feat: create mymx service

This commit is contained in:
Jet Pham 2026-03-04 12:20:26 -08:00
parent 478af69792
commit ad8cb52169
No known key found for this signature in database
20 changed files with 3152 additions and 1 deletions

View file

@ -0,0 +1,17 @@
[package]
name = "mymx-server"
version = "0.1.0"
edition = "2021"
[dependencies]
mymx-sdk = { path = "../mymx-sdk" }
axum = "0.8"
tokio = { version = "1", features = ["full"] }
sqlx = { version = "0.8", features = ["runtime-tokio", "tls-rustls", "postgres", "chrono"] }
sha2 = "0.10"
hex = "0.4"
serde = { version = "1", features = ["derive"] }
serde_json = "1"
tracing = "0.1"
tracing-subscriber = "0.3"
chrono = { version = "0.4", features = ["serde"] }

View file

@ -0,0 +1,6 @@
CREATE TABLE IF NOT EXISTS emails (
id SERIAL PRIMARY KEY,
body TEXT NOT NULL,
subject TEXT,
received_at TIMESTAMPTZ NOT NULL DEFAULT NOW()
);

View file

@ -0,0 +1,2 @@
ALTER TABLE emails ADD COLUMN from_address TEXT;
ALTER TABLE emails ADD COLUMN mymx_email_id TEXT UNIQUE;

