//! # MIME message production. use std::collections::HashSet; use anyhow::{bail, Context as _, Result}; use base64::Engine as _; use chrono::TimeZone; use email::Mailbox; use format_flowed::{format_flowed, format_flowed_quote}; use lettre_email::{Address, Header, MimeMultipartType, PartBuilder}; use tokio::fs; use crate::blob::BlobObject; use crate::chat::{self, Chat}; use crate::config::Config; use crate::constants::{Chattype, DC_FROM_HANDSHAKE}; use crate::contact::{Contact, ContactId, Origin}; use crate::context::Context; use crate::e2ee::EncryptHelper; use crate::ephemeral::Timer as EphemeralTimer; use crate::headerdef::HeaderDef; use crate::html::new_html_mimepart; use crate::message::{self, Message, MsgId, Viewtype}; use crate::mimeparser::SystemMessage; use crate::param::Param; use crate::peer_channels::create_iroh_header; use crate::peerstate::Peerstate; use crate::simplify::escape_message_footer_marks; use crate::stock_str; use crate::tools::IsNoneOrEmpty; use crate::tools::{ create_outgoing_rfc724_mid, create_smeared_timestamp, remove_subject_prefix, time, }; use crate::{location, peer_channels}; // attachments of 25 mb brutto should work on the majority of providers // (brutto examples: web.de=50, 1&1=40, t-online.de=32, gmail=25, posteo=50, yahoo=25, all-inkl=100). // to get the netto sizes, we subtract 1 mb header-overhead and the base64-overhead. pub const RECOMMENDED_FILE_SIZE: u64 = 24 * 1024 * 1024 / 4 * 3; #[derive(Debug, Clone)] pub enum Loaded { Message { chat: Chat, msg: Message, }, Mdn { rfc724_mid: String, additional_msg_ids: Vec, }, } /// Helper to construct mime messages. #[derive(Debug, Clone)] pub struct MimeFactory { from_addr: String, from_displayname: String, /// Goes to the `Sender:`-header, if set. /// For overridden names, `sender_displayname` is set to the /// config-name while `from_displayname` is set to the overridden name. /// From the perspective of the receiver, /// a set `Sender:`-header is used as an indicator that the name is overridden; /// names are alsways read from the `From:`-header. sender_displayname: Option, selfstatus: String, /// Vector of pairs of recipient name and address recipients: Vec<(String, String)>, timestamp: i64, loaded: Loaded, in_reply_to: String, /// Space-separated list of Message-IDs for `References` header. /// /// Each Message-ID in the list /// may or may not be enclosed in angle brackets, /// angle brackets must be added during message rendering /// as needed. references: String, req_mdn: bool, last_added_location_id: Option, /// If the created mime-structure contains sync-items, /// the IDs of these items are listed here. /// The IDs are returned via `RenderedEmail` /// and must be deleted if the message is actually queued for sending. sync_ids_to_delete: Option, /// True if the avatar should be attached. pub attach_selfavatar: bool, } /// Result of rendering a message, ready to be submitted to a send job. #[derive(Debug, Clone)] pub struct RenderedEmail { pub message: String, // pub envelope: Envelope, pub is_encrypted: bool, pub is_gossiped: bool, pub last_added_location_id: Option, /// A comma-separated string of sync-IDs that are used by the rendered email /// and must be deleted once the message is actually queued for sending /// (deletion must be done by `delete_sync_ids()`). /// If the rendered email is not queued for sending, the IDs must not be deleted. pub sync_ids_to_delete: Option, /// Message ID (Message in the sense of Email) pub rfc724_mid: String, /// Message subject. pub subject: String, } #[derive(Debug, Clone, Default)] struct MessageHeaders { /// Opportunistically protected headers. /// /// These headers are placed into encrypted part *if* the message is encrypted. Place headers /// which are not needed before decryption (e.g. Chat-Group-Name) or are not interesting if the /// message cannot be decrypted (e.g. Chat-Disposition-Notification-To) here. /// /// If the message is not encrypted, these headers are placed into IMF header section, so make /// sure that the message will be encrypted if you place any sensitive information here. pub protected: Vec
, /// Headers that must go into IMF header section. /// /// These are standard headers such as Date, In-Reply-To, References, which cannot be placed /// anywhere else according to the standard. Placing headers here also allows them to be fetched /// individually over IMAP without downloading the message body. This is why Chat-Version is /// placed here. pub unprotected: Vec
, /// Headers that MUST NOT go into IMF header section. /// /// These are large headers which may hit the header section size limit on the server, such as /// Chat-User-Avatar with a base64-encoded image inside. Also there are headers duplicated here /// that servers mess up with in the IMF header section, like Message-ID. pub hidden: Vec
, } impl MimeFactory { pub async fn from_msg(context: &Context, msg: Message) -> Result { let chat = Chat::load_from_db(context, msg.chat_id).await?; let attach_profile_data = Self::should_attach_profile_data(&msg); let from_addr = context.get_primary_self_addr().await?; let config_displayname = context .get_config(Config::Displayname) .await? .unwrap_or_default(); let (from_displayname, sender_displayname) = if let Some(override_name) = msg.param.get(Param::OverrideSenderDisplayname) { (override_name.to_string(), Some(config_displayname)) } else { let name = match attach_profile_data { true => config_displayname, false => "".to_string(), }; (name, None) }; let mut recipients = Vec::with_capacity(5); let mut recipient_ids = HashSet::new(); let mut req_mdn = false; if chat.is_self_talk() { recipients.push((from_displayname.to_string(), from_addr.to_string())); } else if chat.is_mailing_list() { let list_post = chat .param .get(Param::ListPost) .context("Can't write to mailinglist without ListPost param")?; recipients.push(("".to_string(), list_post.to_string())); } else { context .sql .query_map( "SELECT c.authname, c.addr, c.id \ FROM chats_contacts cc \ LEFT JOIN contacts c ON cc.contact_id=c.id \ WHERE cc.chat_id=? AND cc.contact_id>9;", (msg.chat_id,), |row| { let authname: String = row.get(0)?; let addr: String = row.get(1)?; let id: ContactId = row.get(2)?; Ok((authname, addr, id)) }, |rows| { for row in rows { let (authname, addr, id) = row?; if !recipients_contain_addr(&recipients, &addr) { let name = match attach_profile_data { true => authname, false => "".to_string(), }; recipients.push((name, addr)); } recipient_ids.insert(id); } Ok(()) }, ) .await?; let recipient_ids: Vec<_> = recipient_ids.into_iter().collect(); ContactId::scaleup_origin(context, &recipient_ids, Origin::OutgoingTo).await?; if !msg.is_system_message() && msg.param.get_int(Param::Reaction).unwrap_or_default() == 0 && context.get_config_bool(Config::MdnsEnabled).await? { req_mdn = true; } } let (in_reply_to, references) = context .sql .query_row( "SELECT mime_in_reply_to, mime_references FROM msgs WHERE id=?", (msg.id,), |row| { let in_reply_to: String = row.get(0)?; let references: String = row.get(1)?; Ok(( render_rfc724_mid_list(&in_reply_to), render_rfc724_mid_list(&references), )) }, ) .await?; let selfstatus = match attach_profile_data { true => context .get_config(Config::Selfstatus) .await? .unwrap_or_default(), false => "".to_string(), }; let attach_selfavatar = Self::should_attach_selfavatar(context, &msg).await; let factory = MimeFactory { from_addr, from_displayname, sender_displayname, selfstatus, recipients, timestamp: msg.timestamp_sort, loaded: Loaded::Message { msg, chat }, in_reply_to, references, req_mdn, last_added_location_id: None, sync_ids_to_delete: None, attach_selfavatar, }; Ok(factory) } pub async fn from_mdn( context: &Context, from_id: ContactId, rfc724_mid: String, additional_msg_ids: Vec, ) -> Result { let contact = Contact::get_by_id(context, from_id).await?; let from_addr = context.get_primary_self_addr().await?; let timestamp = create_smeared_timestamp(context); let res = MimeFactory { from_addr, from_displayname: "".to_string(), sender_displayname: None, selfstatus: "".to_string(), recipients: vec![("".to_string(), contact.get_addr().to_string())], timestamp, loaded: Loaded::Mdn { rfc724_mid, additional_msg_ids, }, in_reply_to: String::default(), references: String::default(), req_mdn: false, last_added_location_id: None, sync_ids_to_delete: None, attach_selfavatar: false, }; Ok(res) } async fn peerstates_for_recipients( &self, context: &Context, ) -> Result, String)>> { let self_addr = context.get_primary_self_addr().await?; let mut res = Vec::new(); for (_, addr) in self .recipients .iter() .filter(|(_, addr)| addr != &self_addr) { res.push((Peerstate::from_addr(context, addr).await?, addr.clone())); } Ok(res) } fn is_e2ee_guaranteed(&self) -> bool { match &self.loaded { Loaded::Message { chat, msg } => { if chat.is_protected() { return true; } !msg.param .get_bool(Param::ForcePlaintext) .unwrap_or_default() && msg.param.get_bool(Param::GuaranteeE2ee).unwrap_or_default() } Loaded::Mdn { .. } => false, } } fn verified(&self) -> bool { match &self.loaded { Loaded::Message { chat, msg } => { if chat.is_protected() { if msg.get_info_type() == SystemMessage::SecurejoinMessage { // Securejoin messages are supposed to verify a key. // In order to do this, it is necessary that they can be sent // to a key that is not yet verified. // This has to work independently of whether the chat is protected right now. false } else { true } } else { false } } Loaded::Mdn { .. } => false, } } fn should_force_plaintext(&self) -> bool { match &self.loaded { Loaded::Message { chat, msg } => { msg.param .get_bool(Param::ForcePlaintext) .unwrap_or_default() || chat.typ == Chattype::Broadcast } Loaded::Mdn { .. } => false, } } fn should_skip_autocrypt(&self) -> bool { match &self.loaded { Loaded::Message { msg, .. } => { msg.param.get_bool(Param::SkipAutocrypt).unwrap_or_default() } Loaded::Mdn { .. } => true, } } async fn should_do_gossip(&self, context: &Context, multiple_recipients: bool) -> Result { match &self.loaded { Loaded::Message { chat, msg } => { let cmd = msg.param.get_cmd(); if cmd == SystemMessage::MemberAddedToGroup || cmd == SystemMessage::SecurejoinMessage { Ok(true) } else if multiple_recipients { // beside key- and member-changes, force a periodic re-gossip. let gossiped_timestamp = chat.id.get_gossiped_timestamp(context).await?; let gossip_period = context.get_config_i64(Config::GossipPeriod).await?; if time() >= gossiped_timestamp + gossip_period { Ok(true) } else { Ok(false) } } else { Ok(false) } } Loaded::Mdn { .. } => Ok(false), } } fn should_attach_profile_data(msg: &Message) -> bool { msg.param.get_cmd() != SystemMessage::SecurejoinMessage || { let step = msg.param.get(Param::Arg).unwrap_or_default(); // Don't attach profile data at the earlier SecureJoin steps: // - The corresponding messages, i.e. "v{c,g}-request" and "v{c,g}-auth-required" are // deleted right after processing, so other devices won't see the avatar etc. // - It's also good for privacy because the contact isn't yet verified and these // messages are auto-sent unlike usual unencrypted messages. step == "vg-request-with-auth" || step == "vc-request-with-auth" || step == "vg-member-added" || step == "vc-contact-confirm" } } async fn should_attach_selfavatar(context: &Context, msg: &Message) -> bool { Self::should_attach_profile_data(msg) && match chat::shall_attach_selfavatar(context, msg.chat_id).await { Ok(should) => should, Err(err) => { warn!( context, "should_attach_selfavatar: cannot get selfavatar state: {err:#}." ); false } } } fn grpimage(&self) -> Option { match &self.loaded { Loaded::Message { chat, msg } => { let cmd = msg.param.get_cmd(); match cmd { SystemMessage::MemberAddedToGroup => { return chat.param.get(Param::ProfileImage).map(Into::into); } SystemMessage::GroupImageChanged => { return msg.param.get(Param::Arg).map(Into::into) } _ => {} } if msg .param .get_bool(Param::AttachGroupImage) .unwrap_or_default() { return chat.param.get(Param::ProfileImage).map(Into::into); } None } Loaded::Mdn { .. } => None, } } async fn subject_str(&self, context: &Context) -> Result { let subject = match &self.loaded { Loaded::Message { ref chat, msg } => { let quoted_msg_subject = msg.quoted_message(context).await?.map(|m| m.subject); if !msg.subject.is_empty() { return Ok(msg.subject.clone()); } if (chat.typ == Chattype::Group || chat.typ == Chattype::Broadcast) && quoted_msg_subject.is_none_or_empty() { let re = if self.in_reply_to.is_empty() { "" } else { "Re: " }; return Ok(format!("{}{}", re, chat.name)); } let parent_subject = if quoted_msg_subject.is_none_or_empty() { chat.param.get(Param::LastSubject) } else { quoted_msg_subject.as_deref() }; if let Some(last_subject) = parent_subject { return Ok(format!("Re: {}", remove_subject_prefix(last_subject))); } let self_name = match Self::should_attach_profile_data(msg) { true => context.get_config(Config::Displayname).await?, false => None, }; let self_name = &match self_name { Some(name) => name, None => context.get_config(Config::Addr).await?.unwrap_or_default(), }; stock_str::subject_for_new_contact(context, self_name).await } Loaded::Mdn { .. } => stock_str::read_rcpt(context).await, }; Ok(subject) } pub fn recipients(&self) -> Vec { self.recipients .iter() .map(|(_, addr)| addr.clone()) .collect() } /// Consumes a `MimeFactory` and renders it into a message which is then stored in /// `smtp`-table to be used by the SMTP loop pub async fn render(mut self, context: &Context) -> Result { let mut headers: MessageHeaders = Default::default(); let from = Address::new_mailbox_with_name( self.from_displayname.to_string(), self.from_addr.clone(), ); let undisclosed_recipients = match &self.loaded { Loaded::Message { chat, .. } => chat.typ == Chattype::Broadcast, Loaded::Mdn { .. } => false, }; let mut to = Vec::new(); if undisclosed_recipients { to.push(Address::new_group( "hidden-recipients".to_string(), Vec::new(), )); } else { let email_to_remove = match &self.loaded { Loaded::Message { msg, .. } => { if msg.param.get_cmd() == SystemMessage::MemberRemovedFromGroup { msg.param.get(Param::Arg) } else { None } } Loaded::Mdn { .. } => None, }; for (name, addr) in &self.recipients { if let Some(email_to_remove) = email_to_remove { if email_to_remove == addr { continue; } } if name.is_empty() { to.push(Address::new_mailbox(addr.clone())); } else { to.push(Address::new_mailbox_with_name( name.to_string(), addr.clone(), )); } } if to.is_empty() { to.push(from.clone()); } } // Start with Internet Message Format headers in the order of the standard example // . let from_header = Header::new_with_value("From".into(), vec![from]).unwrap(); headers.protected.push(from_header.clone()); if let Some(sender_displayname) = &self.sender_displayname { let sender = Address::new_mailbox_with_name(sender_displayname.clone(), self.from_addr.clone()); headers .unprotected .push(Header::new_with_value("Sender".into(), vec![sender]).unwrap()); } headers .protected .push(Header::new_with_value("To".into(), to.clone()).unwrap()); let subject_str = self.subject_str(context).await?; let encoded_subject = if subject_str .chars() .all(|c| c.is_ascii_alphanumeric() || c == ' ') // We do not use needs_encoding() here because needs_encoding() returns true if the string contains a space // but we do not want to encode all subjects just because they contain a space. { subject_str.clone() } else { encode_words(&subject_str) }; headers .protected .push(Header::new("Subject".into(), encoded_subject)); let date = chrono::DateTime::::from_timestamp(self.timestamp, 0) .unwrap() .to_rfc2822(); headers.unprotected.push(Header::new("Date".into(), date)); let rfc724_mid = match &self.loaded { Loaded::Message { msg, .. } => msg.rfc724_mid.clone(), Loaded::Mdn { .. } => create_outgoing_rfc724_mid(), }; let rfc724_mid_headervalue = render_rfc724_mid(&rfc724_mid); let rfc724_mid_header = Header::new("Message-ID".into(), rfc724_mid_headervalue); headers.unprotected.push(rfc724_mid_header.clone()); headers.hidden.push(rfc724_mid_header); // Reply headers as in . if !self.in_reply_to.is_empty() { headers .unprotected .push(Header::new("In-Reply-To".into(), self.in_reply_to.clone())); } if !self.references.is_empty() { headers .unprotected .push(Header::new("References".into(), self.references.clone())); } // Automatic Response headers if let Loaded::Mdn { .. } = self.loaded { headers.unprotected.push(Header::new( "Auto-Submitted".to_string(), "auto-replied".to_string(), )); } else if context.get_config_bool(Config::Bot).await? { headers.unprotected.push(Header::new( "Auto-Submitted".to_string(), "auto-generated".to_string(), )); } if let Loaded::Message { chat, .. } = &self.loaded { if chat.typ == Chattype::Broadcast { let encoded_chat_name = encode_words(&chat.name); headers.protected.push(Header::new( "List-ID".into(), format!