app

by simple-login

simple-login / app

The SimpleLogin back-end

708 Stars 60 Forks Last release: Not found MIT License 2.3K Commits 13 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

SimpleLogin | Privacy-First Email Forwarding and Identity Provider Service

Yet another email forwarding service?

In some way yes... However, SimpleLogin is a bit different because:

  • Fully open source: both the server and client code (browser extension, JS library) are open source so anyone can freely inspect and (hopefully) improve the code.

  • The only email forwarding solution that is self-hostable: with our detailed self-hosting instructions and most of components running as Docker container, anyone who knows

    ssh
    is able to deploy SimpleLogin on their server.
  • Not just email alias: SimpleLogin is a privacy-first and developer-friendly identity provider that:

    • offers privacy for users
    • is simple to use for developers. SimpleLogin is a privacy-focused alternative to the "Login with Facebook/Google/Twitter" buttons.
  • Plenty of features: browser extension, custom domain, catch-all alias, OAuth libraries, etc.

  • Open roadmap at https://trello.com/b/4d6A69I4/open-roadmap: you know the exciting features we are working on.

At the heart of SimpleLogin is

email alias
: an alias is a normal email address but all emails sent to an alias are forwarded to your email inbox. SimpleLogin alias can also send emails: for your contact, the alias is therefore your email address. Use alias whenever you need to give out your email address to protect your online identity. More info on our website at https://simplelogin.io

Quick start

If you have Docker installed, run the following command to start SimpleLogin local server:

docker run --name sl -it --rm \
    -e RESET_DB=true \
    -e CONFIG=/code/example.env \
    -p 7777:7777 \
    simplelogin/app:3.2.2 python server.py

Then open http://localhost:7777, you should be able to login with

[email protected]/password
account!

To use SimpleLogin aliases, you need to deploy it on your server with some DNS setup though, the following section will show a step-by-step guide on how to get your own email forwarder service!

Table of Contents

1. General Architecture

2. Self Hosting

3. Contributing Guide

4. API

5. OAuth2/OpenID Connect

General Architecture

SimpleLogin backend consists of 2 main components:

  • the

    webapp
    used by several clients: web UI (the dashboard), browser extension (Chrome & Firefox for now), OAuth clients (apps that integrate "Login with SimpleLogin" button) and mobile app (work in progress).
  • the

    email handler
    : implements the email forwarding (i.e. alias receiving email) and email sending (i.e. alias sending email).

Self hosting

Prerequisites

  • a Linux server (either a VM or dedicated server). This doc shows the setup for Ubuntu 18.04 LTS but the steps could be adapted for other popular Linux distributions. As most of components run as Docker container and Docker can be a bit heavy, having at least 2 GB of RAM is recommended. The server needs to have the port 25 (email), 80, 443 (for the webapp), 22 (so you can ssh into it) open.

  • a domain that you can config the DNS. It could be a sub-domain. In the rest of the doc, let's say it's

    mydomain.com
    for the email and
    app.mydomain.com
    for SimpleLogin webapp. Please make sure to replace these values by your domain name whenever they appear in the doc. A trick we use is to download this README file on your computer and replace all
    mydomain.com
    occurrences by your domain.
  • [Optional] AWS S3, Sentry, Google/Facebook/Github developer accounts. These are necessary only if you want to activate these options.

Except for the DNS setup that is usually done on your domain registrar interface, all the below steps are to be done on your server. The commands are to run with

bash
(or any bash-compatible shell like
zsh
) being the shell. If you use other shells like
fish
, please make sure to adapt the commands.

Some utility packages

These packages are used to verify the setup. Install them by:

sudo apt install -y dnsutils

Create a directory to store SimpleLogin data:

mkdir sl
mkdir sl/pgp # to store PGP key
mkdir sl/db # to store database
mkdir sl/upload # to store quarantine emails

DKIM

From Wikipedia https://en.wikipedia.org/wiki/DomainKeysIdentifiedMail

DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in emails (email spoofing), a technique often used in phishing and email spam.

Setting up DKIM is highly recommended to reduce the chance your emails ending up in the recipient's Spam folder.

First you need to generate a private and public key for DKIM:

openssl genrsa -out dkim.key 1024
openssl rsa -in dkim.key -pubout -out dkim.pub.key

You will need the files

dkim.key
and
dkim.pub.key
for the next steps.

For email gurus, we have chosen 1024 key length instead of 2048 for DNS simplicity as some registrars don't play well with long TXT record.

DNS

Please note that DNS changes could take up to 24 hours to propagate. In practice, it's a lot faster though (~1 minute or so in our test). In DNS setup, we usually use domain with a trailing dot (

.
) at the end to to force using absolute domain.