View file

@ -0,0 +1,299 @@
use axum::{
extract::State,
http::{HeaderMap, StatusCode},
response::{Html, IntoResponse},
routing::{get, post},
Json, Router,
};
use chrono::{DateTime, Utc};
use sha2::{Digest, Sha256};
use sqlx::postgres::PgPoolOptions;
use sqlx::{FromRow, PgPool};
use std::env;
#[derive(Clone)]
struct AppState {
db: PgPool,
webhook_secret: String,
}
#[derive(serde::Serialize)]
struct WebhookResponse {
received: bool,
}
#[derive(serde::Serialize)]
struct ErrorResponse {
error: String,
}
#[derive(serde::Serialize)]
struct HealthResponse {
status: String,
#[serde(skip_serializing_if = "Option::is_none")]
error: Option<String>,
}
#[derive(FromRow)]
struct EmailRow {
body: String,
subject: Option<String>,
from_address: Option<String>,
received_at: DateTime<Utc>,
}
fn map_webhook_error(e: mymx_sdk::Error) -> (StatusCode, Json<ErrorResponse>) {
match &e {
mymx_sdk::Error::InvalidSignatureHeader => {
tracing::warn!("Webhook rejected: invalid signature header format");
(
StatusCode::UNAUTHORIZED,
Json(ErrorResponse {
error: "invalid signature header".into(),
}),
)
}
mymx_sdk::Error::SignatureVerificationFailed => {
tracing::warn!("Webhook rejected: signature verification failed");
(
StatusCode::UNAUTHORIZED,
Json(ErrorResponse {
error: "signature verification failed".into(),
}),
)
}
mymx_sdk::Error::TimestampTooOld => {
tracing::warn!("Webhook rejected: timestamp too old (replay protection)");
(
StatusCode::UNAUTHORIZED,
Json(ErrorResponse {
error: "timestamp too old".into(),
}),
)
}
mymx_sdk::Error::HmacError(msg) => {
tracing::warn!("Webhook rejected: HMAC error: {}", msg);
(
StatusCode::UNAUTHORIZED,
Json(ErrorResponse {
error: "hmac error".into(),
}),
)
}
mymx_sdk::Error::ParseError(parse_err) => {
tracing::warn!("Webhook body parse failed: {}", parse_err);
(
StatusCode::UNPROCESSABLE_ENTITY,
Json(ErrorResponse {
error: format!("failed to parse webhook body: {}", parse_err),
}),
)
}
}
}
#[tokio::main]
async fn main() {
tracing_subscriber::fmt::init();
let database_url = env::var("DATABASE_URL").expect("DATABASE_URL must be set");
let webhook_secret =
env::var("MYMX_WEBHOOK_SECRET").expect("MYMX_WEBHOOK_SECRET must be set");
let listen_addr = env::var("LISTEN_ADDR").unwrap_or_else(|_| "127.0.0.1:4002".to_string());
let pool = PgPoolOptions::new()
.max_connections(5)
.connect(&database_url)
.await
.expect("Failed to connect to database");
sqlx::migrate!()
.run(&pool)
.await
.expect("Failed to run migrations");
let state = AppState {
db: pool,
webhook_secret,
};
let app = Router::new()
.route("/webhook", post(webhook_handler))
.route("/health", get(health_handler))
.route("/", get(index_handler))
.with_state(state);
let listener = tokio::net::TcpListener::bind(&listen_addr)
.await
.expect("Failed to bind listener");
tracing::info!("Listening on {}", listen_addr);
axum::serve(listener, app).await.unwrap();
}
async fn webhook_handler(
State(state): State<AppState>,
headers: HeaderMap,
body: String,
) -> Result<Json<WebhookResponse>, (StatusCode, Json<ErrorResponse>)> {
let signature = headers
.get("MyMX-Signature")
.and_then(|v| v.to_str().ok())
.ok_or((
StatusCode::BAD_REQUEST,
Json(ErrorResponse {
error: "missing MyMX-Signature header".into(),
}),
))?;
mymx_sdk::verify_signature(&body, signature, &state.webhook_secret)
.map_err(map_webhook_error)?;
let event = mymx_sdk::parse_webhook(&body).map_err(map_webhook_error)?;
let email_body = event
.email
.parsed
.body_text
.or(event.email.parsed.body_html)
.unwrap_or_default();
let subject = event.email.headers.subject;
let from_address = event.email.headers.from;
let mymx_email_id = event.email.id;
let received_at = chrono::DateTime::parse_from_rfc3339(&event.email.received_at)
.map(|dt| dt.with_timezone(&Utc))
.unwrap_or_else(|_| Utc::now());
sqlx::query(
"INSERT INTO emails (body, subject, from_address, mymx_email_id, received_at)
VALUES ($1, $2, $3, $4, $5)
ON CONFLICT (mymx_email_id) DO NOTHING",
)
.bind(&email_body)
.bind(&subject)
.bind(&from_address)
.bind(&mymx_email_id)
.bind(received_at)
.execute(&state.db)
.await
.map_err(|e| {
tracing::error!("Database insert failed: {}", e);
(
StatusCode::INTERNAL_SERVER_ERROR,
Json(ErrorResponse {
error: "internal server error".into(),
}),
)
})?;
tracing::info!(
subject = subject.as_deref().unwrap_or("(none)"),
from = %from_address,
email_id = %mymx_email_id,
"Received email"
);
Ok(Json(WebhookResponse { received: true }))
}
async fn health_handler(State(state): State<AppState>) -> impl IntoResponse {
match sqlx::query_scalar::<_, i32>("SELECT 1").fetch_one(&state.db).await {
Ok(_) => (
StatusCode::OK,
Json(HealthResponse {
status: "ok".into(),
error: None,
}),
),
Err(e) => (
StatusCode::SERVICE_UNAVAILABLE,
Json(HealthResponse {
status: "unhealthy".into(),
error: Some(e.to_string()),
}),
),
}
}
async fn index_handler(State(state): State<AppState>) -> Result<Html<String>, StatusCode> {
let emails: Vec<EmailRow> = sqlx::query_as::<_, EmailRow>(
"SELECT body, subject, from_address, received_at FROM emails",
)
.fetch_all(&state.db)
.await
.map_err(|e| {
tracing::error!("Database query failed: {}", e);
StatusCode::INTERNAL_SERVER_ERROR
})?;
let mut rows: Vec<(String, String, String, DateTime<Utc>)> = emails
.into_iter()
.map(|email| {
let mut hasher = Sha256::new();
hasher.update(email.body.as_bytes());
let hash = hex::encode(hasher.finalize());
let subject = email.subject.unwrap_or_default();
let from = email.from_address.unwrap_or_default();
(hash, subject, from, email.received_at)
})
.collect();
// Sort alphabetically by hash
rows.sort_by(|a, b| a.0.cmp(&b.0));
let table_rows: String = rows
.iter()
.map(|(hash, subject, from, received_at)| {
format!(
"<tr><td><code>{}</code></td><td>{}</td><td>{}</td><td>{}</td></tr>",
hash,
html_escape(from),
html_escape(subject),
received_at.format("%Y-%m-%d %H:%M:%S UTC")
)
})
.collect::<Vec<_>>()
.join("\n");
let html = format!(
r#"<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>MyMX Emails</title>
<style>
body {{ font-family: monospace; margin: 2rem; background: #1a1a1a; color: #e0e0e0; }}
h1 {{ color: #ffffff; }}
table {{ border-collapse: collapse; width: 100%; }}
th, td {{ border: 1px solid #333; padding: 0.5rem; text-align: left; }}
th {{ background: #2a2a2a; }}
tr:nth-child(even) {{ background: #222; }}
code {{ font-size: 0.85em; word-break: break-all; }}
</style>
</head>
<body>
<h1>MyMX Emails</h1>
<table>
<thead>
<tr><th>SHA-256 Hash</th><th>From</th><th>Subject</th><th>Received</th></tr>
</thead>
<tbody>
{}
</tbody>
</table>
</body>
</html>"#,
table_rows
);
Ok(Html(html))
}
fn html_escape(s: &str) -> String {
s.replace('&', "&amp;")
.replace('<', "&lt;")
.replace('>', "&gt;")
.replace('"', "&quot;")
}