("{encoded_chat_name} <{}>", chat.grpid), )); } } // Non-standard headers. headers .unprotected .push(Header::new("Chat-Version".to_string(), "1.0".to_string())); if self.req_mdn { // we use "Chat-Disposition-Notification-To" // because replies to "Disposition-Notification-To" are weird in many cases // eg. are just freetext and/or do not follow any standard. headers.protected.push(Header::new( "Chat-Disposition-Notification-To".into(), self.from_addr.clone(), )); } let verified = self.verified(); let grpimage = self.grpimage(); let force_plaintext = self.should_force_plaintext(); let skip_autocrypt = self.should_skip_autocrypt(); let e2ee_guaranteed = self.is_e2ee_guaranteed(); let encrypt_helper = EncryptHelper::new(context).await?; if !skip_autocrypt { // unless determined otherwise we add the Autocrypt header let aheader = encrypt_helper.get_aheader().to_string(); headers .unprotected .push(Header::new("Autocrypt".into(), aheader)); } // Add ephemeral timer for non-MDN messages. // For MDNs it does not matter because they are not visible // and ignored by the receiver. if let Loaded::Message { msg, .. } = &self.loaded { let ephemeral_timer = msg.chat_id.get_ephemeral_timer(context).await?; if let EphemeralTimer::Enabled { duration } = ephemeral_timer { headers.protected.push(Header::new( "Ephemeral-Timer".to_string(), duration.to_string(), )); } } // MIME header . // Content-Type headers .unprotected .push(Header::new("MIME-Version".into(), "1.0".into())); let mut is_gossiped = false; let peerstates = self.peerstates_for_recipients(context).await?; let should_encrypt = encrypt_helper.should_encrypt(context, e2ee_guaranteed, &peerstates)?; let is_encrypted = should_encrypt && !force_plaintext; if is_encrypted { headers.unprotected.insert( 0, Header::new_with_value( "To".into(), to.into_iter() .map(|header| match header { Address::Mailbox(mb) => Address::Mailbox(Mailbox { address: mb.address, name: None, }), Address::Group(name, participants) => Address::new_group( name, participants .into_iter() .map(|mb| Mailbox { address: mb.address, name: None, }) .collect(), ), }) .collect::>(), ) .unwrap(), ); } let is_securejoin_message = if let Loaded::Message { msg, .. } = &self.loaded { msg.param.get_cmd() == SystemMessage::SecurejoinMessage } else { false }; if is_encrypted && verified || is_securejoin_message { headers.unprotected.insert( 0, Header::new_with_value( "From".into(), vec![Address::new_mailbox(self.from_addr.clone())], ) .unwrap(), ); } else { headers.unprotected.insert(0, from_header); } let message = match &self.loaded { Loaded::Message { msg, .. } => { let msg = msg.clone(); let (main_part, parts) = self .render_message(context, &mut headers, &grpimage, is_encrypted) .await?; if parts.is_empty() { // Single part, render as regular message. main_part } else { // Multiple parts, render as multipart. let part_holder = if msg.param.get_cmd() == SystemMessage::MultiDeviceSync { PartBuilder::new().header(( "Content-Type".to_string(), "multipart/report; report-type=multi-device-sync".to_string(), )) } else if msg.param.get_cmd() == SystemMessage::WebxdcStatusUpdate { PartBuilder::new().header(( "Content-Type".to_string(), "multipart/report; report-type=status-update".to_string(), )) } else { PartBuilder::new().message_type(MimeMultipartType::Mixed) }; parts .into_iter() .fold(part_holder.child(main_part.build()), |message, part| { message.child(part.build()) }) } } Loaded::Mdn { .. } => self.render_mdn(context).await?, }; let get_content_type_directives_header = || { ( "Content-Type-Deltachat-Directives".to_string(), "protected-headers=\"v1\"".to_string(), ) }; let outer_message = if is_encrypted { // Store protected headers in the inner message. let message = headers .protected .into_iter() .fold(message, |message, header| message.header(header)); // Add hidden headers to encrypted payload. let mut message = headers .hidden .into_iter() .fold(message, |message, header| message.header(header)); // Add gossip headers in chats with multiple recipients let multiple_recipients = peerstates.len() > 1 || context.get_config_bool(Config::BccSelf).await?; if self.should_do_gossip(context, multiple_recipients).await? { for peerstate in peerstates.iter().filter_map(|(state, _)| state.as_ref()) { if let Some(header) = peerstate.render_gossip_header(verified) { message = message.header(Header::new("Autocrypt-Gossip".into(), header)); is_gossiped = true; } } } // Set the appropriate Content-Type for the inner message. let mut existing_ct = message .get_header("Content-Type".to_string()) .and_then(|h| h.get_value::().ok()) .unwrap_or_else(|| "text/plain; charset=utf-8;".to_string()); if !existing_ct.ends_with(';') { existing_ct += ";"; } let message = message.header(get_content_type_directives_header()); // Set the appropriate Content-Type for the outer message let outer_message = PartBuilder::new().header(( "Content-Type".to_string(), "multipart/encrypted; protocol=\"application/pgp-encrypted\"".to_string(), )); if std::env::var(crate::DCC_MIME_DEBUG).is_ok() { info!( context, "mimefactory: unencrypted message mime-body:\n{}", message.clone().build().as_string(), ); } // Disable compression for SecureJoin to ensure // there are no compression side channels // leaking information about the tokens. let compress = match &self.loaded { Loaded::Message { msg, .. } => { msg.param.get_cmd() != SystemMessage::SecurejoinMessage } Loaded::Mdn { .. } => true, }; let encrypted = encrypt_helper .encrypt(context, verified, message, peerstates, compress) .await?; outer_message .child( // Autocrypt part 1 PartBuilder::new() .content_type(&"application/pgp-encrypted".parse::().unwrap()) .header(("Content-Description", "PGP/MIME version identification")) .body("Version: 1\r\n") .build(), ) .child( // Autocrypt part 2 PartBuilder::new() .content_type( &"application/octet-stream; name=\"encrypted.asc\"" .parse::() .unwrap(), ) .header(("Content-Description", "OpenPGP encrypted message")) .header(("Content-Disposition", "inline; filename=\"encrypted.asc\";")) .body(encrypted) .build(), ) .header(("Subject".to_string(), "...".to_string())) } else if matches!(self.loaded, Loaded::Mdn { .. }) { // Never add outer multipart/mixed wrapper to MDN // as multipart/report Content-Type is used to recognize MDNs // by Delta Chat receiver and Chatmail servers // allowing them to be unencrypted and not contain Autocrypt header // without resetting Autocrypt encryption or triggering Chatmail filter // that normally only allows encrypted mails. // Hidden headers are dropped. // Store protected headers in the outer message. let message = headers .protected .iter() .fold(message, |message, header| message.header(header.clone())); let protected: HashSet
= HashSet::from_iter(headers.protected.into_iter()); for h in headers.unprotected.split_off(0) { if !protected.contains(&h) { headers.unprotected.push(h); } } message } else { let message = headers .hidden .into_iter() .fold(message, |message, header| message.header(header)); let message = PartBuilder::new() .message_type(MimeMultipartType::Mixed) .child(message.build()); let message = headers .protected .iter() .fold(message, |message, header| message.header(header.clone())); if skip_autocrypt || !context.get_config_bool(Config::SignUnencrypted).await? { let protected: HashSet
= HashSet::from_iter(headers.protected.into_iter()); for h in headers.unprotected.split_off(0) { if !protected.contains(&h) { headers.unprotected.push(h); } } message } else { let message = message.header(get_content_type_directives_header()); let (payload, signature) = encrypt_helper.sign(context, message).await?; PartBuilder::new() .header(( "Content-Type", "multipart/signed; protocol=\"application/pgp-signature\"", )) .child(payload) .child( PartBuilder::new() .content_type( &"application/pgp-signature; name=\"signature.asc\"" .parse::() .unwrap(), ) .header(("Content-Description", "OpenPGP digital signature")) .header(("Content-Disposition", "attachment; filename=\"signature\";")) .body(signature) .build(), ) } }; // Store the unprotected headers on the outer message. let outer_message = headers .unprotected .into_iter() .fold(outer_message, |message, header| message.header(header)); if std::env::var(crate::DCC_MIME_DEBUG).is_ok() { info!( context, "mimefactory: outgoing message mime-body:\n{}", outer_message.clone().build().as_string(), ); } let MimeFactory { last_added_location_id, .. } = self; Ok(RenderedEmail { message: outer_message.build().as_string(), // envelope: Envelope::new, is_encrypted, is_gossiped, last_added_location_id, sync_ids_to_delete: self.sync_ids_to_delete, rfc724_mid, subject: subject_str, }) } /// Returns MIME part with a `message.kml` attachment. fn get_message_kml_part(&self) -> Option { let Loaded::Message { msg, .. } = &self.loaded else { return None; }; let latitude = msg.param.get_float(Param::SetLatitude)?; let longitude = msg.param.get_float(Param::SetLongitude)?; let kml_file = location::get_message_kml(msg.timestamp_sort, latitude, longitude); let part = PartBuilder::new() .content_type( &"application/vnd.google-earth.kml+xml" .parse::() .unwrap(), ) .header(( "Content-Disposition", "attachment; filename=\"message.kml\"", )) .body(kml_file); Some(part) } /// Returns MIME part with a `location.kml` attachment. async fn get_location_kml_part(&mut self, context: &Context) -> Result> { let Loaded::Message { msg, .. } = &self.loaded else { return Ok(None); }; let Some((kml_content, last_added_location_id)) = location::get_kml(context, msg.chat_id).await? else { return Ok(None); }; let part = PartBuilder::new() .content_type( &"application/vnd.google-earth.kml+xml" .parse::() .unwrap(), ) .header(( "Content-Disposition", "attachment; filename=\"location.kml\"", )) .body(kml_content); if !msg.param.exists(Param::SetLatitude) { // otherwise, the independent location is already filed self.last_added_location_id = Some(last_added_location_id); } Ok(Some(part)) } fn add_message_text(&self, part: PartBuilder, mut text: String) -> PartBuilder { // This is needed to protect from ESPs (such as gmx.at) doing their own Quoted-Printable // encoding and thus breaking messages and signatures. It's unlikely that the reader uses a // MUA not supporting Quoted-Printable encoding. And RFC 2646 "4.6" also recommends it for // encrypted messages. let part = part.header(("Content-Transfer-Encoding", "quoted-printable")); text = quoted_printable::encode_to_str(text); part.body(text) } #[allow(clippy::cognitive_complexity)] async fn render_message( &mut self, context: &Context, headers: &mut MessageHeaders, grpimage: &Option, is_encrypted: bool, ) -> Result<(PartBuilder, Vec)> { let Loaded::Message { chat, msg } = &self.loaded else { bail!