MX record

Create a MX record that points

mydomain.com.
to
app.mydomain.com.
with priority 10.

To verify if the DNS works, the following command

dig @1.1.1.1 mydomain.com mx

should return:

mydomain.com.   3600    IN  MX  10 app.mydomain.com.

A record

An A record that points

app.mydomain.com.
to your server IP. To verify, the following command
dig @1.1.1.1 app.mydomain.com a

should return your server IP.

DKIM

Set up DKIM by adding a TXT record for

dkim._domainkey.mydomain.com.
with the following value:
v=DKIM1; k=rsa; p=PUBLIC_KEY

with

PUBLIC_KEY
being your
dkim.pub.key
but - remove the
-----BEGIN PUBLIC KEY-----
and
-----END PUBLIC KEY-----
- join all the lines on a single line.

For example, if your

dkim.pub.key
is
-----BEGIN PUBLIC KEY-----
ab
cd
ef
gh
-----END PUBLIC KEY-----

then the

PUBLIC_KEY
would be
abcdefgh
.

You can get the

PUBLIC_KEY
by running this command:
sed "s/-----BEGIN PUBLIC KEY-----/v=DKIM1; k=rsa; p=/g" dkim.pub.key | sed 's/-----END PUBLIC KEY-----//g' |tr -d '\n'

To verify, the following command

dig @1.1.1.1 dkim._domainkey.mydomain.com txt

should return the above value.

SPF

From Wikipedia https://en.wikipedia.org/wiki/SenderPolicyFramework

Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the email

Similar to DKIM, setting up SPF is highly recommended. Add a TXT record for

mydomain.com.
with the value:
v=spf1 mx -all

What it means is only your server can send email with

@mydomain.com
domain. To verify, the following command
dig @1.1.1.1 mydomain.com txt

should return the above value.

DMARC

From Wikipedia https://en.wikipedia.org/wiki/DMARC

It (DMARC) is designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing

Setting up DMARC is also recommended. Add a TXT record for

_dmarc.mydomain.com.
with the following value
v=DMARC1; p=quarantine; adkim=r; aspf=r

This is a

relaxed
DMARC policy. You can also use a more strict policy with
v=DMARC1; p=reject; adkim=s; aspf=s
value.

To verify, the following command

dig @1.1.1.1 _dmarc.mydomain.com txt

should return the set value.

For more information on DMARC, please consult https://tools.ietf.org/html/rfc7489

Docker

Now the boring DNS stuffs are done, let's do something more fun!

If you don't already have Docker installed on your server, please follow the steps on Docker CE for Ubuntu to install Docker.

Tips: if you are not using

root
user and you want to run Docker without the
sudo
prefix, add your account to
docker
group with the following command. You might need to exit and ssh again to your server for this to be taken into account.
sudo usermod -a -G docker $USER

Prepare the Docker network

This Docker network will be used by the other Docker containers run in the next steps. Later, we will setup Postfix to authorize this network.

sudo docker network create -d bridge \
    --subnet=240.0.0.0/24 \
    --gateway=240.0.0.1 \
    sl-network

Postgres

This section creates a Postgres database using Docker.

If you already have a Postgres database in use, you can skip this section and just copy the database configuration (i.e. host, port, username, password, database name) to use in the next sections.

Run a Postgres Docker container as your Postgres database server. Make sure to replace

myuser
and
mypassword
with something more secret.
sudo docker run -d \
    --name sl-db \
    -e POSTGRES_PASSWORD=mypassword \
    -e POSTGRES_USER=myuser \
    -e POSTGRES_DB=simplelogin \
    -p 5432:5432 \
    -v $(pwd)/sl/db:/var/lib/postgresql/data \
    --restart always \
    --network="sl-network" \
    postgres:12.1

To test whether the database operates correctly or not, run the following command:

sudo docker exec -it sl-db psql -U myuser simplelogin

you should be logged in the postgres console. Type

exit
to exit postgres console.

Postfix

Install

postfix
and
postfix-pgsql
. The latter is used to connect Postfix and the Postgres database in the next steps.
sudo apt-get install -y postfix postfix-pgsql -y

Choose "Internet Site" in Postfix installation window then keep using the proposed value as System mail name in the next window.

