2019-05-14 19:07:48 +02:00
|
|
|
package compose
|
|
|
|
|
|
|
|
import (
|
2020-11-11 23:50:35 +01:00
|
|
|
"bytes"
|
2019-05-14 20:05:29 +02:00
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
2019-05-16 01:41:21 +02:00
|
|
|
"io"
|
2019-05-14 20:05:29 +02:00
|
|
|
"net/url"
|
2019-07-27 17:19:49 +02:00
|
|
|
"os/exec"
|
2019-05-14 20:05:29 +02:00
|
|
|
"strings"
|
2019-05-14 20:18:01 +02:00
|
|
|
"time"
|
2019-05-14 20:05:29 +02:00
|
|
|
|
|
|
|
"github.com/emersion/go-sasl"
|
|
|
|
"github.com/emersion/go-smtp"
|
2019-07-28 14:33:46 +02:00
|
|
|
"github.com/google/shlex"
|
2019-05-25 17:56:56 +02:00
|
|
|
"github.com/pkg/errors"
|
2019-05-14 19:07:48 +02:00
|
|
|
|
2022-07-11 20:23:42 +02:00
|
|
|
"git.sr.ht/~rjarry/aerc/commands/mode"
|
2021-11-05 10:19:46 +01:00
|
|
|
"git.sr.ht/~rjarry/aerc/lib"
|
2022-03-22 09:52:27 +01:00
|
|
|
"git.sr.ht/~rjarry/aerc/logging"
|
2021-11-05 10:19:46 +01:00
|
|
|
"git.sr.ht/~rjarry/aerc/models"
|
|
|
|
"git.sr.ht/~rjarry/aerc/widgets"
|
|
|
|
"git.sr.ht/~rjarry/aerc/worker/types"
|
2020-11-10 20:27:30 +01:00
|
|
|
"github.com/emersion/go-message/mail"
|
2020-05-26 13:29:58 +02:00
|
|
|
"golang.org/x/oauth2"
|
2019-05-14 19:07:48 +02:00
|
|
|
)
|
|
|
|
|
2019-06-27 19:33:11 +02:00
|
|
|
type Send struct{}
|
|
|
|
|
2019-05-14 19:07:48 +02:00
|
|
|
func init() {
|
2019-06-27 19:33:11 +02:00
|
|
|
register(Send{})
|
|
|
|
}
|
|
|
|
|
2019-09-03 21:34:03 +02:00
|
|
|
func (Send) Aliases() []string {
|
2019-06-27 19:33:11 +02:00
|
|
|
return []string{"send"}
|
|
|
|
}
|
|
|
|
|
2019-09-03 21:34:03 +02:00
|
|
|
func (Send) Complete(aerc *widgets.Aerc, args []string) []string {
|
2019-06-27 19:33:11 +02:00
|
|
|
return nil
|
2019-05-14 19:07:48 +02:00
|
|
|
}
|
|
|
|
|
2019-09-03 21:34:03 +02:00
|
|
|
func (Send) Execute(aerc *widgets.Aerc, args []string) error {
|
2019-05-14 19:07:48 +02:00
|
|
|
if len(args) > 1 {
|
2019-06-27 19:33:11 +02:00
|
|
|
return errors.New("Usage: send")
|
2019-05-14 19:07:48 +02:00
|
|
|
}
|
2022-07-14 18:29:56 +02:00
|
|
|
tab := aerc.SelectedTab()
|
|
|
|
if tab == nil {
|
|
|
|
return errors.New("No selected tab")
|
|
|
|
}
|
|
|
|
composer, _ := tab.Content.(*widgets.Composer)
|
|
|
|
tabName := tab.Name
|
2019-05-14 20:05:29 +02:00
|
|
|
config := composer.Config()
|
|
|
|
|
2022-07-30 22:42:49 +02:00
|
|
|
outgoing, err := config.Outgoing.ConnectionString()
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "ReadCredentials(outgoing)")
|
|
|
|
}
|
|
|
|
if outgoing == "" {
|
2019-05-14 20:05:29 +02:00
|
|
|
return errors.New(
|
|
|
|
"No outgoing mail transport configured for this account")
|
|
|
|
}
|
|
|
|
|
2020-11-10 20:27:30 +01:00
|
|
|
header, err := composer.PrepareHeader()
|
2019-05-14 20:05:29 +02:00
|
|
|
if err != nil {
|
2019-05-25 17:56:56 +02:00
|
|
|
return errors.Wrap(err, "PrepareHeader")
|
2019-05-14 20:05:29 +02:00
|
|
|
}
|