("Attempt to render MDN as a message"); }; let chat = chat.clone(); let msg = msg.clone(); let command = msg.param.get_cmd(); let mut placeholdertext = None; let send_verified_headers = match chat.typ { Chattype::Single => true, Chattype::Group => true, // Mailinglists and broadcast lists can actually never be verified: Chattype::Mailinglist => false, Chattype::Broadcast => false, }; if chat.is_protected() && send_verified_headers { headers .protected .push(Header::new("Chat-Verified".to_string(), "1".to_string())); } if chat.typ == Chattype::Group { // Send group ID unless it is an ad hoc group that has no ID. if !chat.grpid.is_empty() { headers .protected .push(Header::new("Chat-Group-ID".into(), chat.grpid.clone())); } let encoded = encode_words(&chat.name); headers .protected .push(Header::new("Chat-Group-Name".into(), encoded)); match command { SystemMessage::MemberRemovedFromGroup => { let email_to_remove = msg.param.get(Param::Arg).unwrap_or_default(); if email_to_remove == context .get_config(Config::ConfiguredAddr) .await? .unwrap_or_default() { placeholdertext = Some(stock_str::msg_group_left_remote(context).await); } else { placeholdertext = Some(stock_str::msg_del_member_remote(context, email_to_remove).await); }; if !email_to_remove.is_empty() { headers.protected.push(Header::new( "Chat-Group-Member-Removed".into(), email_to_remove.into(), )); } } SystemMessage::MemberAddedToGroup => { let email_to_add = msg.param.get(Param::Arg).unwrap_or_default(); placeholdertext = Some(stock_str::msg_add_member_remote(context, email_to_add).await); if !email_to_add.is_empty() { headers.protected.push(Header::new( "Chat-Group-Member-Added".into(), email_to_add.into(), )); } if 0 != msg.param.get_int(Param::Arg2).unwrap_or_default() & DC_FROM_HANDSHAKE { info!( context, "Sending secure-join message {:?}.", "vg-member-added", ); headers.protected.push(Header::new( "Secure-Join".to_string(), "vg-member-added".to_string(), )); } } SystemMessage::GroupNameChanged => { let old_name = msg.param.get(Param::Arg).unwrap_or_default(); headers.protected.push(Header::new( "Chat-Group-Name-Changed".into(), maybe_encode_words(old_name), )); } SystemMessage::GroupImageChanged => { headers.protected.push(Header::new( "Chat-Content".to_string(), "group-avatar-changed".to_string(), )); if grpimage.is_none() { headers.protected.push(Header::new( "Chat-Group-Avatar".to_string(), "0".to_string(), )); } } _ => {} } } match command { SystemMessage::LocationStreamingEnabled => { headers.protected.push(Header::new( "Chat-Content".into(), "location-streaming-enabled".into(), )); } SystemMessage::EphemeralTimerChanged => { headers.protected.push(Header::new( "Chat-Content".to_string(), "ephemeral-timer-changed".to_string(), )); } SystemMessage::LocationOnly | SystemMessage::MultiDeviceSync | SystemMessage::WebxdcStatusUpdate => { // This should prevent automatic replies, // such as non-delivery reports. // // See // // Adding this header without encryption leaks some // information about the message contents, but it can // already be easily guessed from message timing and size. headers.unprotected.push(Header::new( "Auto-Submitted".to_string(), "auto-generated".to_string(), )); } SystemMessage::AutocryptSetupMessage => { headers .unprotected .push(Header::new("Autocrypt-Setup-Message".into(), "v1".into())); placeholdertext = Some(stock_str::ac_setup_msg_body(context).await); } SystemMessage::SecurejoinMessage => { let step = msg.param.get(Param::Arg).unwrap_or_default(); if !step.is_empty() { info!(context, "Sending secure-join message {step:?}."); headers .protected .push(Header::new("Secure-Join".into(), step.into())); let param2 = msg.param.get(Param::Arg2).unwrap_or_default(); if !param2.is_empty() { headers.protected.push(Header::new( if step == "vg-request-with-auth" || step == "vc-request-with-auth" { "Secure-Join-Auth".into() } else { "Secure-Join-Invitenumber".into() }, param2.into(), )); } let fingerprint = msg.param.get(Param::Arg3).unwrap_or_default(); if !fingerprint.is_empty() { headers.protected.push(Header::new( "Secure-Join-Fingerprint".into(), fingerprint.into(), )); } if let Some(id) = msg.param.get(Param::Arg4) { headers .protected .push(Header::new("Secure-Join-Group".into(), id.into())); }; } } SystemMessage::ChatProtectionEnabled => { headers.protected.push(Header::new( "Chat-Content".to_string(), "protection-enabled".to_string(), )); } SystemMessage::ChatProtectionDisabled => { headers.protected.push(Header::new( "Chat-Content".to_string(), "protection-disabled".to_string(), )); } SystemMessage::IrohNodeAddr => { headers.protected.push(Header::new( HeaderDef::IrohNodeAddr.get_headername().to_string(), serde_json::to_string( &context .get_or_try_init_peer_channel() .await? .get_node_addr() .await?, )?, )); } _ => {} } if let Some(grpimage) = grpimage { info!(context, "setting group image '{}'", grpimage); let avatar = build_avatar_file(context, grpimage) .await .context("Cannot attach group image")?; headers.hidden.push(Header::new( "Chat-Group-Avatar".into(), format!("base64:{avatar}"), )); } if msg.viewtype == Viewtype::Sticker { headers .protected .push(Header::new("Chat-Content".into(), "sticker".into())); } else if msg.viewtype == Viewtype::VideochatInvitation { headers.protected.push(Header::new( "Chat-Content".into(), "videochat-invitation".into(), )); headers.protected.push(Header::new( "Chat-Webrtc-Room".into(), msg.param.get(Param::WebrtcRoom).unwrap_or_default().into(), )); } if msg.viewtype == Viewtype::Voice || msg.viewtype == Viewtype::Audio || msg.viewtype == Viewtype::Video { if msg.viewtype == Viewtype::Voice { headers .protected .push(Header::new("Chat-Voice-Message".into(), "1".into())); } let duration_ms = msg.param.get_int(Param::Duration).unwrap_or_default(); if duration_ms > 0 { let dur = duration_ms.to_string(); headers .protected .push(Header::new("Chat-Duration".into(), dur)); } } // add text part - we even add empty text and force a MIME-multipart-message as: // - some Apps have problems with Non-text in the main part (eg. "Mail" from stock Android) // - we can add "forward hints" this way // - it looks better let afwd_email = msg.param.exists(Param::Forwarded); let fwdhint = if afwd_email { Some( "---------- Forwarded message ----------\r\n\ From: Delta Chat\r\n\ \r\n" .to_string(), ) } else { None }; let final_text = placeholdertext.as_deref().unwrap_or(&msg.text); let mut quoted_text = msg .quoted_text() .map(|quote| format_flowed_quote("e) + "\r\n\r\n"); if !is_encrypted && msg.param.get_bool(Param::ProtectQuote).unwrap_or_default() { // Message is not encrypted but quotes encrypted message. quoted_text = Some("> ...\r\n\r\n".to_string()); } if quoted_text.is_none() && final_text.starts_with('>') { // Insert empty line to avoid receiver treating user-sent quote as topquote inserted by // Delta Chat. quoted_text = Some("\r\n".to_string()); } let flowed_text = format_flowed(final_text); let is_reaction = msg.param.get_int(Param::Reaction).unwrap_or_default() != 0; let footer = if is_reaction { "" } else { &self.selfstatus }; let message_text = format!