Replace

/etc/postfix/main.cf
with the following content. Make sure to replace
mydomain.com
by your domain.
# POSTFIX config file, adapted for SimpleLogin
smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
biff = no

appending .domain is the MUA's job.

append_dot_mydomain = no

Uncomment the next line to generate "delayed mail" warnings

#delay_warning_time = 4h

readme_directory = no

See http://www.postfix.org/COMPATIBILITY_README.html -- default to 2 on

fresh installs.

compatibility_level = 2

TLS parameters

smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache smtp_tls_security_level = may smtpd_tls_security_level = may

See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for

information on enabling SSL in the smtp client.

alias_maps = hash:/etc/aliases mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 240.0.0.0/24

Set your domain here

mydestination = myhostname = app.mydomain.com mydomain = mydomain.com myorigin = mydomain.com

relay_domains = pgsql:/etc/postfix/pgsql-relay-domains.cf transport_maps = pgsql:/etc/postfix/pgsql-transport-maps.cf

HELO restrictions

smtpd_delay_reject = yes smtpd_helo_required = yes smtpd_helo_restrictions = permit_mynetworks, reject_non_fqdn_helo_hostname, reject_invalid_helo_hostname, permit

Sender restrictions:

smtpd_sender_restrictions = permit_mynetworks, reject_non_fqdn_sender, reject_unknown_sender_domain, permit

Recipient restrictions:

smtpd_recipient_restrictions = reject_unauth_pipelining, reject_non_fqdn_recipient, reject_unknown_recipient_domain, permit_mynetworks, reject_unauth_destination, reject_rbl_client zen.spamhaus.org, reject_rbl_client bl.spamcop.net, permit

Create the

/etc/postfix/pgsql-relay-domains.cf
file with the following content. Make sure that the database config is correctly set, replace
mydomain.com
with your domain, update 'myuser' and 'mypassword' with your postgress credentials.
# postgres config
hosts = localhost
user = myuser
password = mypassword
dbname = simplelogin

query = SELECT domain FROM custom_domain WHERE domain='%s' AND verified=true UNION SELECT '%s' WHERE '%s' = 'mydomain.com' LIMIT 1;

Create the

/etc/postfix/pgsql-transport-maps.cf
file with the following content. Again, make sure that the database config is correctly set, replace
mydomain.com
with your domain, update 'myuser' and 'mypassword' with your postgress credentials.
# postgres config
hosts = localhost
user = myuser
password = mypassword
dbname = simplelogin

forward to smtp:127.0.0.1:20381 for custom domain AND email domain

query = SELECT 'smtp:127.0.0.1:20381' FROM custom_domain WHERE domain = '%s' AND verified=true UNION SELECT 'smtp:127.0.0.1:20381' WHERE '%s' = 'mydomain.com' LIMIT 1;

Finally, restart Postfix

sudo systemctl restart postfix

Run SimpleLogin Docker containers

To run the server, you need a config file. Please have a look at config example for an example to create one. Some parameters are optional and are commented out by default. Some have "dummy" values, fill them up if you want to enable these features (Paddle, AWS, etc).

Let's put your config file at

~/simplelogin.env
. Below is an example that you can use right away, make sure to replace
mydomain.com
by your domain, set
FLASK_SECRET
to a secret string, update 'myuser' and 'mypassword' with your postgress credentials.

Make sure to update the following variables and replace these values by yours.

# WebApp URL
URL=http://app.mydomain.com

domain used to create alias

EMAIL_DOMAIN=mydomain.com

transactional email is sent from this email address

[email protected]

custom domain needs to point to these MX servers

EMAIL_SERVERS_WITH_PRIORITY=[(10, "app.mydomain.com.")]

By default, new aliases must end with ".{random_word}". This is to avoid a person taking all "nice" aliases.

this option doesn't make sense in self-hosted. Set this variable to disable this option.

DISABLE_ALIAS_SUFFIX=1

If you want to use another MTA to send email, you could set the address of your MTA here

By default, emails are sent using the the same Postfix server that receives emails

POSTFIX_SERVER=my-postfix.com

the DKIM private key used to compute DKIM-Signature

DKIM_PRIVATE_KEY_PATH=/dkim.key

the DKIM public key used to setup custom domain DKIM

DKIM_PUBLIC_KEY_PATH=/dkim.pub.key

DB Connection

DB_URI=postgresql://myuser:[email protected]:5432/simplelogin

FLASK_SECRET=put_something_secret_here

GNUPGHOME=/sl/pgp

LOCAL_FILE_UPLOAD=1

Before running the webapp, you need to prepare the database by running the migration:

sudo docker run --rm \
    --name sl-migration \
    -v $(pwd)/sl:/sl \
    -v $(pwd)/sl/upload:/code/static/upload \
    -v $(pwd)/dkim.key:/dkim.key \
    -v $(pwd)/dkim.pub.key:/dkim.pub.key \
    -v $(pwd)/simplelogin.env:/code/.env \
    --network="sl-network" \
    simplelogin/app:3.2.2 flask db upgrade

This command could take a while to download the

simplelogin/app
docker image.

