mirror of
https://github.com/chatmail/core.git
synced 2026-04-21 07:26:29 +03:00
209 lines
6.0 KiB
Rust
209 lines
6.0 KiB
Rust
use std::{
|
|
ops::{Deref, DerefMut},
|
|
time::Duration,
|
|
};
|
|
|
|
use anyhow::{Context as _, Result};
|
|
|
|
use async_imap::Client as ImapClient;
|
|
use async_imap::Session as ImapSession;
|
|
|
|
use async_smtp::ServerAddress;
|
|
use tokio::net::{self, TcpStream};
|
|
use tokio_io_timeout::TimeoutStream;
|
|
|
|
use super::capabilities::Capabilities;
|
|
use super::session::Session;
|
|
use crate::login_param::{build_tls, Socks5Config};
|
|
|
|
use super::session::SessionStream;
|
|
|
|
/// IMAP write and read timeout in seconds.
|
|
const IMAP_TIMEOUT: Duration = Duration::from_secs(30);
|
|
|
|
#[derive(Debug)]
|
|
pub(crate) struct Client {
|
|
is_secure: bool,
|
|
inner: ImapClient<Box<dyn SessionStream>>,
|
|
}
|
|
|
|
impl Deref for Client {
|
|
type Target = ImapClient<Box<dyn SessionStream>>;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.inner
|
|
}
|
|
}
|
|
|
|
impl DerefMut for Client {
|
|
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
&mut self.inner
|
|
}
|
|
}
|
|
|
|
/// Determine server capabilities.
|
|
///
|
|
/// If server supports ID capability, send our client ID.
|
|
async fn determine_capabilities(
|
|
session: &mut ImapSession<Box<dyn SessionStream>>,
|
|
) -> Result<Capabilities> {
|
|
let caps = session
|
|
.capabilities()
|
|
.await
|
|
.context("CAPABILITY command error")?;
|
|
let server_id = if caps.has_str("ID") {
|
|
session.id([("name", Some("Delta Chat"))]).await?
|
|
} else {
|
|
None
|
|
};
|
|
let capabilities = Capabilities {
|
|
can_idle: caps.has_str("IDLE"),
|
|
can_move: caps.has_str("MOVE"),
|
|
can_check_quota: caps.has_str("QUOTA"),
|
|
can_condstore: caps.has_str("CONDSTORE"),
|
|
server_id,
|
|
};
|
|
Ok(capabilities)
|
|
}
|
|
|
|
impl Client {
|
|
pub(crate) async fn login(self, username: &str, password: &str) -> Result<Session> {
|
|
let Client { inner, .. } = self;
|
|
let mut session = inner
|
|
.login(username, password)
|
|
.await
|
|
.map_err(|(err, _client)| err)?;
|
|
let capabilities = determine_capabilities(&mut session).await?;
|
|
Ok(Session::new(session, capabilities))
|
|
}
|
|
|
|
pub(crate) async fn authenticate(
|
|
self,
|
|
auth_type: &str,
|
|
authenticator: impl async_imap::Authenticator,
|
|
) -> Result<Session> {
|
|
let Client { inner, .. } = self;
|
|
let mut session = inner
|
|
.authenticate(auth_type, authenticator)
|
|
.await
|
|
.map_err(|(err, _client)| err)?;
|
|
let capabilities = determine_capabilities(&mut session).await?;
|
|
Ok(Session::new(session, capabilities))
|
|
}
|
|
|
|
pub async fn connect_secure(
|
|
addr: impl net::ToSocketAddrs,
|
|
domain: &str,
|
|
strict_tls: bool,
|
|
) -> Result<Self> {
|
|
let tcp_stream = TcpStream::connect(addr).await?;
|
|
let mut timeout_stream = TimeoutStream::new(tcp_stream);
|
|
