HEX
Server: nginx/1.18.0
System: Linux srv01 5.15.0-171-generic #181-Ubuntu SMP Fri Feb 6 22:44:50 UTC 2026 x86_64
User: RaviMohan (1026)
PHP: 7.4.33
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //opt/mailcow-dockerized/data/conf/rspamd/lua/rspamd.local.lua
rspamd_config.MAILCOW_AUTH = {
	callback = function(task)
		local uname = task:get_user()
		if uname then
			return 1
		end
	end
}

local monitoring_hosts = rspamd_config:add_map{
  url = "/etc/rspamd/custom/monitoring_nolog.map",
  description = "Monitoring hosts",
  type = "regexp"
}

rspamd_config:register_symbol({
  name = 'SMTP_ACCESS',
  type = 'postfilter',
  callback = function(task)
    local util = require("rspamd_util")
    local rspamd_logger = require "rspamd_logger"
    local rspamd_ip = require 'rspamd_ip'
    local uname = task:get_user()
    local limited_access = task:get_symbol("SMTP_LIMITED_ACCESS")

    if not uname then
      return false
    end

    if not limited_access then
      return false
    end

    local hash_key = 'SMTP_ALLOW_NETS_' .. uname

    local redis_params = rspamd_parse_redis_server('smtp_access')
    local ip = task:get_from_ip()

    if ip == nil or not ip:is_valid() then
      return false
    end

    local from_ip_string = tostring(ip)
    smtp_access_table = {from_ip_string}

    local maxbits = 128
    local minbits = 32
    if ip:get_version() == 4 then
        maxbits = 32
        minbits = 8
    end
    for i=maxbits,minbits,-1 do
      local nip = ip:apply_mask(i):to_string() .. "/" .. i
      table.insert(smtp_access_table, nip)
    end
    local function smtp_access_cb(err, data)
      if err then
        rspamd_logger.infox(rspamd_config, "smtp_access query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
        return false
      else
        rspamd_logger.infox(rspamd_config, "checking ip %s for smtp_access in %s", from_ip_string, hash_key)
        for k,v in pairs(data) do
          if (v and v ~= userdata and v == '1') then
            rspamd_logger.infox(rspamd_config, "found ip in smtp_access map")
            task:insert_result(true, 'SMTP_ACCESS', 0.0, from_ip_string)
            return true
          end
        end
        rspamd_logger.infox(rspamd_config, "couldnt find ip in smtp_access map")
        task:insert_result(true, 'SMTP_ACCESS', 999.0, from_ip_string)
        return true
      end
    end
    table.insert(smtp_access_table, 1, hash_key)
    local redis_ret_user = rspamd_redis_make_request(task,
      redis_params, -- connect params
      hash_key, -- hash key
      false, -- is write
      smtp_access_cb, --callback
      'HMGET', -- command
      smtp_access_table -- arguments
    )
    if not redis_ret_user then
      rspamd_logger.infox(rspamd_config, "cannot check smtp_access redis map")
    end
  end,
  priority = 10
})

rspamd_config:register_symbol({
  name = 'POSTMASTER_HANDLER',
  type = 'prefilter',
  callback = function(task)
  local rcpts = task:get_recipients('smtp')
  local rspamd_logger = require "rspamd_logger"
  local lua_util = require "lua_util"
  local from = task:get_from(1)

  -- not applying to mails with more than one rcpt to avoid bypassing filters by addressing postmaster
  if rcpts and #rcpts == 1 then
    for _,rcpt in ipairs(rcpts) do
      local rcpt_split = rspamd_str_split(rcpt['addr'], '@')
      if #rcpt_split == 2 then
        if rcpt_split[1] == 'postmaster' then
          task:set_pre_result('accept', 'whitelisting postmaster smtp rcpt', 'postmaster')
          return
        end
      end
    end
  end

  if from then
    for _,fr in ipairs(from) do
      local fr_split = rspamd_str_split(fr['addr'], '@')
      if #fr_split == 2 then
        if fr_split[1] == 'postmaster' and task:get_user() then
          -- no whitelist, keep signatures
          task:insert_result(true, 'POSTMASTER_FROM', -2500.0)
          return
        end
      end
    end
  end

  end,
  priority = 10
})