Init data

sudo docker run --rm \
    --name sl-init \
    -v $(pwd)/sl:/sl \
    -v $(pwd)/simplelogin.env:/code/.env \
    -v $(pwd)/dkim.key:/dkim.key \
    -v $(pwd)/dkim.pub.key:/dkim.pub.key \
    --network="sl-network" \
    simplelogin/app:3.2.2 python init_app.py

Now, it's time to run the

webapp
container!
sudo docker run -d \
    --name sl-app \
    -v $(pwd)/sl:/sl \
    -v $(pwd)/sl/upload:/code/static/upload \
    -v $(pwd)/simplelogin.env:/code/.env \
    -v $(pwd)/dkim.key:/dkim.key \
    -v $(pwd)/dkim.pub.key:/dkim.pub.key \
    -p 7777:7777 \
    --restart always \
    --network="sl-network" \
    simplelogin/app:3.2.2

Next run the

email handler
sudo docker run -d \
    --name sl-email \
    -v $(pwd)/sl:/sl \
    -v $(pwd)/sl/upload:/code/static/upload \
    -v $(pwd)/simplelogin.env:/code/.env \
    -v $(pwd)/dkim.key:/dkim.key \
    -v $(pwd)/dkim.pub.key:/dkim.pub.key \
    -p 20381:20381 \
    --restart always \
    --network="sl-network" \
    simplelogin/app:3.2.2 python email_handler.py

Nginx

Install Nginx and make sure to replace

mydomain.com
by your domain
sudo apt-get install -y nginx

Then, create

/etc/nginx/sites-enabled/simplelogin
with the following lines:
server {
    server_name  app.mydomain.com;

location / {
    proxy_pass http://localhost:7777;
}

}

Reload Nginx with the command below

sudo systemctl reload nginx

At this step, you should also setup the SSL for Nginx. Certbot can be a good option if you want a free SSL certificate.

Enjoy!

If all of the above steps are successful, open http://app.mydomain.com/ and create your first account!

By default, new accounts are not premium so don't have unlimited alias. To make your account premium, please go to the database, table "users" and set "lifetime" column to "1" or "TRUE".

You don't have to pay anything to SimpleLogin to use all its features. You could make a donation to SimpleLogin on our Patreon page at https://www.patreon.com/simplelogin if you wish though.

Misc

The above self-hosting instructions correspond to a freshly Ubuntu server and doesn't cover all possible server configuration. Below are pointers to different topics:

Contributing

All work on SimpleLogin happens directly on GitHub.

Run code locally

The project uses - Python 3.7+ and poetry to manage dependencies - Node v10 for front-end.

First, install all dependencies by running the following command. Feel free to use

virtualenv
or similar tools to isolate development environment.
poetry install

You also need to install

gpg
, on Mac it can be done with:
brew install gnupg

Then make sure all tests pass

pytest

Install npm packages

cd static && npm install

To run the code locally, please create a local setting file based on

example.env
:
cp example.env .env

Make sure to uncomment the

RESET_DB=true
to create the database locally.

Feel free to custom your

.env
file, it would be your default setting when developing locally. This file is ignored by git.

You don't need all the parameters, for example, if you don't update images to s3, then

BUCKET
,
AWS_ACCESS_KEY_ID
can be empty or if you don't use login with Github locally,
GITHUB_CLIENT_ID
doesn't have to be filled. The
example.env
file contains minimal requirement so that if you run:
python3 server.py

then open http://localhost:7777, you should be able to login with the following account

[email protected] / password

Database migration

The database migration is handled by

alembic

Whenever the model changes, a new migration has to be created.

If you have Docker installed, you can create the migration by the following script:

sh new_migration.sh 

Make sure to review the migration script before committing it. Sometimes (very rarely though), the automatically generated script can be incorrect.

We cannot use the local database to generate migration script as the local database doesn't use migration. It is created via

db.create_all()
(cf
fake_data()
method). This is convenient for development and unit tests as we don't have to wait for the migration.

Code structure

The repo consists of the three following entry points:

  • wsgi.py and server.py: the webapp.
  • email_handler.py: the email handler.
  • cron.py: the cronjob.