2020-11-10 20:27:30 +01:00
|
|
|
rcpts, err := listRecipients(header)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "listRecipients")
|
|
|
|
}
|
2019-05-14 20:05:29 +02:00
|
|
|
|
|
|
|
if config.From == "" {
|
|
|
|
return errors.New("No 'From' configured for this account")
|
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
// TODO: the user could conceivably want to use a different From and sender
|
2020-11-10 20:35:47 +01:00
|
|
|
from, err := mail.ParseAddress(config.From)
|
2019-05-14 20:05:29 +02:00
|
|
|
if err != nil {
|
2019-05-25 17:56:56 +02:00
|
|
|
return errors.Wrap(err, "ParseAddress(config.From)")
|
2019-05-14 20:05:29 +02:00
|
|
|
}
|
|
|
|
|
2022-07-30 22:42:49 +02:00
|
|
|
uri, err := url.Parse(outgoing)
|
2020-11-11 23:50:35 +01:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "url.Parse(outgoing)")
|
|
|
|
}
|
|
|
|
|
|
|
|
scheme, auth, err := parseScheme(uri)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
var starttls bool
|
|
|
|
if starttls_, ok := config.Params["smtp-starttls"]; ok {
|
|
|
|
starttls = starttls_ == "yes"
|
|
|
|
}
|
|
|
|
ctx := sendCtx{
|
|
|
|
uri: uri,
|
|
|
|
scheme: scheme,
|
|
|
|
auth: auth,
|
|
|
|
starttls: starttls,
|
|
|
|
from: from,
|
|
|
|
rcpts: rcpts,
|
|
|
|
}
|
|
|
|
|
2022-10-17 19:19:33 +02:00
|
|
|
warn, err := composer.ShouldWarnAttachment()
|
|
|
|
if err != nil || warn {
|
|
|
|
msg := "You may have forgotten an attachment."
|
|
|
|
if err != nil {
|
|
|
|
logging.Warnf("failed to check for a forgotten attachment: %v", err)
|
|
|
|
msg = "Failed to check for a forgotten attachment."
|
|
|
|
}
|
|
|
|
|
|
|
|
prompt := widgets.NewPrompt(aerc.Config(),
|
|
|
|
msg+" Abort send? [Y/n] ",
|
|
|
|
func(text string) {
|
|
|
|
if text == "n" || text == "N" {
|
|
|
|
send(aerc, composer, ctx, header, tabName)
|
|
|
|
}
|
|
|
|
}, func(cmd string) ([]string, string) {
|
|
|
|
if cmd == "" {
|
|
|
|
return []string{"y", "n"}, ""
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, ""
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
aerc.PushPrompt(prompt)
|
|
|
|
} else {
|
|
|
|
send(aerc, composer, ctx, header, tabName)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func send(aerc *widgets.Aerc, composer *widgets.Composer, ctx sendCtx,
|
|
|
|
header *mail.Header, tabName string,
|
|
|
|
) {
|
2021-01-24 18:00:23 +01:00
|
|
|
// we don't want to block the UI thread while we are sending
|
|
|
|
// so we do everything in a goroutine and hide the composer from the user
|
2020-11-11 23:50:35 +01:00
|
|
|
aerc.RemoveTab(composer)
|
|
|
|
aerc.PushStatus("Sending...", 10*time.Second)
|
|
|
|
|
2022-07-11 20:23:42 +02:00
|
|
|
// enter no-quit mode
|
|
|
|
mode.NoQuit()
|
|
|
|
|
2021-01-24 18:00:23 +01:00
|
|
|
var copyBuf bytes.Buffer // for the Sent folder content if CopyTo is set
|
2022-10-17 19:19:33 +02:00
|
|
|
config := composer.Config()