( "{}{}{}{}{}{}", fwdhint.unwrap_or_default(), quoted_text.unwrap_or_default(), escape_message_footer_marks(&flowed_text), if !final_text.is_empty() && !footer.is_empty() { "\r\n\r\n" } else { "" }, if !footer.is_empty() { "-- \r\n" } else { "" }, footer ); let mut main_part = PartBuilder::new().header(( "Content-Type", "text/plain; charset=utf-8; format=flowed; delsp=no", )); main_part = self.add_message_text(main_part, message_text); if is_reaction { main_part = main_part.header(("Content-Disposition", "reaction")); } let mut parts = Vec::new(); // add HTML-part, this is needed only if a HTML-message from a non-delta-client is forwarded; // for simplificity and to avoid conversion errors, we're generating the HTML-part from the original message. if msg.has_html() { let html = if let Some(orig_msg_id) = msg.param.get_int(Param::Forwarded) { MsgId::new(orig_msg_id.try_into()?) .get_html(context) .await? } else { msg.param.get(Param::SendHtml).map(|s| s.to_string()) }; if let Some(html) = html { main_part = PartBuilder::new() .message_type(MimeMultipartType::Alternative) .child(main_part.build()) .child(new_html_mimepart(html).build()); } } // add attachment part if msg.viewtype.has_file() { let (file_part, _) = build_body_file(context, &msg, "").await?; parts.push(file_part); } if let Some(msg_kml_part) = self.get_message_kml_part() { parts.push(msg_kml_part); } if location::is_sending_locations_to_chat(context, Some(msg.chat_id)).await? { if let Some(part) = self.get_location_kml_part(context).await? { parts.push(part); } } // we do not piggyback sync-files to other self-sent-messages // to not risk files becoming too larger and being skipped by download-on-demand. if command == SystemMessage::MultiDeviceSync && self.is_e2ee_guaranteed() { let json = msg.param.get(Param::Arg).unwrap_or_default(); let ids = msg.param.get(Param::Arg2).unwrap_or_default(); parts.push(context.build_sync_part(json.to_string())); self.sync_ids_to_delete = Some(ids.to_string()); } else if command == SystemMessage::WebxdcStatusUpdate { let json = msg.param.get(Param::Arg).unwrap_or_default(); parts.push(context.build_status_update_part(json)); } else if msg.viewtype == Viewtype::Webxdc { let topic = peer_channels::create_random_topic(); headers .protected .push(create_iroh_header(context, topic, msg.id).await?); if let Some(json) = context .render_webxdc_status_update_object(msg.id, None) .await? { parts.push(context.build_status_update_part(&json)); } } if self.attach_selfavatar { match context.get_config(Config::Selfavatar).await? { Some(path) => match build_avatar_file(context, &path).await { Ok(avatar) => headers.hidden.push(Header::new( "Chat-User-Avatar".into(), format!("base64:{avatar}"), )), Err(err) => warn!(context, "mimefactory: cannot attach selfavatar: {}", err), }, None => headers .protected .push(Header::new("Chat-User-Avatar".into(), "0".into())), } } Ok((main_part, parts)) } /// Render an MDN async fn render_mdn(&mut self, context: &Context) -> Result { // RFC 6522, this also requires the `report-type` parameter which is equal // to the MIME subtype of the second body part of the multipart/report // // currently, we do not send MDNs encrypted: // - in a multi-device-setup that is not set up properly, MDNs would disturb the communication as they // are send automatically which may lead to spreading outdated Autocrypt headers. // - they do not carry any information but the Message-ID // - this save some KB // - in older versions, we did not encrypt messages to ourself when they to to SMTP - however, if these messages // are forwarded for any reasons (eg. gmail always forwards to IMAP), we have no chance to decrypt them; // this issue is fixed with 0.9.4 let Loaded::Mdn { rfc724_mid, additional_msg_ids, } = &self.loaded else { bail!("Attempt to render a message as MDN"); }; let mut message = PartBuilder::new().header(( "Content-Type".to_string(), "multipart/report; report-type=disposition-notification".to_string(), )); // first body part: always human-readable, always REQUIRED by RFC 6522 let message_text = format!( "{}\r\n", format_flowed(&stock_str::read_rcpt_mail_body(context).await) ); let text_part = PartBuilder::new().header(( "Content-Type".to_string(), "text/plain; charset=utf-8; format=flowed; delsp=no".to_string(), )); let text_part = self.add_message_text(text_part, message_text); message = message.child(text_part.build()); // second body part: machine-readable, always REQUIRED by RFC 6522 let message_text2 = format!( "Original-Recipient: rfc822;{}\r\n\ Final-Recipient: rfc822;{}\r\n\ Original-Message-ID: <{}>\r\n\ Disposition: manual-action/MDN-sent-automatically; displayed\r\n", self.from_addr, self.from_addr, rfc724_mid ); let extension_fields = if additional_msg_ids.is_empty() { "".to_string() } else { "Additional-Message-IDs: ".to_string() + &additional_msg_ids .iter() .map(|mid| render_rfc724_mid(mid)) .collect::>() .join(" ") + "\r\n" }; message = message.child( PartBuilder::new() .content_type(&"message/disposition-notification".parse().unwrap()) .body(message_text2 + &extension_fields) .build(), ); Ok(message) } } /// Returns base64-encoded buffer `buf` split into 76-bytes long /// chunks separated by CRLF. /// /// [RFC2045 specification of base64 Content-Transfer-Encoding](https://datatracker.ietf.org/doc/html/rfc2045#section-6.8) /// says that "The encoded output stream must be represented in lines of no more than 76 characters each." /// Longer lines trigger `BASE64_LENGTH_78_79` rule of SpamAssassin. pub(crate) fn wrapped_base64_encode(buf: &[u8]) -> String { let base64 = base64::engine::general_purpose::STANDARD.encode(buf); let mut chars = base64.chars(); std::iter::repeat_with(|| chars.by_ref().take(76).collect::()) .take_while(|s| !s.is_empty()) .collect::>() .join("\r\n") } async fn build_body_file( context: &Context, msg: &Message, base_name: &str, ) -> Result<(PartBuilder, String)> { let blob = msg .param .get_blob(Param::File, context, true) .await? .context("msg has no file")?; let suffix = blob.suffix().unwrap_or("dat"); // Get file name to use for sending. For privacy purposes, we do // not transfer the original filenames eg. for images; these names // are normally not needed and contain timestamps, running numbers // etc. let filename_to_send: String = match msg.viewtype { Viewtype::Voice => format!( "voice-messsage_{}.{}", chrono::Utc .timestamp_opt(msg.timestamp_sort, 0) .single() .map_or_else( || "YY-mm-dd_hh:mm:ss".to_string(), |ts| ts.format("%Y-%m-%d_%H-%M-%S").to_string() ), &suffix ), Viewtype::Image | Viewtype::Gif => format!( "image_{}.{}", if base_name.is_empty() { chrono::Utc .timestamp_opt(msg.timestamp_sort, 0) .single() .map_or_else( || "YY-mm-dd_hh:mm:ss".to_string(), |ts| ts.format("%Y-%m-%d_%H-%M-%S").to_string(), ) } else { base_name.to_string() }, &suffix, ), Viewtype::Video => format!( "video_{}.{}", chrono::Utc .timestamp_opt(msg.timestamp_sort, 0) .single() .map_or_else( || "YY-mm-dd_hh:mm:ss".to_string(), |ts| ts.format("%Y-%m-%d_%H-%M-%S").to_string() ), &suffix ), _ => msg .param .get(Param::Filename) .unwrap_or_else(|| blob.as_file_name()) .to_string(), }; /* check mimetype */ let mimetype: mime::Mime = match msg.param.get(Param::MimeType) { Some(mtype) => mtype.parse()?, None => { if let Some(res) = message::guess_msgtype_from_suffix(blob.as_rel_path()) { res.1.parse()? } else { mime::APPLICATION_OCTET_STREAM } } }; // create mime part, for Content-Disposition, see RFC 2183. // `Content-Disposition: attachment` seems not to make a difference to `Content-Disposition: inline` // at least on tested Thunderbird and Gma'l in 2017. // But I've heard about problems with inline and outl'k, so we just use the attachment-type until we // run into other problems ... let cd_value = format!( "attachment; filename=\"{}\"", maybe_encode_words(&filename_to_send) ); let body = fs::read(blob.to_abs_path()).await?; let encoded_body = wrapped_base64_encode(&body); let mail = PartBuilder::new() .content_type(&mimetype) .header(("Content-Disposition", cd_value)) .header(("Content-Transfer-Encoding", "base64")) .body(encoded_body); Ok((mail, filename_to_send)) } async fn build_avatar_file(context: &Context, path: &str) -> Result { let blob = match path.starts_with("$BLOBDIR/") { true => BlobObject::from_name(context, path.to_string())?, false => BlobObject::from_path(context, path.as_ref())?, }; let body = fs::read(blob.to_abs_path()).await?; let encoded_body = wrapped_base64_encode(&body); Ok(encoded_body) } fn recipients_contain_addr(recipients: &[(String, String)], addr: &str) -> bool { let addr_lc = addr.to_lowercase(); recipients .iter() .any(|(_, cur)| cur.to_lowercase() == addr_lc) } fn render_rfc724_mid(rfc724_mid: &str) -> String { let rfc724_mid = rfc724_mid.trim().to_string(); if rfc724_mid.chars().next().unwrap_or_default() == '<' { rfc724_mid } else { format!