Are you sure you want to delete this task? Once this task is deleted, it cannot be recovered.
Mura Li d77176912b | 5 years ago | |
---|---|---|
.. | ||
.travis.yml | 5 years ago | |
CHANGELOG.md | 5 years ago | |
CONTRIBUTING.md | 5 years ago | |
LICENSE | 7 years ago | |
README.md | 5 years ago | |
auth.go | 7 years ago | |
doc.go | 7 years ago | |
message.go | 7 years ago | |
mime.go | 7 years ago | |
mime_go14.go | 7 years ago | |
send.go | 7 years ago | |
smtp.go | 7 years ago | |
writeto.go | 7 years ago |
Gomail is a simple and efficient package to send emails. It is well tested and
documented.
Gomail can only send emails using an SMTP server. But the API is flexible and it
is easy to implement other methods for sending emails using a local Postfix, an
API, etc.
It is versioned using gopkg.in so I promise
there will never be backward incompatible changes within each version.
It requires Go 1.2 or newer. With Go 1.5, no external dependencies are used.
Gomail supports:
https://godoc.org/gopkg.in/gomail.v2
go get gopkg.in/gomail.v2
See the examples in the documentation.
If you get this error it means the certificate used by the SMTP server is not
considered valid by the client running Gomail. As a quick workaround you can
bypass the verification of the server's certificate chain and host name by using
SetTLSConfig
:
package main
import (
"crypto/tls"
"gopkg.in/gomail.v2"
)
func main() {
d := gomail.NewDialer("smtp.example.com", 587, "user", "123456")
d.TLSConfig = &tls.Config{InsecureSkipVerify: true}
// Send emails using d.
}
Note, however, that this is insecure and should not be used in production.
Contributions are more than welcome! See CONTRIBUTING.md for
more info.
See CHANGELOG.md.
You can ask questions on the Gomail
thread
in the Go mailing-list.
本项目是群体化方法与技术的开源实现案例,在基于Gitea的基础上,进一步支持社交化的协同开发、协同学习、协同研究等群体创新实践服务,特别是针对新一代人工智能技术特点,重点支持项目管理、git代码管理、大数据集存储管理与智能计算平台接入。
Go SVG Roff JavaScript Shell other
Dear OpenI User
Thank you for your continuous support to the Openl Qizhi Community AI Collaboration Platform. In order to protect your usage rights and ensure network security, we updated the Openl Qizhi Community AI Collaboration Platform Usage Agreement in January 2024. The updated agreement specifies that users are prohibited from using intranet penetration tools. After you click "Agree and continue", you can continue to use our services. Thank you for your cooperation and understanding.
For more agreement content, please refer to the《Openl Qizhi Community AI Collaboration Platform Usage Agreement》