|
2021-01-24 18:00:23 +01:00
|
|
|
|
|
|
|
failCh := make(chan error)
|
2022-07-31 22:16:40 +02:00
|
|
|
// writer
|
2020-11-11 23:50:35 +01:00
|
|
|
go func() {
|
2022-03-22 09:52:27 +01:00
|
|
|
defer logging.PanicHandler()
|
|
|
|
|
2021-01-24 18:00:23 +01:00
|
|
|
var sender io.WriteCloser
|
2022-10-17 19:19:33 +02:00
|
|
|
var err error
|
2021-01-24 18:00:23 +01:00
|
|
|
switch ctx.scheme {
|
|
|
|
case "smtp":
|
|
|
|
fallthrough
|
|
|
|
case "smtps":
|
|
|
|
sender, err = newSmtpSender(ctx)
|
|
|
|
case "":
|
|
|
|
sender, err = newSendmailSender(ctx)
|
|
|
|
default:
|
|
|
|
sender, err = nil, fmt.Errorf("unsupported scheme %v", ctx.scheme)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
failCh <- errors.Wrap(err, "send:")
|
2021-02-05 21:20:17 +01:00
|
|
|
return
|
2021-01-24 18:00:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var writer io.Writer = sender
|
|
|
|
|
|
|
|
if config.CopyTo != "" {
|
|
|
|
writer = io.MultiWriter(writer, ©Buf)
|
|
|
|
}
|
|
|
|
err = composer.WriteMessage(header, writer)
|
2020-11-11 23:50:35 +01:00
|
|
|
if err != nil {
|
2021-01-24 18:00:23 +01:00
|
|
|
failCh <- err
|
2020-11-11 23:50:35 +01:00
|
|
|
return
|
|
|
|
}
|
2021-01-24 18:00:23 +01:00
|
|
|
failCh <- sender.Close()
|
2020-11-11 23:50:35 +01:00
|
|
|
}()
|
|
|
|
|
2022-07-31 22:16:40 +02:00
|
|
|
// cleanup + copy to sent
|
2020-11-11 23:50:35 +01:00
|
|
|
go func() {
|
2022-03-22 09:52:27 +01:00
|
|
|
defer logging.PanicHandler()
|
|
|
|
|
2022-07-11 20:23:42 +02:00
|
|
|
// leave no-quit mode
|
|
|
|
defer mode.NoQuitDone()
|
|
|
|
|
2022-10-17 19:19:33 +02:00
|
|
|
err := <-failCh
|
2020-11-11 23:50:35 +01:00
|
|
|
if err != nil {
|
2021-02-05 21:20:17 +01:00
|
|
|
aerc.PushError(strings.ReplaceAll(err.Error(), "\n", " "))
|
2020-11-11 23:50:35 +01:00
|
|
|
aerc.NewTab(composer, tabName)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if config.CopyTo != "" {
|
|
|
|
aerc.PushStatus("Copying to "+config.CopyTo, 10*time.Second)
|
2021-01-24 18:00:23 +01:00
|
|
|
errch := copyToSent(composer.Worker(), config.CopyTo,
|
|
|
|
copyBuf.Len(), ©Buf)
|
|
|
|
err = <-errch
|
2020-11-11 23:50:35 +01:00
|
|
|
if err != nil {
|
|
|
|
errmsg := fmt.Sprintf(
|
|
|
|
"message sent, but copying to %v failed: %v",
|
|
|
|
config.CopyTo, err.Error())
|
|
|
|
aerc.PushError(errmsg)
|
|
|
|
composer.SetSent()
|
|
|
|
composer.Close()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
aerc.PushStatus("Message sent.", 10*time.Second)
|
|
|
|
composer.SetSent()
|
|
|
|
composer.Close()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
func listRecipients(h *mail.Header) ([]*mail.Address, error) {
|
|
|
|
var rcpts []*mail.Address
|
|
|
|
for _, key := range []string{"to", "cc", "bcc"} {
|
|
|
|
list, err := h.AddressList(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
rcpts = append(rcpts, list...)