("<{rfc724_mid}>") } } fn render_rfc724_mid_list(mid_list: &str) -> String { mid_list .trim() .split_ascii_whitespace() .map(render_rfc724_mid) .collect::>() .join(" ") } /* ****************************************************************************** * Encode/decode header words, RFC 2047 ******************************************************************************/ fn encode_words(word: &str) -> String { encoded_words::encode(word, None, encoded_words::EncodingFlag::Shortest, None) } fn needs_encoding(to_check: &str) -> bool { !to_check.chars().all(|c| { c.is_ascii_alphanumeric() || c == '-' || c == '_' || c == '.' || c == '~' || c == '%' }) } fn maybe_encode_words(words: &str) -> String { if needs_encoding(words) { encode_words(words) } else { words.to_string() } } #[cfg(test)] mod tests { use deltachat_contact_tools::ContactAddress; use mailparse::{addrparse_header, MailHeaderMap}; use std::str; use super::*; use crate::chat::{ add_contact_to_chat, create_group_chat, remove_contact_from_chat, send_text_msg, ChatId, ProtectionStatus, }; use crate::chatlist::Chatlist; use crate::constants; use crate::contact::Origin; use crate::mimeparser::MimeMessage; use crate::receive_imf::receive_imf; use crate::test_utils::{get_chat_msg, TestContext, TestContextManager}; #[test] fn test_render_email_address() { let display_name = "ä space"; let addr = "x@y.org"; assert!(!display_name.is_ascii()); assert!(!display_name .chars() .all(|c| c.is_ascii_alphanumeric() || c == ' ')); let s = format!( "{}", Address::new_mailbox_with_name(display_name.to_string(), addr.to_string()) ); println!("{s}"); assert_eq!(s, "=?utf-8?q?=C3=A4_space?= "); } #[test] fn test_render_email_address_noescape() { let display_name = "a space"; let addr = "x@y.org"; assert!(display_name.is_ascii()); assert!(display_name .chars() .all(|c| c.is_ascii_alphanumeric() || c == ' ')); let s = format!( "{}", Address::new_mailbox_with_name(display_name.to_string(), addr.to_string()) ); // Addresses should not be unnecessarily be encoded, see : assert_eq!(s, "a space "); } #[test] fn test_render_rfc724_mid() { assert_eq!( render_rfc724_mid("kqjwle123@qlwe"), "".to_string() ); assert_eq!( render_rfc724_mid(" kqjwle123@qlwe "), "".to_string() ); assert_eq!( render_rfc724_mid(""), "".to_string() ); } #[test] fn test_render_rc724_mid_list() { assert_eq!(render_rfc724_mid_list("123@q "), "<123@q>".to_string()); assert_eq!(render_rfc724_mid_list(" 123@q "), "<123@q>".to_string()); assert_eq!( render_rfc724_mid_list("123@q 456@d "), "<123@q> <456@d>".to_string() ); } #[test] fn test_wrapped_base64_encode() { let input = b"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"; let output = "QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB\r\n\ QUFBQUFBQUFBQQ=="; assert_eq!(wrapped_base64_encode(input), output); } #[test] fn test_needs_encoding() { assert!(!needs_encoding("")); assert!(!needs_encoding("foobar")); assert!(needs_encoding(" ")); assert!(needs_encoding("foo bar")); } #[test] fn test_maybe_encode_words() { assert_eq!(maybe_encode_words("foobar"), "foobar"); assert_eq!(maybe_encode_words("-_.~%"), "-_.~%"); assert_eq!(maybe_encode_words("äöü"), "=?utf-8?b?w6TDtsO8?="); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_manually_set_subject() -> Result<()> { let t = TestContext::new_alice().await; let chat = t.create_chat_with_contact("bob", "bob@example.org").await; let mut msg = Message::new(Viewtype::Text); msg.set_subject("Subjeeeeect".to_string()); let sent_msg = t.send_msg(chat.id, &mut msg).await; let payload = sent_msg.payload(); assert_eq!(payload.match_indices("Subject: Subjeeeeect").count(), 1); Ok(()) } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_subject_from_mua() { // 1.: Receive a mail from an MUA assert_eq!( msg_to_subject_str( b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: Bob \n\ To: alice@example.org\n\ Subject: Antw: Chat: hello\n\ Message-ID: <2222@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n" ) .await, "Re: Chat: hello" ); assert_eq!( msg_to_subject_str( b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: Bob \n\ To: alice@example.org\n\ Subject: Infos: 42\n\ Message-ID: <2222@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n" ) .await, "Re: Infos: 42" ); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_subject_from_dc() { // 2. Receive a message from Delta Chat assert_eq!( msg_to_subject_str( b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: bob@example.com\n\ To: alice@example.org\n\ Subject: Chat: hello\n\ Chat-Version: 1.0\n\ Message-ID: <2223@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n" ) .await, "Re: Chat: hello" ); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_subject_outgoing() { // 3. Send the first message to a new contact let t = TestContext::new_alice().await; assert_eq!(first_subject_str(t).await, "Message from alice@example.org"); let t = TestContext::new_alice().await; t.set_config(Config::Displayname, Some("Alice")) .await .unwrap(); assert_eq!(first_subject_str(t).await, "Message from Alice"); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_subject_unicode() { // 4. Receive messages with unicode characters and make sure that we do not panic (we do not care about the result) msg_to_subject_str( "Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: bob@example.com\n\ To: alice@example.org\n\ Subject: äääää\n\ Chat-Version: 1.0\n\ Message-ID: <2893@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n" .as_bytes(), ) .await; msg_to_subject_str( "Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: bob@example.com\n\ To: alice@example.org\n\ Subject: aäääää\n\ Chat-Version: 1.0\n\ Message-ID: <2893@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n" .as_bytes(), ) .await; } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_subject_mdn() { // 5. Receive an mdn (read receipt) and make sure the mdn's subject is not used let t = TestContext::new_alice().await; receive_imf( &t, b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: alice@example.org\n\ To: bob@example.com\n\ Subject: Hello, Bob\n\ Chat-Version: 1.0\n\ Message-ID: <2893@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n", false, ) .await .unwrap(); let new_msg = incoming_msg_to_reply_msg( b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: bob@example.com\n\ To: alice@example.org\n\ Subject: message opened\n\ Date: Sun, 22 Mar 2020 23:37:57 +0000\n\ Chat-Version: 1.0\n\ Message-ID: \n\ Content-Type: multipart/report; report-type=disposition-notification; boundary=\"SNIPP\"\n\ \n\ \n\ --SNIPP\n\ Content-Type: text/plain; charset=utf-8\n\ \n\ Read receipts do not guarantee sth. was read.\n\ \n\ \n\ --SNIPP\n\ Content-Type: message/disposition-notification\n\ \n\ Reporting-UA: Delta Chat 1.28.0\n\ Original-Recipient: rfc822;bob@example.com\n\ Final-Recipient: rfc822;bob@example.com\n\ Original-Message-ID: <2893@example.com>\n\ Disposition: manual-action/MDN-sent-automatically; displayed\n\ \n", &t).await; let mf = MimeFactory::from_msg(&t, new_msg).await.unwrap(); // The subject string should not be "Re: message opened" assert_eq!("Re: Hello, Bob", mf.subject_str(&t).await.unwrap()); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_mdn_create_encrypted() -> Result<()> { let mut tcm = TestContextManager::new(); let alice = tcm.alice().await; alice .set_config(Config::Displayname, Some("Alice Exampleorg")) .await?; let bob = tcm.bob().await; bob.set_config(Config::Displayname, Some("Bob Examplenet")) .await?; bob.set_config(Config::Selfstatus, Some("Bob Examplenet")) .await?; bob.set_config_bool(Config::MdnsEnabled, true).await?; let mut msg = Message::new(Viewtype::Text); msg.param.set_int(Param::SkipAutocrypt, 1); let chat_alice = alice.create_chat(&bob).await.id; let sent = alice.send_msg(chat_alice, &mut msg).await; let rcvd = bob.recv_msg(&sent).await; message::markseen_msgs(&bob, vec![rcvd.id]).await?; let mimefactory = MimeFactory::from_mdn(&bob, rcvd.from_id, rcvd.rfc724_mid.clone(), vec![]).await?; let rendered_msg = mimefactory.render(&bob).await?; assert!(!rendered_msg.is_encrypted); assert!(!rendered_msg.message.contains("Bob Examplenet")); assert!(!rendered_msg.message.contains("Alice Exampleorg")); let bob_alice_contact = bob.add_or_lookup_contact(&alice).await; assert_eq!(bob_alice_contact.get_authname(), "Alice Exampleorg"); let rcvd = tcm.send_recv(&alice, &bob, "Heyho").await; message::markseen_msgs(&bob, vec![rcvd.id]).await?; let mimefactory = MimeFactory::from_mdn(&bob, rcvd.from_id, rcvd.rfc724_mid, vec![]).await?; let rendered_msg = mimefactory.render(&bob).await?; // When encrypted, the MDN should be encrypted as well assert!(rendered_msg.is_encrypted); assert!(!rendered_msg.message.contains("Bob Examplenet")); assert!(!rendered_msg.message.contains("Alice Exampleorg")); Ok(()) } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_subject_in_group() -> Result<()> { async fn send_msg_get_subject( t: &TestContext, group_id: ChatId, quote: Option<&Message>, ) -> Result { let mut new_msg = Message::new(Viewtype::Text); new_msg.set_text("Hi".to_string()); if let Some(q) = quote { new_msg.set_quote(t, Some(q)).await?; } let sent = t.send_msg(group_id, &mut new_msg).await; get_subject(t, sent).await } async fn get_subject( t: &TestContext, sent: crate::test_utils::SentMessage<'_>, ) -> Result { let parsed_subject = t.parse_msg(&sent).await.get_subject().unwrap(); let sent_msg = sent.load_from_db().await; assert_eq!