rspamd_config:register_symbol({
  name = 'KEEP_SPAM',
  type = 'prefilter',
  callback = function(task)
    local util = require("rspamd_util")
    local rspamd_logger = require "rspamd_logger"
    local rspamd_ip = require 'rspamd_ip'
    local uname = task:get_user()

    if uname then
      return false
    end

    local redis_params = rspamd_parse_redis_server('keep_spam')
    local ip = task:get_from_ip()

    if ip == nil or not ip:is_valid() then
      return false
    end

    -- Helper function to parse IPv6 into 8 segments
    local function ipv6_to_segments(ip_str)
      -- Remove zone identifier if present (e.g., %eth0)
      ip_str = ip_str:gsub("%%.*$", "")
      
      local segments = {}
      
      -- Handle :: compression
      if ip_str:find('::') then
        local before, after = ip_str:match('^(.*)::(.*)$')
        before = before or ''
        after = after or ''
        
        local before_parts = {}
        local after_parts = {}
        
        if before ~= '' then
          for seg in before:gmatch('[^:]+') do
            table.insert(before_parts, tonumber(seg, 16) or 0)
          end
        end
        
        if after ~= '' then
          for seg in after:gmatch('[^:]+') do
            table.insert(after_parts, tonumber(seg, 16) or 0)
          end
        end
        
        -- Add before segments
        for _, seg in ipairs(before_parts) do
          table.insert(segments, seg)
        end
        
        -- Add compressed zeros
        local zeros_needed = 8 - #before_parts - #after_parts
        for i = 1, zeros_needed do
          table.insert(segments, 0)
        end
        
        -- Add after segments
        for _, seg in ipairs(after_parts) do
          table.insert(segments, seg)
        end
      else
        -- No compression
        for seg in ip_str:gmatch('[^:]+') do
          table.insert(segments, tonumber(seg, 16) or 0)
        end
      end
      
      -- Ensure we have exactly 8 segments
      while #segments < 8 do
        table.insert(segments, 0)
      end
      
      return segments
    end

    -- Generate all common IPv6 notations
    local function get_ipv6_variants(ip_str)
      local variants = {}
      local seen = {}
      
      local function add_variant(v)
        if v and not seen[v] then
          table.insert(variants, v)
          seen[v] = true
        end
      end
      
      -- For IPv4, just return the original
      if not ip_str:find(':') then
        add_variant(ip_str)
        return variants
      end
      
      local segments = ipv6_to_segments(ip_str)
      
      -- 1. Fully expanded form (all zeros shown as 0000)
      local expanded_parts = {}
      for _, seg in ipairs(segments) do
        table.insert(expanded_parts, string.format('%04x', seg))
      end
      add_variant(table.concat(expanded_parts, ':'))
      
      -- 2. Standard form (no leading zeros, but all segments present)
      local standard_parts = {}
      for _, seg in ipairs(segments) do
        table.insert(standard_parts, string.format('%x', seg))
      end
      add_variant(table.concat(standard_parts, ':'))
      
      -- 3. Find all possible :: compressions
      -- RFC 5952: compress the longest run of consecutive zeros
      -- But we need to check all possibilities since Redis might have any form
      
      -- Find all zero runs
      local zero_runs = {}
      local in_run = false
      local run_start = 0
      local run_length = 0
      
      for i = 1, 8 do
        if segments[i] == 0 then
          if not in_run then
            in_run = true
            run_start = i
            run_length = 1
          else
            run_length = run_length + 1
          end
        else
          if in_run then
            if run_length >= 1 then  -- Allow single zero compression too
              table.insert(zero_runs, {start = run_start, length = run_length})
            end
            in_run = false
          end
        end
      end
      
      -- Don't forget the last run
      if in_run and run_length >= 1 then
        table.insert(zero_runs, {start = run_start, length = run_length})
      end
      
      -- Generate variant for each zero run compression
      for _, run in ipairs(zero_runs) do
        local parts = {}
        
        -- Before compression
        for i = 1, run.start - 1 do
          table.insert(parts, string.format('%x', segments[i]))
        end
        
        -- The compression
        if run.start == 1 then
          table.insert(parts, '')
          table.insert(parts, '')
        elseif run.start + run.length - 1 == 8 then
          table.insert(parts, '')
          table.insert(parts, '')
        else
          table.insert(parts, '')
        end
        