|
|
|
|
}
|
|
|
|
return rcpts, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type sendCtx struct {
|
|
|
|
uri *url.URL
|
|
|
|
scheme string
|
|
|
|
auth string
|
|
|
|
starttls bool
|
|
|
|
from *mail.Address
|
|
|
|
rcpts []*mail.Address
|
|
|
|
}
|
|
|
|
|
|
|
|
func newSendmailSender(ctx sendCtx) (io.WriteCloser, error) {
|
|
|
|
args, err := shlex.Split(ctx.uri.Path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(args) == 0 {
|
|
|
|
return nil, fmt.Errorf("no command specified")
|
|
|
|
}
|
|
|
|
bin := args[0]
|
2022-03-09 22:48:00 +01:00
|
|
|
rs := make([]string, len(ctx.rcpts))
|
2020-11-11 23:50:35 +01:00
|
|
|
for i := range ctx.rcpts {
|
|
|
|
rs[i] = ctx.rcpts[i].Address
|
|
|
|
}
|
|
|
|
args = append(args[1:], rs...)
|
|
|
|
cmd := exec.Command(bin, args...)
|
|
|
|
s := &sendmailSender{cmd: cmd}
|
|
|
|
s.stdin, err = s.cmd.StdinPipe()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "cmd.StdinPipe")
|
|
|
|
}
|
|
|
|
err = s.cmd.Start()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "cmd.Start")
|
|
|
|
}
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type sendmailSender struct {
|
|
|
|
cmd *exec.Cmd
|
|
|
|
stdin io.WriteCloser
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *sendmailSender) Write(p []byte) (int, error) {
|
|
|
|
return s.stdin.Write(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *sendmailSender) Close() error {
|
|
|
|
se := s.stdin.Close()
|
|
|
|
ce := s.cmd.Wait()
|
|
|
|
if se != nil {
|
|
|
|
return se
|
|
|
|
}
|
|
|
|
return ce
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseScheme(uri *url.URL) (scheme string, auth string, err error) {
|
|
|
|
scheme = ""
|
|
|
|
auth = "plain"
|
|
|
|
if uri.Scheme != "" {
|
|
|
|
parts := strings.Split(uri.Scheme, "+")
|
2022-07-31 14:32:48 +02:00
|
|
|
switch len(parts) {
|
|
|
|
case 1:
|
2020-11-11 23:50:35 +01:00
|
|
|
scheme = parts[0]
|
2022-07-31 14:32:48 +02:00
|
|
|
case 2:
|
2020-11-11 23:50:35 +01:00
|
|
|
scheme = parts[0]
|
|
|
|
auth = parts[1]
|
2022-07-31 14:32:48 +02:00
|
|
|
default:
|
2020-11-11 23:50:35 +01:00
|
|
|
return "", "", fmt.Errorf("Unknown transfer protocol %s", uri.Scheme)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return scheme, auth, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newSaslClient(auth string, uri *url.URL) (sasl.Client, error) {
|
|
|
|
var saslClient sasl.Client
|
2019-05-14 20:05:29 +02:00
|
|
|
switch auth {
|
|
|
|
case "":
|
|
|
|
fallthrough
|
|
|
|
case "none":
|
|
|
|
saslClient = nil
|
2019-10-29 18:11:38 +01:00
|
|
|
case "login":
|
|
|
|
password, _ := uri.User.Password()
|
|
|
|
saslClient = sasl.NewLoginClient(uri.User.Username(), password)
|
2019-05-14 20:05:29 +02:00
|
|
|
case "plain":
|
|
|
|
password, _ := uri.User.Password()
|
|
|
|
saslClient = sasl.NewPlainClient("", uri.User.Username(), password)
|
2020-05-26 13:29:58 +02:00
|
|
|
case "oauthbearer":
|
|
|
|
q := uri.Query()
|
|
|
|
oauth2 := &oauth2.Config{}
|
|
|
|
if q.Get("token_endpoint") != "" {
|
|
|
|
oauth2.ClientID = q.Get("client_id")
|
|
|
|
oauth2.ClientSecret = q.Get("client_secret")
|
|
|
|
oauth2.Scopes = []string{q.Get("scope")}
|
|
|
|
oauth2.Endpoint.TokenURL = q.Get("token_endpoint")
|
|
|
|
}
|
|
|
|
password, _ := uri.User.Password()
|
|
|
|
bearer := lib.OAuthBearer{
|
|
|
|
OAuth2: oauth2,
|
|
|
|
Enabled: true,
|
|
|
|
}
|
|
|
|