(parsed_subject, sent_msg.subject); Ok(parsed_subject) } // 6. Test that in a group, replies also take the quoted message's subject, while non-replies use the group title as subject let t = TestContext::new_alice().await; let group_id = chat::create_group_chat(&t, chat::ProtectionStatus::Unprotected, "groupname") // TODO encodings, ä .await .unwrap(); let bob = Contact::create(&t, "", "bob@example.org").await?; chat::add_contact_to_chat(&t, group_id, bob).await?; let subject = send_msg_get_subject(&t, group_id, None).await?; assert_eq!(subject, "groupname"); let subject = send_msg_get_subject(&t, group_id, None).await?; assert_eq!(subject, "Re: groupname"); receive_imf( &t, format!( "Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: bob@example.com\n\ To: alice@example.org\n\ Subject: Different subject\n\ In-Reply-To: {}\n\ Message-ID: <2893@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n", t.get_last_msg().await.rfc724_mid ) .as_bytes(), false, ) .await?; let message_from_bob = t.get_last_msg().await; let subject = send_msg_get_subject(&t, group_id, None).await?; assert_eq!(subject, "Re: groupname"); let subject = send_msg_get_subject(&t, group_id, Some(&message_from_bob)).await?; let outgoing_quoting_msg = t.get_last_msg().await; assert_eq!(subject, "Re: Different subject"); let subject = send_msg_get_subject(&t, group_id, None).await?; assert_eq!(subject, "Re: groupname"); let subject = send_msg_get_subject(&t, group_id, Some(&outgoing_quoting_msg)).await?; assert_eq!(subject, "Re: Different subject"); chat::forward_msgs(&t, &[message_from_bob.id], group_id).await?; let subject = get_subject(&t, t.pop_sent_msg().await).await?; assert_eq!(subject, "Re: groupname"); Ok(()) } async fn first_subject_str(t: TestContext) -> String { let contact_id = Contact::add_or_lookup( &t, "Dave", &ContactAddress::new("dave@example.com").unwrap(), Origin::ManuallyCreated, ) .await .unwrap() .0; let chat_id = ChatId::create_for_contact(&t, contact_id).await.unwrap(); let mut new_msg = Message::new(Viewtype::Text); new_msg.set_text("Hi".to_string()); new_msg.chat_id = chat_id; chat::prepare_msg(&t, chat_id, &mut new_msg).await.unwrap(); let mf = MimeFactory::from_msg(&t, new_msg).await.unwrap(); mf.subject_str(&t).await.unwrap() } // In `imf_raw`, From has to be bob@example.com, To has to be alice@example.org async fn msg_to_subject_str(imf_raw: &[u8]) -> String { let subject_str = msg_to_subject_str_inner(imf_raw, false, false, false).await; // Check that combinations of true and false reproduce the same subject_str: assert_eq!( subject_str, msg_to_subject_str_inner(imf_raw, true, false, false).await ); assert_eq!( subject_str, msg_to_subject_str_inner(imf_raw, false, true, false).await ); assert_eq!( subject_str, msg_to_subject_str_inner(imf_raw, false, true, true).await ); assert_eq!( subject_str, msg_to_subject_str_inner(imf_raw, true, true, false).await ); // These two combinations are different: If `message_arrives_inbetween` is true, but // `reply` is false, the core is actually expected to use the subject of the message // that arrived in between. assert_eq!( "Re: Some other, completely unrelated subject", msg_to_subject_str_inner(imf_raw, false, false, true).await ); assert_eq!( "Re: Some other, completely unrelated subject", msg_to_subject_str_inner(imf_raw, true, false, true).await ); // We leave away the combination (true, true, true) here: // It would mean that the original message is quoted without sending the quoting message // out yet, then the original message is deleted, then another unrelated message arrives // and then the message with the quote is sent out. Not very realistic. subject_str } async fn msg_to_subject_str_inner( imf_raw: &[u8], delete_original_msg: bool, reply: bool, message_arrives_inbetween: bool, ) -> String { let t = TestContext::new_alice().await; let mut new_msg = incoming_msg_to_reply_msg(imf_raw, &t).await; let incoming_msg = get_chat_msg(&t, new_msg.chat_id, 0, 2).await; if delete_original_msg { incoming_msg.id.trash(&t, false).await.unwrap(); } if message_arrives_inbetween { receive_imf( &t, b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: Bob \n\ To: alice@example.org\n\ Subject: Some other, completely unrelated subject\n\ Message-ID: <3cl4@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ Some other, completely unrelated content\n", false, ) .await .unwrap(); let arrived_msg = t.get_last_msg().await; assert_eq!(arrived_msg.chat_id, incoming_msg.chat_id); } if reply { new_msg.set_quote(&t, Some(&incoming_msg)).await.unwrap(); } let mf = MimeFactory::from_msg(&t, new_msg).await.unwrap(); mf.subject_str(&t).await.unwrap() } // Creates a `Message` that replies "Hi" to the incoming email in `imf_raw`. async fn incoming_msg_to_reply_msg(imf_raw: &[u8], context: &Context) -> Message { context .set_config(Config::ShowEmails, Some("2")) .await .unwrap(); receive_imf(context, imf_raw, false).await.unwrap(); let chats = Chatlist::try_load(context, 0, None, None).await.unwrap(); let chat_id = chats.get_chat_id(0).unwrap(); chat_id.accept(context).await.unwrap(); let mut new_msg = Message::new(Viewtype::Text); new_msg.set_text("Hi".to_string()); new_msg.chat_id = chat_id; chat::prepare_msg(context, chat_id, &mut new_msg) .await .unwrap(); new_msg } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] // This test could still be extended async fn test_render_reply() { let t = TestContext::new_alice().await; let context = &t; let msg = incoming_msg_to_reply_msg( b"Received: (Postfix, from userid 1000); Mon, 4 Dec 2006 14:51:39 +0100 (CET)\n\ From: Charlie \n\ To: alice@example.org\n\ Subject: Chat: hello\n\ Chat-Version: 1.0\n\ Message-ID: <2223@example.com>\n\ Date: Sun, 22 Mar 2020 22:37:56 +0000\n\ \n\ hello\n", context, ) .await; let mimefactory = MimeFactory::from_msg(&t, msg).await.unwrap(); let recipients = mimefactory.recipients(); assert_eq!(recipients, vec!["charlie@example.com"]); let rendered_msg = mimefactory.render(context).await.unwrap(); let mail = mailparse::parse_mail(rendered_msg.message.as_bytes()).unwrap(); assert_eq!( mail.headers .iter() .find(|h| h.get_key() == "MIME-Version") .unwrap() .get_value(), "1.0" ); let _mime_msg = MimeMessage::from_bytes(context, rendered_msg.message.as_bytes(), None) .await .unwrap(); } #[test] fn test_no_empty_lines_in_header() { // See let to_tuples = [ ("Nnnn", "nnn@ttttttttt.de"), ("😀 ttttttt", "ttttttt@rrrrrr.net"), ("dididididididi", "t@iiiiiii.org"), ("Ttttttt", "oooooooooo@abcd.de"), ("Mmmmm", "mmmmm@rrrrrr.net"), ("Zzzzzz", "rrrrrrrrrrrrr@ttttttttt.net"), ("Xyz", "qqqqqqqqqq@rrrrrr.net"), ("", "geug@ttttttttt.de"), ("qqqqqq", "q@iiiiiii.org"), ("bbbb", "bbbb@iiiiiii.org"), ("", "fsfs@iiiiiii.org"), ("rqrqrqrqr", "rqrqr@iiiiiii.org"), ("tttttttt", "tttttttt@iiiiiii.org"), ("", "tttttt@rrrrrr.net"), ] .iter(); let to: Vec<_> = to_tuples .map(|(name, addr)| { if name.is_empty() { Address::new_mailbox(addr.to_string()) } else { Address::new_mailbox_with_name(name.to_string(), addr.to_string()) } }) .collect(); let mut message = email::MimeMessage::new_blank_message(); message.headers.insert( ( "Content-Type".to_string(), "text/plain; charset=utf-8; format=flowed; delsp=no".to_string(), ) .into(), ); message .headers .insert(Header::new_with_value("To".into(), to).unwrap()); message.body = "Hi".to_string(); let msg = message.as_string(); let header_end = msg.find("Hi").unwrap(); #[allow(clippy::indexing_slicing)] let headers = msg[0..header_end].trim(); assert!(!headers.lines().any(|l| l.trim().is_empty())); } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_selfavatar_unencrypted() -> anyhow::Result<()> { // create chat with bob, set selfavatar let t = TestContext::new_alice().await; let chat = t.create_chat_with_contact("bob", "bob@example.org").await; let file = t.dir.path().join("avatar.png"); let bytes = include_bytes!("../test-data/image/avatar64x64.png"); tokio::fs::write(&file, bytes).await?; t.set_config(Config::Selfavatar, Some(file.to_str().unwrap())) .await?; // send message to bob: that should get multipart/mixed because of the avatar moved to inner header; // make sure, `Subject:` stays in the outer header (imf header) let mut msg = Message::new(Viewtype::Text); msg.set_text("this is the text!".to_string()); let sent_msg = t.send_msg(chat.id, &mut msg).await; let mut payload = sent_msg.payload().splitn(3, "\r\n\r\n"); let outer = payload.next().unwrap(); let inner = payload.next().unwrap(); let body = payload.next().unwrap(); assert_eq!(outer.match_indices("multipart/mixed").count(), 1); assert_eq!(outer.match_indices("Message-ID:").count(), 1); assert_eq!(outer.match_indices("Subject:").count(), 1); assert_eq!