timeout_stream.set_write_timeout(Some(IMAP_TIMEOUT));
|
|
timeout_stream.set_read_timeout(Some(IMAP_TIMEOUT));
|
|
let timeout_stream = Box::pin(timeout_stream);
|
|
|
|
let tls = build_tls(strict_tls);
|
|
let tls_stream: Box<dyn SessionStream> =
|
|
Box::new(tls.connect(domain, timeout_stream).await?);
|
|
let mut client = ImapClient::new(tls_stream);
|
|
|
|
let _greeting = client
|
|
.read_response()
|
|
.await
|
|
.context("failed to read greeting")?;
|
|
|
|
Ok(Client {
|
|
is_secure: true,
|
|
inner: client,
|
|
})
|
|
}
|
|
|
|
pub async fn connect_insecure(addr: impl net::ToSocketAddrs) -> Result<Self> {
|
|
let tcp_stream = TcpStream::connect(addr).await?;
|
|
let mut timeout_stream = TimeoutStream::new(tcp_stream);
|
|
timeout_stream.set_write_timeout(Some(IMAP_TIMEOUT));
|
|
timeout_stream.set_read_timeout(Some(IMAP_TIMEOUT));
|
|
let timeout_stream = Box::pin(timeout_stream);
|
|
let stream: Box<dyn SessionStream> = Box::new(timeout_stream);
|
|
|
|
let mut client = ImapClient::new(stream);
|
|
let _greeting = client
|
|
.read_response()
|
|
.await
|
|
.context("failed to read greeting")?;
|
|
|
|
Ok(Client {
|
|
is_secure: false,
|
|
inner: client,
|
|
})
|
|
}
|
|
|
|
pub async fn connect_secure_socks5(
|
|
target_addr: &ServerAddress,
|
|
strict_tls: bool,
|
|
socks5_config: Socks5Config,
|
|
) -> Result<Self> {
|
|
let socks5_stream: Box<dyn SessionStream> = Box::new(
|
|
socks5_config
|
|
.connect(target_addr, Some(IMAP_TIMEOUT))
|
|
.await?,
|
|
);
|
|
|
|
let tls = build_tls(strict_tls);
|
|
let tls_stream: Box<dyn SessionStream> =
|
|
Box::new(tls.connect(target_addr.host.clone(), socks5_stream).await?);
|
|
let mut client = ImapClient::new(tls_stream);
|
|
|
|
let _greeting = client
|
|
.read_response()
|
|
.await
|
|
.context("failed to read greeting")?;
|
|
|
|
Ok(Client {
|
|
is_secure: true,
|
|
inner: client,
|
|
})
|
|
}
|
|
|
|
pub async fn connect_insecure_socks5(
|
|
target_addr: &ServerAddress,
|
|
socks5_config: Socks5Config,
|
|
) -> Result<Self> {
|
|
let socks5_stream: Box<dyn SessionStream> = Box::new(
|
|
socks5_config
|
|
.connect(target_addr, Some(IMAP_TIMEOUT))
|
|
.await?,
|
|
);
|
|
|
|
let mut client = ImapClient::new(socks5_stream);
|
|
let _greeting = client
|
|
.read_response()
|
|
.await
|
|
.context("failed to read greeting")?;
|
|
|
|
Ok(Client {
|
|
is_secure: false,
|
|
inner: client,
|
|
})
|
|
}
|
|
|
|
pub async fn secure(self, domain: &str, strict_tls: bool) -> Result<Self> {
|
|
if self.is_secure {
|
|
Ok(self)
|
|
} else {
|
|
let Client { mut inner, .. } = self;
|
|
let tls = build_tls(strict_tls);
|
|
inner.run_command_and_check_ok("STARTTLS", None).await?;
|
|
|
|
let stream = inner.into_inner();
|
|
let ssl_stream = tls.connect(domain, stream).await?;
|
|
let boxed: Box<dyn SessionStream> = Box::new(ssl_stream);
|
|
|
|
Ok(Client {
|
|
is_secure: true,
|
|
inner: ImapClient::new(boxed),
|
|
})
|
|
}
|
|
}
|
|
}
|