if bearer.OAuth2.Endpoint.TokenURL == "" {
|
2020-11-11 23:50:35 +01:00
|
|
|
return nil, fmt.Errorf("No 'TokenURL' configured for this account")
|
2020-05-26 13:29:58 +02:00
|
|
|
}
|
|
|
|
token, err := bearer.ExchangeRefreshToken(password)
|
|
|
|
if err != nil {
|
2020-11-11 23:50:35 +01:00
|
|
|
return nil, err
|
2020-05-26 13:29:58 +02:00
|
|
|
}
|
|
|
|
password = token.AccessToken
|
|
|
|
saslClient = sasl.NewOAuthBearerClient(&sasl.OAuthBearerOptions{
|
|
|
|
Username: uri.User.Username(),
|
|
|
|
Token: password,
|
|
|
|
})
|
2022-09-28 19:49:11 +02:00
|
|
|
case "xoauth2":
|
|
|
|
q := uri.Query()
|
|
|
|
oauth2 := &oauth2.Config{}
|
|
|
|
if q.Get("token_endpoint") != "" {
|
|
|
|
oauth2.ClientID = q.Get("client_id")
|
|
|
|
oauth2.ClientSecret = q.Get("client_secret")
|
|
|
|
oauth2.Scopes = []string{q.Get("scope")}
|
|
|
|
oauth2.Endpoint.TokenURL = q.Get("token_endpoint")
|
|
|
|
}
|
|
|
|
password, _ := uri.User.Password()
|
|
|
|
bearer := lib.Xoauth2{
|
|
|
|
OAuth2: oauth2,
|
|
|
|
Enabled: true,
|
|
|
|
}
|
|
|
|
if bearer.OAuth2.Endpoint.TokenURL != "" {
|
|
|
|
token, err := bearer.ExchangeRefreshToken(password)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
password = token.AccessToken
|
|
|
|
}
|
|
|
|
saslClient = lib.NewXoauth2Client(uri.User.Username(), password)
|
2019-05-14 20:05:29 +02:00
|
|
|
default:
|
2020-11-11 23:50:35 +01:00
|
|
|
return nil, fmt.Errorf("Unsupported auth mechanism %s", auth)
|
2019-05-14 20:05:29 +02:00
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
return saslClient, nil
|
|
|
|
}
|
2019-05-14 20:05:29 +02:00
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
type smtpSender struct {
|
|
|
|
ctx sendCtx
|
|
|
|
conn *smtp.Client
|
|
|
|
w io.WriteCloser
|
|
|
|
}
|
2019-05-14 20:18:01 +02:00
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
func (s *smtpSender) Write(p []byte) (int, error) {
|
|
|
|
return s.w.Write(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *smtpSender) Close() error {
|
|
|
|
we := s.w.Close()
|
|
|
|
ce := s.conn.Close()
|
|
|
|
if we != nil {
|
|
|
|
return we
|
2019-05-17 17:22:30 +02:00
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
return ce
|
|
|
|
}
|
2019-05-17 17:22:30 +02:00
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
func newSmtpSender(ctx sendCtx) (io.WriteCloser, error) {
|
|
|
|
var (
|
|
|
|
err error
|
|
|
|
conn *smtp.Client
|
|
|
|
)
|
|
|
|
switch ctx.scheme {
|
|
|
|
case "smtp":
|
|
|
|
conn, err = connectSmtp(ctx.starttls, ctx.uri.Host)
|
|
|
|
case "smtps":
|
|
|
|
conn, err = connectSmtps(ctx.uri.Host)
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("not an smtp protocol %s", ctx.scheme)
|
|
|
|
}
|
2019-05-14 20:18:01 +02:00
|
|
|
|
2021-02-28 02:04:58 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "Connection failed")
|
|
|
|
}
|
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
saslclient, err := newSaslClient(ctx.auth, ctx.uri)
|
|
|
|
if err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if saslclient != nil {
|
|
|
|
if err := conn.Auth(saslclient); err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, errors.Wrap(err, "conn.Auth")
|
2019-05-14 20:05:29 +02:00
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
}
|
|
|
|
s := &smtpSender{
|
|
|
|
ctx: ctx,
|
|
|
|
conn: conn,
|
|
|
|
}
|
|
|
|
