_obj = Path(DATABASE_PATH)
db_path_obj.parent.mkdir(parents=True, exist_ok=True)
conn = sqlite3.connect(DATABASE_PATH)
cursor = conn.cursor()
cursor.execute('''
CREATE TABLE IF NOT EXISTS temporary_emails (
email TEXT PRIMARY KEY,
created_at TEXT NOT NULL,
expires_at TEXT NOT NULL
)
''')
cursor.execute('''
CREATE INDEX IF NOT EXISTS idx_expires_at ON temporary_emails (expires_at)
''')
conn.commit()
conn.close()
logger.info(f"Database initialized successfully at internal path {DATABASE_PATH}")
except Exception as e:
logger.exception(f"CRITICAL: Failed to initialize database at {DATABASE_PATH}: {e}")
raise
# --- Helper Functions ---
def parse_expiry(expiry_str):
"""
Parses expiry string (e.g., '1h', '3d', '30m') into a future datetime object.
Raises InvalidExpiryError if format is wrong or duration is too short (min 10m).
Returns None if no expiry_str is provided.
"""
MINIMUM_EXPIRY_MINUTES = 10 # Keep minimum check here or make it env var too
if not expiry_str: return None
match = re.match(r'^(\d+)([hdm])$', expiry_str.lower())
if not match:
raise InvalidExpiryError(f"Invalid expiry format: '{expiry_str}'. Use format like '10m', '1h', '2d'.")
value, unit = match.groups(); value = int(value)
now = datetime.now(timezone.utc)
if unit == 'h': delta = timedelta(hours=value)
elif unit == 'd': delta = timedelta(days=value)
elif unit == 'm': delta = timedelta(minutes=value)
else: raise InvalidExpiryError("Internal error parsing expiry unit.")
min_delta = timedelta(minutes=MINIMUM_EXPIRY_MINUTES)
if delta < min_delta:
raise InvalidExpiryError(f"Minimum expiry duration is {MINIMUM_EXPIRY_MINUTES} minutes. Requested: '{expiry_str}'")
return now + delta
def add_email_to_db(email, expires_at):
conn = None
try:
conn = sqlite3.connect(DATABASE_PATH)
cursor = conn.cursor()
created_at = datetime.now(timezone.utc).isoformat()
expires_at_iso = expires_at.isoformat() if expires_at else 'never'
cursor.execute('''
INSERT OR REPLACE INTO temporary_emails (email, created_at, expires_at)
VALUES (?, ?, ?)
''', (email, created_at, expires_at_iso))
conn.commit()
logger.info(f"Added/updated email {email} in DB with expiry {expires_at_iso}")
return True
except Exception as e:
logger.exception(f"Failed to add email {email} to database: {e}")
if conn: conn.rollback()
return False
finally:
if conn: conn.close()
def remove_email_from_db(email):
conn = None
try:
conn = sqlite3.connect(DATABASE_PATH)
cursor = conn.cursor()
cursor.execute('DELETE FROM temporary_emails WHERE email = ?', (email,))
deleted_rows = cursor.rowcount
conn.commit()
if deleted_rows > 0: logger.info(f"Removed email {email} from DB.")
else: logger.warning(f"Attempted to remove {email} from DB, but it was not found.")
return True
except Exception as e:
logger.exception(f"Failed to remove email {email} from database: {e}")
if conn: conn.rollback()
return False
finally:
if conn: conn.close()
def generate_random_prefix():
word1 = random.choice(WORDS); word2 = random.choice(WORDS)
random_digits = random.randint(100, 999)
return f"{word1}_{word2}{random_digits}"
def create_cloudflare_route(api_token, zone_id, temp_email, destination_email):
api_endpoint = f"https://api.cloudflare.com/client/v4/zones/{zone_id}/email/routing/rules"
headers = {"Authorization": f"Bearer {api_token}", "Content-Type": "application/json"}
rule_name = f"{RULE_NAME_PREFIX} {temp_email}"
payload = {"actions": [{"type": "forward", "value": [destination_email]}], "matchers": [{"field": "to", "type": "literal", "value": temp_email}], "enabled": True, "name": rule_name, "priority": 50}
try:
logger.info(f"Attempting to create Cloudflare route for {temp_email} with name '{rule_name}'")
response = requests.post(api_endpoint, headers=headers, json=payload)
if response.status_code == 403:
logger.error(f"Cloudflare API Error 403: Check permissions. Response: {response.text}")
return False, f"Permission denied. Check API Token. Details: {response.text}"
if response.status_code == 400:
resp_text = response.text.lower()
if "rule with the same name already exists" in resp_text:
logger.warning(f"Cloudflare API Error 400: Duplicate rule name '{rule_name}'.")