        -- After compression
        for i = run.start + run.length, 8 do
          table.insert(parts, string.format('%x', segments[i]))
        end
        
        local compressed = table.concat(parts, ':'):gsub('::+', '::')
        add_variant(compressed)
      end
      
      return variants
    end

    local from_ip_string = tostring(ip)
    local ip_check_table = {}
    
    -- Add all variants of the exact IP
    for _, variant in ipairs(get_ipv6_variants(from_ip_string)) do
      table.insert(ip_check_table, variant)
    end

    local maxbits = 128
    local minbits = 32
    if ip:get_version() == 4 then
        maxbits = 32
        minbits = 8
    end
    
    -- Add all CIDR notations with variants
    for i=maxbits,minbits,-1 do
      local masked_ip = ip:apply_mask(i)
      local cidr_base = masked_ip:to_string()
      
      for _, variant in ipairs(get_ipv6_variants(cidr_base)) do
        local cidr = variant .. "/" .. i
        table.insert(ip_check_table, cidr)
      end
    end
    
    local function keep_spam_cb(err, data)
      if err then
        rspamd_logger.infox(rspamd_config, "keep_spam query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
        return false
      else
        for k,v in pairs(data) do
          if (v and v ~= userdata and v == '1') then
            rspamd_logger.infox(rspamd_config, "found ip %s (checked as: %s) in keep_spam map, setting pre-result accept", from_ip_string, ip_check_table[k])
            task:set_pre_result('accept', 'ip matched with forward hosts', 'keep_spam')
            task:set_flag('no_stat')
            return
          end
        end
      end
    end
    
    table.insert(ip_check_table, 1, 'KEEP_SPAM')
    local redis_ret_user = rspamd_redis_make_request(task,
      redis_params, -- connect params
      'KEEP_SPAM', -- hash key
      false, -- is write
      keep_spam_cb, --callback
      'HMGET', -- command
      ip_check_table -- arguments
    )
    if not redis_ret_user then
      rspamd_logger.infox(rspamd_config, "cannot check keep_spam redis map")
    end
  end,
  priority = 19
})

rspamd_config:register_symbol({
  name = 'TLS_HEADER',
  type = 'postfilter',
  callback = function(task)
    local rspamd_logger = require "rspamd_logger"
    local tls_tag = task:get_request_header('TLS-Version')
    if type(tls_tag) == 'nil' then
      task:set_milter_reply({
        add_headers = {['X-Last-TLS-Session-Version'] = 'None'}
      })
    else
      task:set_milter_reply({
        add_headers = {['X-Last-TLS-Session-Version'] = tostring(tls_tag)}
      })
    end
  end,
  priority = 12
})

rspamd_config:register_symbol({
  name = 'TAG_MOO',
  type = 'postfilter',
  flags = 'ignore_passthrough',
  callback = function(task)
    local util = require("rspamd_util")
    local rspamd_logger = require "rspamd_logger"
    local redis_params = rspamd_parse_redis_server('taghandler')
    local rspamd_http = require "rspamd_http"
    local rcpts = task:get_recipients('smtp')
    local lua_util = require "lua_util"

    local function remove_moo_tag()
      local moo_tag_header = task:get_header('X-Moo-Tag', false)
      if moo_tag_header then
        task:set_milter_reply({
          remove_headers = {['X-Moo-Tag'] = 0},
        })
      end
      return true
    end

    -- Check if we have exactly one recipient
    if not (rcpts and #rcpts == 1) then
      rspamd_logger.infox("TAG_MOO: not exactly one rcpt (%s), removing moo tag", rcpts and #rcpts or 0)
      remove_moo_tag()
      return
    end

    local rcpt_addr = rcpts[1]['addr']
    local rcpt_user = rcpts[1]['user']
    local rcpt_domain = rcpts[1]['domain']

    -- Check if recipient has a tag (contains '+')
    local tag = nil
    if rcpt_user:find('%+') then
      local base_user, tag_part = rcpt_user:match('^(.-)%+(.+)$')
      if base_user and tag_part then
        tag = tag_part
        rspamd_logger.infox("TAG_MOO: found tag in recipient: %s (base: %s, tag: %s)", rcpt_addr, base_user, tag)
      end
    end

    if not tag then
      rspamd_logger.infox("TAG_MOO: no tag found in recipient %s, removing moo tag", rcpt_addr)
      remove_moo_tag()
      return
    end