Here are the small sum-ups of the directory structures and their roles:

  • app/: main Flask app. It is structured into different packages representing different features like oauth, api, dashboard, etc.
  • local_data/: contains files to facilitate the local development. They are replaced during the deployment.
  • migrations/: generated by flask-migrate. Edit these files will be only edited when you spot (very rare) errors on the database migration files.
  • static/: files available at
    /static
    url.
  • templates/: contains both html and email templates.
  • tests/: tests. We don't really distinguish unit, functional or integration test. A test is simply here to make sure a feature works correctly.

The code is formatted using https://github.com/psf/black, to format the code, simply run

black .

Test sending email

swaks is used for sending test emails to the

email_handler
.

mailcatcher is used to receive forwarded emails.

There are several steps to set up the email handler

1) run mailcatcher

mailcatcher

2) Make sure to set the following variables in the

.env
file
NOT_SEND_EMAIL=true
POSTFIX_SERVER=localhost
POSTFIX_PORT=1025

3) Run email_handler

python email_handler.py

4) Send a test email

swaks --to [email protected] --from [email protected] --server 127.0.0.1:20381

Now open http://localhost:1080/, you should see the test email.

API

SimpleLogin current API clients are Chrome/Firefox/Safari extension and mobile (iOS/Android) app. These clients rely on

API Code
for authentication.

Once the

Api Code
is obtained, either via user entering it (in Browser extension case) or by logging in (in Mobile case), the client includes the
api code
in
Authentication
header in almost all requests.

For some endpoints, the

hostname
should be passed in query string.
hostname
is the the URL hostname (cf https://en.wikipedia.org/wiki/URL), for ex if URL is http://www.example.com/index.html then the hostname is
www.example.com
. This information is important to know where an alias is used in order to suggest user the same alias if they want to create on alias on the same website in the future.

If error, the API returns 4** with body containing the error message, for example:

{
  "error":  "request body cannot be empty"
}

The error message could be displayed to user as-is, for example for when user exceeds their alias quota. Some errors should be fixed during development however: for example error like

request body cannot be empty
is there to catch development error and should never be shown to user.

All following endpoint return

401
status code if the API Key is incorrect.

Authentication endpoints

POST /api/auth/login

Input: - email - password - device: device name. Used to create the API Key. Should be humanly readable so user can manage later on the "API Key" page.

Output: - name: user name, could be an empty string - email: user email - mfaenabled: boolean - mfakey: only useful when user enables MFA. In this case, user needs to enter their OTP token in order to login. - api_key: if MFA is not enabled, the

api key
is returned right away.

The

api_key
is used in all subsequent requests. It's empty if MFA is enabled. If user hasn't enabled MFA,
mfa_key
is empty.

Return 403 if user has enabled FIDO. The client can display a message to suggest user to use the

API Key
instead.

POST /api/auth/mfa

Input: - mfatoken: OTP token that user enters - mfakey: MFA key obtained in previous auth request, e.g. /api/auth/login - device: the device name, used to create an ApiKey associated with this device

Output: - name: user name, could be an empty string - api_key: if MFA is not enabled, the

api key
is returned right away. - email: user email

The

api_key
is used in all subsequent requests. It's empty if MFA is enabled. If user hasn't enabled MFA,
mfa_key
is empty.

POST /api/auth/facebook

Input: - facebook_token: Facebook access token - device: device name. Used to create the API Key. Should be humanly readable so user can manage later on the "API Key" page.

Output: Same output as for

/api/auth/login
endpoint

POST /api/auth/google

Input: - google_token: Google access token - device: device name. Used to create the API Key. Should be humanly readable so user can manage later on the "API Key" page.

Output: Same output as for

/api/auth/login
endpoint

POST /api/auth/register

Input: - email - password

Output: 200 means user is going to receive an email that contains an activation code. User needs to enter this code to confirm their account -> next endpoint.

POST /api/auth/activate

Input: - email - code: the activation code

Output: - 200: account is activated. User can login now - 400: wrong email, code - 410: wrong code too many times. User needs to ask for an reactivation -> next endpoint

POST /api/auth/reactivate

Input: - email

Output: - 200: user is going to receive an email that contains the activation code.

POST /api/auth/forgot_password

Input: - email

Output: always return 200, even if email doesn't exist. User need to enter correctly their email.

GET /api/user_info

Given the API Key, return user name and whether user is premium. This endpoint could be used to validate the api key.

Input: -

Authentication
header that contains the api key

Output: if api key is correct, return a json with user name and whether user is premium, for example:

{
  "name": "John Wick",
  "is_premium": false,
  "email": "[email protected]",
  "in_trial": true
}

If api key is incorrect, return 401.