return False, f"A rule with the name '{rule_name}' may already exist."
elif "rule with the same matcher already exists" in resp_text:
logger.warning(f"Cloudflare API Error 400: Duplicate matcher for email '{temp_email}'.")
return False, f"A rule matching email '{temp_email}' may already exist."
response.raise_for_status()
response_data = response.json()
logger.info(f"Cloudflare API response: {response_data}")
if response_data.get("success"):
logger.info(f"Successfully created routing rule for {temp_email}")
return True, None
else:
error_detail = response_data.get('errors', [{'message': 'Unknown Cloudflare API error'}])
logger.error(f"Cloudflare API indicated failure: {error_detail}")
return False, error_detail
except requests.exceptions.RequestException as e:
error_body = "Could not decode error response.";
if hasattr(e, 'response') and e.response is not None:
try: error_body = e.response.text
except Exception: pass
logger.error(f"Error calling Cloudflare API: {e}. Response: {error_body}")
return False, f"Network or API error: {e}"
except Exception as e:
logger.exception(f"An unexpected error occurred during Cloudflare API call for {temp_email}")
return False, f"Unexpected server error: {e}"
def get_all_cloudflare_rules(api_token, zone_id):
all_rules = []; page = 1
api_endpoint = f"https://api.cloudflare.com/client/v4/zones/{zone_id}/email/routing/rules"
headers = {"Authorization": f"Bearer {api_token}"}
while True:
params = {'page': page, 'per_page': 50}
try:
logger.debug(f"Fetching page {page} of Cloudflare email rules")
response = requests.get(api_endpoint, headers=headers, params=params)
response.raise_for_status(); response_data = response.json()
if not response_data.get("success"):
error_detail = response_data.get('errors', 'Unknown Cloudflare API error listing rules')
logger.error(f"Cloudflare API failed on list (page {page}): {error_detail}")
return None, error_detail
rules_on_page = response_data.get("result", [])
if not rules_on_page: break
all_rules.extend(rules_on_page)
result_info = response_data.get("result_info", {})
total_pages = result_info.get("total_pages", 1)
if page >= total_pages: break
page += 1
except requests.exceptions.RequestException as e:
error_body = "Could not decode list response."
if hasattr(e, 'response') and e.response is not None:
try: error_body = e.response.text
except Exception: pass
logger.error(f"Error listing Cloudflare rules (page {page}): {e}. Response: {error_body}")
return None, f"Network or API error during list: {e}"
except Exception as e:
logger.exception(f"Unexpected error listing Cloudflare rules (page {page})")
return None, f"Unexpected server error during list: {e}"
logger.info(f"Successfully fetched {len(all_rules)} total rules from Cloudflare.")
return all_rules, None
def delete_cloudflare_rule(api_token, zone_id, rule_id):
delete_endpoint = f"https://api.cloudflare.com/client/v4/zones/{zone_id}/email/routing/rules/{rule_id}"
headers = {"Authorization": f"Bearer {api_token}"}
try:
logger.info(f"Attempting to delete Cloudflare rule ID {rule_id}")
response = requests.delete(delete_endpoint, headers=headers)
if response.status_code == 404:
logger.warning(f"Cloudflare rule ID {rule_id} not found for deletion.")
return True, None
response.raise_for_status()
response_data = response.json()
logger.debug(f"Cloudflare DELETE API response: {response_data}")
if response_data.get("success"):
logger.info(f"Successfully deleted Cloudflare rule ID {rule_id}")
return True, None
else:
error_detail = response_data.get('errors', [{'message': 'Unknown error during deletion'}])
logger.error(f"Cloudflare API indicated failure during delete for {rule_id}: {error_detail}")
return False, error_detail
except requests.exceptions.RequestException as e:
error_body = "Could not decode delete response."