    -- Optional: Check if domain is a mailcow domain
    -- When KEEP_SPAM is active, RCPT_MAILCOW_DOMAIN might not be set
    -- If the mail is being delivered, we can assume it's valid
    local mailcow_domain = task:get_symbol("RCPT_MAILCOW_DOMAIN")
    if not mailcow_domain then
      rspamd_logger.infox("TAG_MOO: RCPT_MAILCOW_DOMAIN not set (possibly due to pre-result), proceeding anyway for domain %s", rcpt_domain)
    end

    local action = task:get_metric_action('default')
    rspamd_logger.infox("TAG_MOO: metric action: %s", action)

    -- Check if we have a pre-result (e.g., from KEEP_SPAM or POSTMASTER_HANDLER)
    local allow_processing = false
    
    if task.has_pre_result then
      local has_pre, pre_action = task:has_pre_result()
      if has_pre then
        rspamd_logger.infox("TAG_MOO: pre-result detected: %s", tostring(pre_action))
        if pre_action == 'accept' then
          allow_processing = true
          rspamd_logger.infox("TAG_MOO: pre-result is accept, will process")
        end
      end
    end

    -- Allow processing for mild actions or when we have pre-result accept
    if not allow_processing and action ~= 'no action' and action ~= 'greylist' then
      rspamd_logger.infox("TAG_MOO: skipping tag handler for action: %s", action)
      remove_moo_tag()
      return true
    end

    rspamd_logger.infox("TAG_MOO: processing allowed")

    local function http_callback(err_message, code, body, headers)
      if body ~= nil and body ~= "" then
        rspamd_logger.infox(rspamd_config, "TAG_MOO: expanding rcpt to \"%s\"", body)

        local function tag_callback_subject(err, data)
          if err or type(data) ~= 'string' or data == '' then
            rspamd_logger.infox(rspamd_config, "TAG_MOO: subject tag handler rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying subfolder tag handler...", body, data, err)

            local function tag_callback_subfolder(err, data)
              if err or type(data) ~= 'string' or data == '' then
                rspamd_logger.infox(rspamd_config, "TAG_MOO: subfolder tag handler for rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\")", body, data, err)
                remove_moo_tag()
              else
                rspamd_logger.infox("TAG_MOO: User wants subfolder tag, adding X-Moo-Tag header")
                task:set_milter_reply({
                  add_headers = {['X-Moo-Tag'] = 'YES'}
                })
              end
            end

            local redis_ret_subfolder = rspamd_redis_make_request(task,
              redis_params, -- connect params
              body, -- hash key
              false, -- is write
              tag_callback_subfolder, --callback
              'HGET', -- command
              {'RCPT_WANTS_SUBFOLDER_TAG', body} -- arguments
            )
            if not redis_ret_subfolder then
              rspamd_logger.infox(rspamd_config, "TAG_MOO: cannot make request to load tag handler for rcpt")
              remove_moo_tag()
            end

          else
            rspamd_logger.infox("TAG_MOO: user wants subject modified for tagged mail")
            local sbj = task:get_header('Subject') or ''
            new_sbj = '=?UTF-8?B?' .. tostring(util.encode_base64('[' .. tag .. '] ' .. sbj)) .. '?='
            task:set_milter_reply({
              remove_headers = {
                ['Subject'] = 1,
                ['X-Moo-Tag'] = 0
              },
              add_headers = {['Subject'] = new_sbj}
            })
          end
        end

        local redis_ret_subject = rspamd_redis_make_request(task,
          redis_params, -- connect params
          body, -- hash key
          false, -- is write
          tag_callback_subject, --callback
          'HGET', -- command
          {'RCPT_WANTS_SUBJECT_TAG', body} -- arguments
        )
        if not redis_ret_subject then
          rspamd_logger.infox(rspamd_config, "TAG_MOO: cannot make request to load tag handler for rcpt")
          remove_moo_tag()
        end
      else
        rspamd_logger.infox("TAG_MOO: alias expansion returned empty body")
        remove_moo_tag()
      end
    end

    local rcpt_split = rspamd_str_split(rcpt_addr, '@')
    if #rcpt_split == 2 then
      if rcpt_split[1]:match('^postmaster') then
        rspamd_logger.infox(rspamd_config, "TAG_MOO: not expanding postmaster alias")
        remove_moo_tag()
      else
        rspamd_logger.infox("TAG_MOO: requesting alias expansion for %s", rcpt_addr)
        rspamd_http.request({
          task=task,
          url='http://nginx:8081/aliasexp.php',
          body='',
          callback=http_callback,
          headers={Rcpt=rcpt_addr},
        })
      end
    else
      rspamd_logger.infox("TAG_MOO: invalid rcpt format")
      remove_moo_tag()
    end
  end,
  priority = 19
})