POST /api/api_key

Create a new API Key

Input: -

Authentication
header that contains the api key - Or the correct cookie is set, i.e. user is already logged in on the web - device: device's name

Output - 401 if user is not authenticated - 201 with the

api_key
{
  "api_key": "long string"
}

GET /api/logout

Log user out

Input: -

Authentication
header that contains the api key - Or the correct cookie is set, i.e. user is already logged in on the web

Output: - 401 if user is not authenticated - 200 if success

Alias endpoints

GET /api/v4/alias/options

User alias info and suggestion. Used by the first extension screen when user opens the extension.

Input: -

Authentication
header that contains the api key - (Optional but recommended)
hostname
passed in query string.

Output: a json with the following field: - cancreate: boolean. Whether user can create new alias - suffixes: list of

[suffix, signed-suffix]
. List of alias
suffix
that user can use. The
signed-suffix
is necessary to avoid request tampering. - prefix
suggestion: string. Suggestion for the

alias prefix
. Usually this is the website name extracted from
hostname
. If no
hostname
, then the
prefix_suggestion
is empty. - recommendation: optional field, dictionary. If an alias is already used for this website, the recommendation will be returned. There are 2 subfields in
recommendation
:
alias
which is the recommended alias and
hostname
is the website on which this alias is used before.

For ex:

json
{
    "can_create": true,
    "prefix_suggestion": "",
    "suffixes": [
        [
            "@ab.cd",
            "@ab.cd.Xq2BOA.zBebBB-QYikFkbPZ9CPKGpJ2-PU"
        ],
        [
            "[email protected]",
            "[email protected]_Frw"
        ]
    ]
}

POST /api/v3/alias/custom/new

Create a new custom alias.

Input: -

Authentication
header that contains the api key - (Optional but recommended)
hostname
passed in query string - Request Message Body in json (
Content-Type
is
application/json
) - aliasprefix: string. The first part of the alias that user can choose. - signedsuffix: should be one of the suffixes returned in the
GET /api/v4/alias/options
endpoint. - mailboxids: list of mailboxid that "owns" this alias - (Optional) note: alias note - (Optional) name: alias name

Output: If success, 201 with the new alias info. Use the same format as in GET /api/aliases/:alias_id

POST /api/alias/random/new

Create a new random alias.

Input: -

Authentication
header that contains the api key - (Optional but recommended)
hostname
passed in query string - (Optional) mode: either
uuid
or
word
. By default, use the user setting when creating new random alias. - Request Message Body in json (
Content-Type
is
application/json
) - (Optional) note: alias note

Output: If success, 201 with the new alias info. Use the same format as in GET /api/aliases/:alias_id

GET /api/v2/aliases

Get user aliases.

Input: -

Authentication
header that contains the api key -
page_id
in query. Used for the pagination. The endpoint returns maximum 20 aliases for each page.
page_id
starts at 0. - (Optional) query: included in request body. Some frameworks might prevent GET request having a non-empty body, in this case this endpoint also supports POST.

Output: If success, 200 with the list of aliases. Each alias has the following fields:

  • id
  • email
  • name
  • enabled
  • creation_timestamp
  • note
  • nb_block
  • nb_forward
  • nb_reply
  • support_pgp: whether an alias can support PGP, i.e. when one of alias's mailboxes supports PGP.
  • disablepgp: whether the PGP is disabled on this alias. This field should only be used when `supportpgp
    is true. 
    By setting
    disable_pgp=true`, a user can explicitly disable PGP on an alias even its mailboxes support PGP.
  • mailbox: obsolete, should use
    mailboxes
    instead.
    • id
    • email
  • mailboxes: list of mailbox, contains at least 1 mailbox.
    • id
    • email
  • (optional) latest_activity:
    • action: forward|reply|block|bounced
    • timestamp
    • contact:
      • email
      • name
      • reverse_alias

Here's an example:

{
  "aliases": [
    {
      "creation_date": "2020-04-06 17:57:14+00:00",
      "creation_timestamp": 1586195834,
      "email": "[email protected]",
      "name": "A Name",
      "enabled": true,
      "id": 3,
      "mailbox": {
        "email": "[email protected]",
        "id": 1
      },
      "mailboxes": [
        {
          "email": "[email protected]",
          "id": 2
        },
        {
          "email": "[email protected]",
          "id": 1
        }
      ],
      "latest_activity": {
        "action": "forward",
        "contact": {
          "email": "[email protected]",
          "name": null,
          "reverse_alias": "\"c1 at example.com\" "
        },
        "timestamp": 1586195834
      },
      "nb_block": 0,
      "nb_forward": 1,
      "nb_reply": 0,
      "note": null
    }
  ]
}

GET /api/aliases/:alias_id

Get alias info

Input: -

Authentication
header that contains the api key -
alias_id
in url

Output: Alias info, use the same format as in /api/v2/aliases. For example:

{
  "creation_date": "2020-04-06 17:57:14+00:00",
  "creation_timestamp": 1586195834,
  "email": "[email protected]",
  "name": "A Name",
  "enabled": true,
  "id": 3,
  "mailbox": {
    "email": "[email protected]",
    "id": 1
  },
  "mailboxes": [
    {
      "email": "[email protected]",
      "id": 2
    },
    {
      "email": "[email protected]",
      "id": 1
    }
  ],
  "latest_activity": {
    "action": "forward",
    "contact": {
      "email": "[email protected]",
      "name": null,
      "reverse_alias": "\"c1 at example.com\" "
    },
    "timestamp": 1586195834
  },
  "nb_block": 0,
  "nb_forward": 1,
  "nb_reply": 0,
  "note": null
}

DELETE /api/aliases/:alias_id

Delete an alias

Input: -

Authentication
header that contains the api key -
alias_id
in url.

Output: If success, 200.

{
    "deleted": true
}

POST /api/aliases/:alias_id/toggle

Enable/disable alias

Input: -

Authentication
header that contains the api key -
alias_id
in url.

Output: If success, 200 along with the new alias status:

{
    "enabled": false
}

GET /api/aliases/:alias_id/activities

Get activities for a given alias.

Input: -

Authentication
header that contains the api key -
alias_id
: the alias id, passed in url. -
page_id
used in request query (
?page_id=0
). The endpoint returns maximum 20 aliases for each page.
page_id
starts at 0.

Output: If success, 200 with the list of activities, for example:

{
  "activities": [
    {
      "action": "reply",
      "from": "[email protected]",
      "timestamp": 1580903760,
      "to": "[email protected]",
      "reverse_alias": "\"marketing at example.com\" "
    },
    {
      "action": "reply",
      "from": "[email protected]",
      "timestamp": 1580903760,
      "to": "[email protected]",
      "reverse_alias": "\"marketing at example.com\" "
    }
  ]
}

PUT /api/aliases/:alias_id

Update alias info.

Input: -

Authentication
header that contains the api key -
alias_id
in url. - (optional)
note
in request body - (optional)
mailbox_id
in request body - (optional)
name
in request body - (optional)
mailbox_ids
in request body: array of mailboxid - (optional) `disablepgp` in request body: boolean

Output: If success, return 200

GET /api/aliases/:alias_id/contacts

Get contacts for a given alias.

Input: -

Authentication
header that contains the api key -
alias_id
: the alias id, passed in url. -
page_id
used in request query (
?page_id=0
). The endpoint returns maximum 20 contacts for each page.
page_id
starts at 0.

Output: If success, 200 with the list of contacts, for example:

{
  "contacts": [
    {
      "id": 1,
      "contact": "[email protected]",
      "creation_date": "2020-02-21 11:35:00+00:00",
      "creation_timestamp": 1582284900,
      "last_email_sent_date": null,
      "last_email_sent_timestamp": null,
      "reverse_alias": "marketing at example.com "
    },
    {
      "id": 2,
      "contact": "[email protected]",
      "creation_date": "2020-02-21 11:35:00+00:00",
      "creation_timestamp": 1582284900,
      "last_email_sent_date": "2020-02-21 11:35:00+00:00",
      "last_email_sent_timestamp": 1582284900,
      "reverse_alias": "newsletter at example.com "
    }
  ]
}

Please note that lastemailsenttimestamp and lastemailsentdate can be null.

POST /api/aliases/:alias_id/contacts

Create a new contact for an alias.

Input: -

Authentication
header that contains the api key -
alias_id
in url. -
contact
in request body

Output: If success, return 201 Return 409 if contact is already added.

{
  "id": 1,
  "contact": "First Last ",
  "creation_date": "2020-03-14 11:52:41+00:00",
  "creation_timestamp": 1584186761,
  "last_email_sent_date": null,
  "last_email_sent_timestamp": null,
  "reverse_alias": "First Last [email protected] "
}

Mailbox endpoints

GET /api/mailboxes

Get user verified mailboxes.

Input: -

Authentication
header that contains the api key

Output: List of mailboxes. Each mailbox has id, email, default, creation_timestamp field

{
  "mailboxes": [
    {
      "email": "[email protected]",
      "id": 1,
      "default": true,
      "creation_timestamp": 1590918512,
      "nb_alias": 10
    },
    {
      "email": "[email protected]",
      "id": 2,
      "default": false,
      "creation_timestamp": 1590918512,
      "nb_alias": 0
    }
  ]
}

POST /api/mailboxes

Create a new mailbox

Input: -

Authentication
header that contains the api key - email: the new mailbox address

Output: - 201 along with the following response if new mailbox is created successfully. User is going to receive a verification email. - id: integer - email: the mailbox email address - verified: boolean. - default: whether is the default mailbox. User cannot delete the default mailbox - 400 with error message otherwise. The error message can be displayed to user.