if hasattr(e, 'response') and e.response is not None:
try: error_body = e.response.text
except Exception: pass
logger.error(f"Error deleting Cloudflare rule {rule_id}: {e}. Response: {error_body}")
return False, f"Network or API error during delete: {e}"
except Exception as e:
logger.exception(f"Unexpected error deleting Cloudflare rule {rule_id}")
return False, f"Unexpected server error during delete: {e}"
# --- Scheduled Job ---
def cleanup_expired_emails():
with app.app_context():
logger.info("Running scheduled cleanup job for expired emails...")
api_token = os.getenv('CLOUDFLARE_API_TOKEN')
zone_id = os.getenv('CLOUDFLARE_ZONE_ID')
if not api_token or not zone_id:
logger.error("Cleanup job: Missing Cloudflare credentials.")
return
conn = None
try:
conn = sqlite3.connect(DATABASE_PATH)
cursor = conn.cursor()
now_iso = datetime.now(timezone.utc).isoformat()
cursor.execute("SELECT email FROM temporary_emails WHERE expires_at != 'never' AND expires_at < ?", (now_iso,))
expired_emails = [row[0] for row in cursor.fetchall()]
if not expired_emails:
logger.info("Cleanup job: No expired emails found."); conn.close(); return
logger.info(f"Cleanup job: Found {len(expired_emails)} expired emails: {expired_emails}")
all_rules, list_error = get_all_cloudflare_rules(api_token, zone_id)
if list_error:
logger.error(f"Cleanup job: Failed list rules for deletion: {list_error}"); conn.close(); return
emails_to_delete_from_db = []
for email in expired_emails:
rule_id_to_remove = None
for rule in all_rules:
matchers = rule.get("matchers", [])
for matcher in matchers:
if (matcher.get("field") == "to" and matcher.get("type") == "literal" and matcher.get("value") == email):
rule_id_to_remove = rule.get("id"); break
if rule_id_to_remove: break
if rule_id_to_remove:
logger.info(f"Cleanup job: Found rule ID {rule_id_to_remove} for expired email {email}. Deleting.")
success, delete_error = delete_cloudflare_rule(api_token, zone_id, rule_id_to_remove)
if success:
logger.info(f"Cleanup job: Deleted Cloudflare rule for expired email {email}.")
emails_to_delete_from_db.append(email)
else: logger.error(f"Cleanup job: Failed Cloudflare deletion for {email}. Error: {delete_error}")
else:
logger.warning(f"Cleanup job: Cloudflare rule for expired email {email} not found. Removing from DB.")
emails_to_delete_from_db.append(email)
if emails_to_delete_from_db:
placeholders = ','.join('?' * len(emails_to_delete_from_db))
cursor.execute(f"DELETE FROM temporary_emails WHERE email IN ({placeholders})", emails_to_delete_from_db)
conn.commit()
logger.info(f"Cleanup job: Removed {len(emails_to_delete_from_db)} entries from DB.")
conn.close()
logger.info("Cleanup job finished.")
except Exception as e:
logger.exception("Cleanup job: Error during cleanup.")