rspamd_config:register_symbol({
  name = 'BCC',
  type = 'postfilter',
  flags = 'ignore_passthrough',
  callback = function(task)
    local util = require("rspamd_util")
    local rspamd_http = require "rspamd_http"
    local rspamd_logger = require "rspamd_logger"

    local from_table = {}
    local rcpt_table = {}

    if task:has_symbol('ENCRYPTED_CHAT') then
      return -- stop
    end

    local send_mail = function(task, bcc_dest)
      local lua_smtp = require "lua_smtp"
      local function sendmail_cb(ret, err)
        if not ret then
          rspamd_logger.errx(task, 'BCC SMTP ERROR: %s', err)
        else
          rspamd_logger.infox(rspamd_config, "BCC SMTP SUCCESS TO %s", bcc_dest)
        end
      end
      if not bcc_dest then
        return -- stop
      end
      -- dot stuff content before sending
      local email_content = tostring(task:get_content())
      email_content = string.gsub(email_content, "\r\n%.", "\r\n..")
      -- send mail
      local from_smtp = task:get_from('smtp')
      local from_addr = (from_smtp and from_smtp[1] and from_smtp[1].addr) or 'mailer-daemon@localhost'
      lua_smtp.sendmail({
        task = task,
        host = os.getenv("IPV4_NETWORK") .. '.253',
        port = 591,
        from = from_addr,
        recipients = bcc_dest,
        helo = 'bcc',
        timeout = 20,
      }, email_content, sendmail_cb)
    end

    -- determine from
    local from = task:get_from('smtp')
    if from then
      for _, a in ipairs(from) do
        table.insert(from_table, a['addr']) -- add this rcpt to table
        table.insert(from_table, '@' .. a['domain']) -- add this rcpts domain to table
      end
    else
      return -- stop
    end

    -- determine rcpts
    local rcpts = task:get_recipients('smtp')
    if rcpts then
      for _, a in ipairs(rcpts) do
        table.insert(rcpt_table, a['addr']) -- add this rcpt to table
        table.insert(rcpt_table, '@' .. a['domain']) -- add this rcpts domain to table
      end
    else
      return -- stop
    end

    local action = task:get_metric_action('default')
    rspamd_logger.infox("BCC: metric action: %s", action)

    -- Check for pre-result accept (e.g., from KEEP_SPAM)
    local allow_bcc = false
    if task.has_pre_result then
      local has_pre, pre_action = task:has_pre_result()
      if has_pre and pre_action == 'accept' then
        allow_bcc = true
        rspamd_logger.infox("BCC: pre-result accept detected, will send BCC")
      end
    end

    -- Allow BCC for mild actions or when we have pre-result accept
    if not allow_bcc and action ~= 'no action' and action ~= 'add header' and action ~= 'rewrite subject' then
      rspamd_logger.infox("BCC: skipping for action: %s", action)
      return
    end

    local function rcpt_callback(err_message, code, body, headers)
      if err_message == nil and code == 201 and body ~= nil then
        rspamd_logger.infox("BCC: sending BCC to %s for rcpt match", body)
        send_mail(task, body)
      end
    end

    local function from_callback(err_message, code, body, headers)
      if err_message == nil and code == 201 and body ~= nil then
        rspamd_logger.infox("BCC: sending BCC to %s for from match", body)
        send_mail(task, body)
      end
    end

    if rcpt_table then
      for _,e in ipairs(rcpt_table) do
        rspamd_logger.infox(rspamd_config, "BCC: checking bcc for rcpt address %s", e)
        rspamd_http.request({
          task=task,
          url='http://nginx:8081/bcc.php',
          body='',
          callback=rcpt_callback,
          headers={Rcpt=e}
        })
      end
    end

    if from_table then
      for _,e in ipairs(from_table) do
        rspamd_logger.infox(rspamd_config, "BCC: checking bcc for from address %s", e)
        rspamd_http.request({
          task=task,
          url='http://nginx:8081/bcc.php',
          body='',
          callback=from_callback,
          headers={From=e}
        })
      end
    end