DELETE /api/mailboxes/:mailbox_id

Delete a mailbox. User cannot delete the default mailbox

Input: -

Authentication
header that contains the api key -
mailbox_id
: in url

Output: - 200 if deleted successfully - 400 if error

PUT /api/mailboxes/:mailbox_id

Update a mailbox.

Input: -

Authentication
header that contains the api key -
mailbox_id
: in url - (optional)
default
: boolean. Set a mailbox as default mailbox. - (optional)
email
: email address. Change a mailbox email address. - (optional)
cancel_email_change
: boolean. Cancel mailbox email change.

Output: - 200 if updated successfully - 400 if error

Contact endpoints

DELETE /api/contacts/:contact_id

Delete a contact

Input: -

Authentication
header that contains the api key -
contact_id
in url.

Output: If success, 200.

{
    "deleted": true
}

Notification endpoints

GET /api/notifications

Get notifications

Input: -

Authentication
in header: the api key - page in url: the page number, starts at 0

Output: - more: whether there's more notifications - notifications: list of notification, each notification has: - id - message: the message in html - read: whether the user has read the notification - created_at: when the notification is created

For example

{
    "more": false,
    "notifications": [
        {
            "created_at": "2 minutes ago",
            "id": 1,
            "message": "Hey!",
            "read": false
        }
    ]
}

POST /api/notifications/:notification_id

Mark a notification as read

Input: -

Authentication
in header: the api key - notification_id in url: the page number, starts at 0

Output: 200 if success

Misc endpoints

POST /api/apple/process_payment

Process payment receipt

Input: -

Authentication
in header: the api key -
receipt_data
in body: the receiptdata base64Encoded returned by StoreKit, i.e.
rawReceiptData.base64EncodedString
- (optional) `is
macapp` in body: if this field is present, the request is sent from the MacApp (Safari Extension) and not iOS app.

Output: 200 if user is upgraded successfully 4** if any error.

OAuth

SL currently supports code and implicit flow.

Code flow

To trigger the code flow locally, you can go to the following url after running

python server.py
:
http://localhost:7777/oauth/authorize?client_id=client-id&state=123456&response_type=code&redirect_uri=http%3A%2F%2Flocalhost%3A7000%2Fcallback&state=random_string

You should see there the authorization page where user is asked for permission to share their data. Once user approves, user is redirected to this url with an

authorization code
:
http://localhost:7000/callback?state=123456&code=the_code

Next, exchange the code to get the token with

{code}
replaced by the code obtained in previous step. The
http
tool used here is https://httpie.org
http -f -a client-id:client-secret http://localhost:7777/oauth/token grant_type=authorization_code code={code}

This should return an

access token
that allows to get user info via the following command. Again,
http
tool is used.
http http://localhost:7777/oauth/user_info 'Authorization:Bearer {token}'

Implicit flow

Similar to code flow, except for the the

access token
which we we get back with the redirection. For implicit flow, the url is
http://localhost:7777/oauth/authorize?client_id=client-id&state=123456&response_type=token&redirect_uri=http%3A%2F%2Flocalhost%3A7000%2Fcallback&state=random_string

OpenID and OAuth2 response_type & scope

According to the sharing web blog titled Diagrams of All The OpenID Connect Flows, we should pay attention to:

  • response_type
    can be either
    code, token, id_token
    or any combination of those attributes.
  • scope
    might contain
    openid

Below are the potential combinations that are taken into account in SL until now:

response_type=code
    scope:
        with `openid` in scope, return `id_token` at /token: OK
        without: OK

response_type=token scope: with and without openid, nothing to do: OK

response_type=id_token return id_token in /authorization endpoint

response_type=id_token token return id_token in addition to access_token in /authorization endpoint

response_type=id_token code return id_token in addition to authorization_code in /authorization endpoint

❤️ Contributors

Thanks go to these wonderful people:

Dung Nguyen Van
Dung Nguyen Van

Giuseppe Federico
Giuseppe Federico

Ninh Dinh
Ninh Dinh

Tung Nguyen V. N.
Tung Nguyen V. N.

Son Nguyen Kim
Son Nguyen Kim

Raymond Nook
Raymond Nook

Sibren Vasse
Sibren Vasse

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.