if conn: conn.rollback(); conn.close()
# --- Flask Routes ---
# get rate limit strings from env var, provide defaults if empty
generate_rate_limit = os.getenv("RATE_LIMIT_GENERATE", "20 per day")
default_rate_limit = os.getenv("RATE_LIMIT_DEFAULT", "60 per minute")
@app.route('/generate', methods=['GET'])
@limiter.limit(generate_rate_limit)
def generate_email_route():
logger.info(f"Received request on /generate from {request.remote_addr}")
api_token = os.getenv('CLOUDFLARE_API_TOKEN')
zone_id = os.getenv('CLOUDFLARE_ZONE_ID')
destination_email = os.getenv('DESTINATION_EMAIL')
domain_name = os.getenv('DOMAIN_NAME')
expiry_str = request.args.get('expiry')
missing_vars = []
if not api_token: missing_vars.append('CLOUDFLARE_API_TOKEN')
if not zone_id: missing_vars.append('CLOUDFLARE_ZONE_ID')
if not destination_email: missing_vars.append('DESTINATION_EMAIL')
if not domain_name: missing_vars.append('DOMAIN_NAME')
if missing_vars:
error_message = f"Missing required environment variables: {', '.join(missing_vars)}"
logger.error(error_message)
return jsonify({'error': error_message}), 500
try:
expires_at = parse_expiry(expiry_str)
random_prefix = generate_random_prefix()
temp_email = f"{random_prefix}@{domain_name}"
logger.info(f"Generated temporary email: {temp_email}, Expiry: {expires_at or 'None'}")
except InvalidExpiryError as e:
logger.warning(f"Invalid expiry requested: {e}")
return jsonify({'error': str(e)}), 400
except Exception as e:
logger.exception("Error during email generation/expiry parsing")
return jsonify({'error': f"Failed to generate email or parse expiry: {e}"}), 500
cf_success, cf_error_details = create_cloudflare_route(api_token, zone_id, temp_email, destination_email)
if cf_success:
db_success = add_email_to_db(temp_email, expires_at)
if not db_success:
logger.error(f"Failed to add {temp_email} to database after Cloudflare success!")
return jsonify({'email': temp_email, 'expires_at': expires_at.isoformat() if expires_at else None}), 200
else:
return jsonify({'error': 'Failed to create Cloudflare routing rule', 'details': cf_error_details}), 500
@app.route('/list', methods=['GET'])
@limiter.limit(default_rate_limit)
def list_email_routes():
logger.info(f"Received request on /list from {request.remote_addr}")
api_token = os.getenv('CLOUDFLARE_API_TOKEN')
zone_id = os.getenv('CLOUDFLARE_ZONE_ID')
if not api_token or not zone_id:
return jsonify({'error': 'Missing CLOUDFLARE_API_TOKEN or CLOUDFLARE_ZONE_ID environment variables'}), 500
all_rules, error = get_all_cloudflare_rules(api_token, zone_id)
if error:
return jsonify({'error': 'Failed to retrieve rules from Cloudflare', 'details': error}), 500
generated_emails = []
for rule in all_rules:
rule_name = rule.get("name", "")
if rule_name.startswith(RULE_NAME_PREFIX):
matchers = rule.get("matchers", [])
for matcher in matchers:
if matcher.get("field") == "to" and matcher.get("type") == "literal":
email = matcher.get("value")
if email: generated_emails.append(email)
break
logger.info(f"Found {len(generated_emails)} email rules matching prefix '{RULE_NAME_PREFIX}'")
return jsonify({'generated_emails': generated_emails}), 200
@app.route('/remove/<path:email_to_remove>', methods=['DELETE'])
@limiter.limit(default_rate_limit)
def remove_email_route(email_to_remove):
logger.info(f"Received request on /remove for {email_to_remove} from {request.remote_addr}")
api_token = os.getenv('CLOUDFLARE_API_TOKEN')
zone_id = os.getenv('CLOUDFLARE_ZONE_ID')
if not api_token or not zone_id:
return jsonify({'error': 'Missing CLOUDFLARE_API_TOKEN or CLOUDFLARE_ZONE_ID environment variables'}), 500
all_rules, list_error = get_all_cloudflare_rules(api_token, zone_id)
if list_error:
return jsonify({'error': 'Failed to retrieve rules to find rule ID', 'details': list_error}), 500
rule_id_to_remove = None
for rule in all_rules:
matchers = rule.get("matchers", [])
for matcher in matchers:
if (matcher.get("field") == "to" and matcher.get("type") == "literal" and matcher.get("value") == email_to_remove):
rule_id_to_remove = rule.get("id"); logger.info(f"Found rule ID {rule_id_to_remove} for email {email_to_remove}"); break
if rule_id_to_remove: break
if not rule_id_to_remove:
logger.warning(f"Rule for email {email_to_remove} not found in Cloudflare.")
remove_email_from_db(email_to_remove)
return jsonify({'error': f'Rule for email {email_to_remove} not found'}), 404
cf_delete_success, cf_delete_error = delete_cloudflare_rule(api_token, zone_id, rule_id_to_remove)
if cf_delete_success:
db_remove_success = remove_email_from_db(email_to_remove)
if not db_remove_success:
logger.error(f"Deleted Cloudflare rule for {email_to_remove}, but failed to remove from local DB.")