    -- Don't return true to avoid symbol being logged
  end,
  priority = 20
})

rspamd_config:register_symbol({
  name = 'DYN_RL_CHECK',
  type = 'prefilter',
  callback = function(task)
    local util = require("rspamd_util")
    local redis_params = rspamd_parse_redis_server('dyn_rl')
    local rspamd_logger = require "rspamd_logger"
    local envfrom = task:get_from(1)
    local envrcpt = task:get_recipients(1) or {}
    local uname = task:get_user()
    if not envfrom or not uname then
      return false
    end

    local uname = uname:lower()

    if #envrcpt == 1 and envrcpt[1].addr:lower() == uname then
      return false
    end

    local env_from_domain = envfrom[1].domain:lower() -- get smtp from domain in lower case

    local function redis_cb_user(err, data)

      if err or type(data) ~= 'string' then
        rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for user %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying dynamic ratelimit for domain...", uname, data, err)

        local function redis_key_cb_domain(err, data)
          if err or type(data) ~= 'string' then
            rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for domain %s returned invalid or empty data (\"%s\") or error (\"%s\")", env_from_domain, data, err)
          else
            rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for domain %s with value %s", env_from_domain, data)
            task:insert_result('DYN_RL', 0.0, data, env_from_domain)
          end
        end

        local redis_ret_domain = rspamd_redis_make_request(task,
          redis_params, -- connect params
          env_from_domain, -- hash key
          false, -- is write
          redis_key_cb_domain, --callback
          'HGET', -- command
          {'RL_VALUE', env_from_domain} -- arguments
        )
        if not redis_ret_domain then
          rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for domain")
        end
      else
        rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for user %s with value %s", uname, data)
        task:insert_result('DYN_RL', 0.0, data, uname)
      end

    end

    local redis_ret_user = rspamd_redis_make_request(task,
      redis_params, -- connect params
      uname, -- hash key
      false, -- is write
      redis_cb_user, --callback
      'HGET', -- command
      {'RL_VALUE', uname} -- arguments
    )
    if not redis_ret_user then
      rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for user")
    end
    return true
  end,
  flags = 'empty',
  priority = 20
})

rspamd_config:register_symbol({
  name = 'NO_LOG_STAT',
  type = 'postfilter',
  callback = function(task)
    local from = task:get_header('From')
    if from and (monitoring_hosts:get_key(from) or from == "watchdog@localhost") then
      task:set_flag('no_log')
      task:set_flag('no_stat')
    end
  end
})

rspamd_config:register_symbol({
  name = 'MOO_FOOTER',
  type = 'prefilter',
  callback = function(task)
    local cjson = require "cjson"
    local lua_mime = require "lua_mime"
    local lua_util = require "lua_util"
    local rspamd_logger = require "rspamd_logger"
    local rspamd_http = require "rspamd_http"
    local envfrom = task:get_from(1)
    local uname = task:get_user()
    if not envfrom or not uname then
      return false
    end
    local uname = uname:lower()
    local env_from_domain = envfrom[1].domain:lower()
    local env_from_addr = envfrom[1].addr:lower()

    -- determine newline type
    local function newline(task)
      local t = task:get_newlines_type()

      if t == 'cr' then
        return '\r'
      elseif t == 'lf' then
        return '\n'
      end

      return '\r\n'
    end
    -- retrieve footer
    local function footer_cb(err_message, code, data, headers)
      if err or type(data) ~= 'string' then
        rspamd_logger.infox(rspamd_config, "domain wide footer request for user %s returned invalid or empty data (\"%s\") or error (\"%s\")", uname, data, err)
      else

        -- parse json string
        local footer = cjson.decode(data)
        if not footer then
          rspamd_logger.infox(rspamd_config, "parsing domain wide footer for user %s returned invalid or empty data (\"%s\") or error (\"%s\")", uname, data, err)
        else
          if footer and type(footer) == "table" and (footer.html and footer.html ~= "" or footer.plain and footer.plain ~= "")  then
            rspamd_logger.infox(rspamd_config, "found domain wide footer for user %s: html=%s, plain=%s, vars=%s", uname, footer.html, footer.plain, footer.vars)

            if footer.skip_replies ~= 0 then
              in_reply_to = task:get_header_raw('in-reply-to')
              if in_reply_to then
                rspamd_logger.infox(rspamd_config, "mail is a reply - skip footer")
                return
              end
            end

            local envfrom_mime = task:get_from(2)
            local from_name = ""
            if envfrom_mime and envfrom_mime[1].name then
              from_name = envfrom_mime[1].name
            elseif envfrom and envfrom[1].name then
              from_name = envfrom[1].name
            end