if err := s.conn.Mail(s.ctx.from.Address, nil); err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, errors.Wrap(err, "conn.Mail")
|
|
|
|
}
|
|
|
|
for _, rcpt := range s.ctx.rcpts {
|
|
|
|
if err := s.conn.Rcpt(rcpt.Address); err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, errors.Wrap(err, "conn.Rcpt")
|
2019-05-14 20:05:29 +02:00
|
|
|
}
|
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
s.w, err = s.conn.Data()
|
|
|
|
if err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, errors.Wrap(err, "conn.Data")
|
|
|
|
}
|
|
|
|
return s.w, nil
|
|
|
|
}
|
2019-05-14 20:05:29 +02:00
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
func connectSmtp(starttls bool, host string) (*smtp.Client, error) {
|
|
|
|
serverName := host
|
|
|
|
if !strings.ContainsRune(host, ':') {
|
2022-07-31 14:32:48 +02:00
|
|
|
host += ":587" // Default to submission port
|
2020-11-11 23:50:35 +01:00
|
|
|
} else {
|
|
|
|
serverName = host[:strings.IndexRune(host, ':')]
|
|
|
|
}
|
|
|
|
conn, err := smtp.Dial(host)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "smtp.Dial")
|
|
|
|
}
|
|
|
|
if sup, _ := conn.Extension("STARTTLS"); sup {
|
|
|
|
if !starttls {
|
|
|
|
err := errors.New("STARTTLS is supported by this server, " +
|
|
|
|
"but not set in accounts.conf. " +
|
|
|
|
"Add smtp-starttls=yes")
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
2020-09-20 23:53:44 +02:00
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
if err = conn.StartTLS(&tls.Config{
|
|
|
|
ServerName: serverName,
|
|
|
|
}); err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, errors.Wrap(err, "StartTLS")
|
2020-09-20 23:53:44 +02:00
|
|
|
}
|
2022-07-31 14:32:48 +02:00
|
|
|
} else if starttls {
|
|
|
|
err := errors.New("STARTTLS requested, but not supported " +
|
|
|
|
"by this SMTP server. Is someone tampering with your " +
|
|
|
|
"connection?")
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
2019-07-27 17:19:49 +02:00
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
return conn, nil
|
|
|
|
}
|
2019-07-27 17:19:49 +02:00
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
func connectSmtps(host string) (*smtp.Client, error) {
|
|
|
|
serverName := host
|
|
|
|
if !strings.ContainsRune(host, ':') {
|
2022-07-31 14:32:48 +02:00
|
|
|
host += ":465" // Default to smtps port
|
2020-11-11 23:50:35 +01:00
|
|
|
} else {
|
|
|
|
serverName = host[:strings.IndexRune(host, ':')]
|
|
|
|
}
|
|
|
|
conn, err := smtp.DialTLS(host, &tls.Config{
|
|
|
|
ServerName: serverName,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "smtp.DialTLS")
|
|
|
|
}
|
|
|
|
return conn, nil
|
2019-05-14 19:07:48 +02:00
|
|
|
}
|
2020-11-10 20:27:30 +01:00
|
|
|
|
2020-11-11 23:50:35 +01:00
|
|
|
func copyToSent(worker *types.Worker, dest string,
|
2022-07-31 22:16:40 +02:00
|
|
|
n int, msg io.Reader,
|
|
|
|
) <-chan error {
|
2020-11-11 23:50:35 +01:00
|
|
|
errCh := make(chan error)
|
|
|
|
worker.PostAction(&types.AppendMessage{
|
|
|
|
Destination: dest,
|
|
|
|
Flags: []models.Flag{models.SeenFlag},
|
|
|
|
Date: time.Now(),
|
|
|
|
Reader: msg,
|
|
|
|
Length: n,
|
|
|
|
}, func(msg types.WorkerMessage) {
|
|
|
|
switch msg := msg.(type) {
|
|
|
|
case *types.Done:
|
|
|
|
errCh <- nil
|
|
|
|
case *types.Error:
|
|
|
|
errCh <- msg.Error
|
2020-11-10 20:27:30 +01:00
|
|
|
}
|
2020-11-11 23:50:35 +01:00
|
|
|
})
|
|
|
|
return errCh
|
2020-11-10 20:27:30 +01:00
|
|
|
}
|