return jsonify({'message': f'Successfully removed rule for {email_to_remove}'}), 200
else:
return jsonify({'error': 'Cloudflare failed to delete the rule', 'details': cf_delete_error}), 500
@app.route('/health', methods=['GET'])
@limiter.limit(default_rate_limit)
def health_check():
"""Enhanced health check endpoint."""
logger.debug("Received request on /health")
status_code = 200
response = {
'status': 'healthy',
'checks': {
'database': 'ok',
'cloudflare_api': 'ok'
}
}
# 1. check Database Connection
conn = None
try:
conn = sqlite3.connect(DATABASE_PATH)
cursor = conn.cursor()
cursor.execute("SELECT 1")
cursor.fetchone()
conn.close()
logger.debug("Health check: Database connection successful.")
except Exception as e:
logger.error(f"Health check: Database connection failed: {e}")
response['status'] = 'unhealthy'
response['checks']['database'] = f"failed: {e}"
status_code = 503 # service unavailable
# 2. check Cloudflare API Connection
api_token = os.getenv('CLOUDFLARE_API_TOKEN')
if api_token: # only check if token is configured
headers = {"Authorization": f"Bearer {api_token}"}
# using very lightweight endpoint like listing zones with limit 1
cf_endpoint = "https://api.cloudflare.com/client/v4/zones?per_page=1"
try:
cf_response = requests.get(cf_endpoint, headers=headers, timeout=5)
if cf_response.status_code == 403: # specific check for bad token
logger.warning("Health check: Cloudflare API returned 403 Forbidden (check token).")
response['status'] = 'degraded' # service might work, but CF part has issues
response['checks']['cloudflare_api'] = 'forbidden (check token)'
if status_code == 200: status_code = 200
elif not cf_response.ok: # catch other non-2xx errors
logger.warning(f"Health check: Cloudflare API check failed with status {cf_response.status_code}.")
response['status'] = 'degraded'
response['checks']['cloudflare_api'] = f"failed (status {cf_response.status_code})"
if status_code == 200: status_code = 200 # Or 503
else:
logger.debug("Health check: Cloudflare API connection successful.")
# response['checks']['cloudflare_api'] remains 'ok'
except requests.exceptions.Timeout:
logger.warning("Health check: Cloudflare API check timed out.")
response['status'] = 'degraded'
response['checks']['cloudflare_api'] = 'timeout'
if status_code == 200: status_code = 200 # Or 503
except requests.exceptions.RequestException as e:
logger.warning(f"Health check: Cloudflare API connection error: {e}")
response['status'] = 'degraded'
response['checks']['cloudflare_api'] = f"connection error: {e}"
if status_code == 200: status_code = 200 # Or 503
else:
logger.warning("Health check: Skipping Cloudflare API check (no token found).")
response['checks']['cloudflare_api'] = 'skipped (no token)'
# don't change overall status just because token is missing
return jsonify(response), status_code
# --- Initialize DB and Scheduler ---
try:
init_db()
scheduler = BackgroundScheduler(daemon=True)
cleanup_interval_minutes = int(os.getenv('CLEANUP_INTERVAL_MINUTES', '10'))
scheduler.add_job(cleanup_expired_emails, 'interval', minutes=cleanup_interval_minutes)
atexit.register(lambda: scheduler.shutdown() if scheduler.running else None)
scheduler.start()
logger.info(f"Background scheduler started. Cleanup interval: {cleanup_interval_minutes} minutes.")
except Exception as e:
logger.exception("CRITICAL: Error during initial setup (DB or Scheduler). Application might not function correctly.")
import sys
sys.exit(1)
# --- Main Execution (for direct python app.py run only) ---
if __name__ == '__main__':
logger.info("Running Flask development server (not for production)...")
port = int(os.getenv('FLASK_RUN_PORT', 6020))
debug_mode = os.getenv('FLASK_DEBUG', 'false').lower() == 'true'
app.run(host='0.0.0.0', port=port, debug=debug_mode)