            -- default replacements
            local replacements = {
              auth_user = uname,
              from_user = envfrom[1].user,
              from_name = from_name,
              from_addr = envfrom[1].addr,
              from_domain = envfrom[1].domain:lower()
            }
            -- add custom mailbox attributes
            if footer.vars and type(footer.vars) == "string" then
              local footer_vars = cjson.decode(footer.vars)

              if type(footer_vars) == "table" then
                for key, value in pairs(footer_vars) do
                  replacements[key] = value
                end
              end
            end
            if footer.html and footer.html ~= "" then
              footer.html = lua_util.jinja_template(footer.html, replacements, true)
            end
            if footer.plain and footer.plain ~= "" then
              footer.plain = lua_util.jinja_template(footer.plain, replacements, true)
            end

            -- add footer
            local out = {}
            local rewrite = lua_mime.add_text_footer(task, footer.html, footer.plain) or {}

            local seen_cte
            local newline_s = newline(task)

            local function rewrite_ct_cb(name, hdr)
              if rewrite.need_rewrite_ct then
                if name:lower() == 'content-type' then
                  -- include boundary if present
                  local boundary_part = rewrite.new_ct.boundary and
                    string.format('; boundary="%s"', rewrite.new_ct.boundary) or ''
                  local nct = string.format('%s: %s/%s; charset=utf-8%s',
                      'Content-Type', rewrite.new_ct.type, rewrite.new_ct.subtype, boundary_part)
                  out[#out + 1] = nct
                  -- update Content-Type header (include boundary if present)
                  task:set_milter_reply({
                    remove_headers = {['Content-Type'] = 0},
                  })
                  task:set_milter_reply({
                    add_headers = {['Content-Type'] = string.format('%s/%s; charset=utf-8%s',
                      rewrite.new_ct.type, rewrite.new_ct.subtype, boundary_part)}
                  })
                  return
                elseif name:lower() == 'content-transfer-encoding' then
                  out[#out + 1] = string.format('%s: %s',
                      'Content-Transfer-Encoding', 'quoted-printable')
                  -- update Content-Transfer-Encoding header
                  task:set_milter_reply({
                    remove_headers = {['Content-Transfer-Encoding'] = 0},
                  })
                  task:set_milter_reply({
                    add_headers = {['Content-Transfer-Encoding'] = 'quoted-printable'}
                  })
                  seen_cte = true
                  return
                end
              end
              out[#out + 1] = hdr.raw:gsub('\r?\n?$', '')
            end

            task:headers_foreach(rewrite_ct_cb, {full = true})

            if not seen_cte and rewrite.need_rewrite_ct then
              out[#out + 1] = string.format('%s: %s', 'Content-Transfer-Encoding', 'quoted-printable')
            end

            -- End of headers
            out[#out + 1] = newline_s

            if rewrite.out then
              for _,o in ipairs(rewrite.out) do
                out[#out + 1] = o
              end
            else
              out[#out + 1] = task:get_rawbody()
            end
            local out_parts = {}
            for _,o in ipairs(out) do
              if type(o) ~= 'table' then
                out_parts[#out_parts + 1] = o
                out_parts[#out_parts + 1] = newline_s
              else
                local removePrefix = "--\x0D\x0AContent-Type"
                if string.lower(string.sub(tostring(o[1]), 1, string.len(removePrefix))) == string.lower(removePrefix) then
                  o[1] = string.sub(tostring(o[1]), string.len("--\x0D\x0A") + 1)
                end
                out_parts[#out_parts + 1] = o[1]
                if o[2] then
                  out_parts[#out_parts + 1] = newline_s
                end
              end
            end
            task:set_message(out_parts)
          else
            rspamd_logger.infox(rspamd_config, "domain wide footer request for user %s returned invalid or empty data (\"%s\")", uname, data)
          end
        end
      end
    end

    -- fetch footer
    rspamd_http.request({
      task=task,
      url='http://nginx:8081/footer.php',
      body='',
      callback=footer_cb,
      headers={Domain=env_from_domain,Username=uname,From=env_from_addr},
    })

    return true
  end,
  priority = 1
})