(outer.match_indices("Autocrypt:").count(), 1); assert_eq!(outer.match_indices("Chat-User-Avatar:").count(), 0); assert_eq!(inner.match_indices("text/plain").count(), 1); assert_eq!(inner.match_indices("Message-ID:").count(), 1); assert_eq!(inner.match_indices("Chat-User-Avatar:").count(), 1); assert_eq!(inner.match_indices("Subject:").count(), 0); assert_eq!(inner.match_indices("quoted-printable").count(), 1); assert_eq!(body.match_indices("this is the text!").count(), 1); // if another message is sent, that one must not contain the avatar let sent_msg = t.send_msg(chat.id, &mut msg).await; let mut payload = sent_msg.payload().splitn(3, "\r\n\r\n"); let outer = payload.next().unwrap(); let inner = payload.next().unwrap(); let body = payload.next().unwrap(); assert_eq!(outer.match_indices("multipart/mixed").count(), 1); assert_eq!(outer.match_indices("Message-ID:").count(), 1); assert_eq!(outer.match_indices("Subject:").count(), 1); assert_eq!(outer.match_indices("Autocrypt:").count(), 1); assert_eq!(outer.match_indices("Chat-User-Avatar:").count(), 0); assert_eq!(inner.match_indices("text/plain").count(), 1); assert_eq!(inner.match_indices("Message-ID:").count(), 1); assert_eq!(inner.match_indices("Chat-User-Avatar:").count(), 0); assert_eq!(inner.match_indices("Subject:").count(), 0); assert_eq!(inner.match_indices("quoted-printable").count(), 1); assert_eq!(body.match_indices("this is the text!").count(), 1); Ok(()) } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_selfavatar_unencrypted_signed() { // create chat with bob, set selfavatar let t = TestContext::new_alice().await; t.set_config(Config::SignUnencrypted, Some("1")) .await .unwrap(); let chat = t.create_chat_with_contact("bob", "bob@example.org").await; let file = t.dir.path().join("avatar.png"); let bytes = include_bytes!("../test-data/image/avatar64x64.png"); tokio::fs::write(&file, bytes).await.unwrap(); t.set_config(Config::Selfavatar, Some(file.to_str().unwrap())) .await .unwrap(); // send message to bob: that should get multipart/mixed because of the avatar moved to inner header; // make sure, `Subject:` stays in the outer header (imf header) let mut msg = Message::new(Viewtype::Text); msg.set_text("this is the text!".to_string()); let sent_msg = t.send_msg(chat.id, &mut msg).await; let mut payload = sent_msg.payload().splitn(4, "\r\n\r\n"); let part = payload.next().unwrap(); assert_eq!(part.match_indices("multipart/signed").count(), 1); assert_eq!(part.match_indices("From:").count(), 1); assert_eq!(part.match_indices("Message-ID:").count(), 1); assert_eq!(part.match_indices("Subject:").count(), 0); assert_eq!(part.match_indices("Autocrypt:").count(), 1); assert_eq!(part.match_indices("Chat-User-Avatar:").count(), 0); let part = payload.next().unwrap(); assert_eq!( part.match_indices("multipart/mixed; protected-headers=\"v1\"") .count(), 1 ); assert_eq!(part.match_indices("From:").count(), 1); assert_eq!(part.match_indices("Message-ID:").count(), 0); assert_eq!(part.match_indices("Subject:").count(), 1); assert_eq!(part.match_indices("Autocrypt:").count(), 0); assert_eq!(part.match_indices("Chat-User-Avatar:").count(), 0); let part = payload.next().unwrap(); assert_eq!(part.match_indices("text/plain").count(), 1); assert_eq!(part.match_indices("From:").count(), 0); assert_eq!(part.match_indices("Message-ID:").count(), 1); assert_eq!(part.match_indices("Chat-User-Avatar:").count(), 1); assert_eq!(part.match_indices("Subject:").count(), 0); assert_eq!(part.match_indices("quoted-printable").count(), 1); let body = payload.next().unwrap(); assert_eq!(body.match_indices("this is the text!").count(), 1); let bob = TestContext::new_bob().await; bob.recv_msg(&sent_msg).await; let alice_id = Contact::lookup_id_by_addr(&bob.ctx, "alice@example.org", Origin::Unknown) .await .unwrap() .unwrap(); let alice_contact = Contact::get_by_id(&bob.ctx, alice_id).await.unwrap(); assert!(alice_contact .get_profile_image(&bob.ctx) .await .unwrap() .is_some()); // if another message is sent, that one must not contain the avatar let sent_msg = t.send_msg(chat.id, &mut msg).await; let mut payload = sent_msg.payload().splitn(4, "\r\n\r\n"); let part = payload.next().unwrap(); assert_eq!(part.match_indices("multipart/signed").count(), 1); assert_eq!(part.match_indices("From:").count(), 1); assert_eq!(part.match_indices("Message-ID:").count(), 1); assert_eq!(part.match_indices("Subject:").count(), 0); assert_eq!(part.match_indices("Autocrypt:").count(), 1); assert_eq!(part.match_indices("Chat-User-Avatar:").count(), 0); let part = payload.next().unwrap(); assert_eq!( part.match_indices("multipart/mixed; protected-headers=\"v1\"") .count(), 1 ); assert_eq!(part.match_indices("From:").count(), 1); assert_eq!(part.match_indices("Message-ID:").count(), 0); assert_eq!(part.match_indices("Subject:").count(), 1); assert_eq!(part.match_indices("Autocrypt:").count(), 0); assert_eq!(part.match_indices("Chat-User-Avatar:").count(), 0); let part = payload.next().unwrap(); assert_eq!(part.match_indices("text/plain").count(), 1); assert_eq!(body.match_indices("From:").count(), 0); assert_eq!(part.match_indices("Message-ID:").count(), 1); assert_eq!(part.match_indices("Chat-User-Avatar:").count(), 0); assert_eq!(part.match_indices("Subject:").count(), 0); assert_eq!(part.match_indices("quoted-printable").count(), 1); let body = payload.next().unwrap(); assert_eq!(body.match_indices("this is the text!").count(), 1); bob.recv_msg(&sent_msg).await; let alice_contact = Contact::get_by_id(&bob.ctx, alice_id).await.unwrap(); assert!(alice_contact .get_profile_image(&bob.ctx) .await .unwrap() .is_some()); } /// Test that removed member address does not go into the `To:` field. #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_remove_member_bcc() -> Result<()> { // Alice creates a group with Bob and Claire and then removes Bob. let alice = TestContext::new_alice().await; let bob_id = Contact::create(&alice, "Bob", "bob@example.net").await?; let claire_id = Contact::create(&alice, "Claire", "claire@foo.de").await?; let alice_chat_id = create_group_chat(&alice, ProtectionStatus::Unprotected, "foo").await?; add_contact_to_chat(&alice, alice_chat_id, bob_id).await?; add_contact_to_chat(&alice, alice_chat_id, claire_id).await?; send_text_msg(&alice, alice_chat_id, "Creating a group".to_string()).await?; remove_contact_from_chat(&alice, alice_chat_id, claire_id).await?; let remove = alice.pop_sent_msg().await; let remove_payload = remove.payload(); let parsed = mailparse::parse_mail(remove_payload.as_bytes())?; let to = parsed .headers .get_first_header("To") .context("no To: header parsed")?; let to = addrparse_header(to)?; let mailbox = to .extract_single_info() .context("to: field does not contain exactly one address")?; assert_eq!(mailbox.addr, "bob@example.net"); Ok(()) } /// Tests that standard IMF header "From:" comes before non-standard "Autocrypt:" header. #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_from_before_autocrypt() -> Result<()> { // create chat with bob let t = TestContext::new_alice().await; let chat = t.create_chat_with_contact("bob", "bob@example.org").await; // send message to bob: that should get multipart/mixed because of the avatar moved to inner header; // make sure, `Subject:` stays in the outer header (imf header) let mut msg = Message::new(Viewtype::Text); msg.set_text("this is the text!".to_string()); let sent_msg = t.send_msg(chat.id, &mut msg).await; let payload = sent_msg.payload(); assert_eq!(payload.match_indices("Autocrypt:").count(), 1); assert_eq!(payload.match_indices("From:").count(), 1); assert!(payload.match_indices("From:").next() < payload.match_indices("Autocrypt:").next()); Ok(()) } #[tokio::test(flavor = "multi_thread", worker_threads = 2)] async fn test_protected_headers_directive() -> Result<()> { let mut tcm = TestContextManager::new(); let alice = tcm.alice().await; let bob = tcm.bob().await; let chat = tcm .send_recv_accept(&alice, &bob, "alice->bob") .await .chat_id; // Now Bob can send an encrypted message to Alice. let mut msg = Message::new(Viewtype::File); // Long messages are truncated and MimeMessage::decoded_data is set for them. We need // decoded_data to check presence of the necessary headers. msg.set_text("a".repeat(constants::DC_DESIRED_TEXT_LEN + 1)); msg.set_file_from_bytes(&bob, "foo.bar", "content".as_bytes(), None) .await?; let sent = bob.send_msg(chat, &mut msg).await; assert!(msg.get_showpadlock()); let mime = MimeMessage::from_bytes(&alice, sent.payload.as_bytes(), None).await?; let mut payload = str::from_utf8(&mime.decoded_data)?.splitn(2, "\r\n\r\n"); let part = payload.next().unwrap(); assert_eq!( part.match_indices("multipart/mixed; protected-headers=\"v1\"") .count(), 1 ); assert_eq!(part.match_indices("Subject:").count(), 1); Ok(()) } }