2 * git-imap-send - drops patches into an imap Drafts folder
3 * derived from isync/mbsync - mailbox synchronizer
5 * Copyright (C) 2000-2002 Michael R. Elkins <me@mutt.org>
6 * Copyright (C) 2002-2004 Oswald Buddenhagen <ossi@users.sf.net>
7 * Copyright (C) 2004 Theodore Y. Ts'o <tytso@mit.edu>
8 * Copyright (C) 2006 Mike McCormack
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
30 typedef struct store_conf {
32 const char *path; /* should this be here? its interpretation is driver-specific */
35 unsigned max_size; /* off_t is overkill */
36 unsigned trash_remote_new:1, trash_only_new:1;
39 typedef struct string_list {
40 struct string_list *next;
44 typedef struct channel_conf {
45 struct channel_conf *next;
47 store_conf_t *master, *slave;
48 char *master_name, *slave_name;
50 string_list_t *patterns;
52 unsigned max_messages; /* for slave only */
55 typedef struct group_conf {
56 struct group_conf *next;
58 string_list_t *channels;
61 /* For message->status */
62 #define M_RECENT (1<<0) /* unsyncable flag; maildir_* depend on this being 1<<0 */
63 #define M_DEAD (1<<1) /* expunged */
64 #define M_FLAGS (1<<2) /* flags fetched */
66 typedef struct message {
68 /* string_list_t *keywords; */
69 size_t size; /* zero implies "not fetched" */
71 unsigned char flags, status;
74 typedef struct store {
75 store_conf_t *conf; /* foreign */
77 /* currently open mailbox */
78 const char *name; /* foreign! maybe preset? */
80 message_t *msgs; /* own */
82 unsigned char opts; /* maybe preset? */
83 /* note that the following do _not_ reflect stats from msgs, but mailbox totals */
84 int count; /* # of messages */
85 int recent; /* # of recent messages - don't trust this beyond the initial read */
96 #define DRV_MSG_BAD -1
97 #define DRV_BOX_BAD -2
98 #define DRV_STORE_BAD -3
100 static int Verbose, Quiet;
102 static void imap_info( const char *, ... );
103 static void imap_warn( const char *, ... );
105 static char *next_arg( char ** );
107 static void free_generic_messages( message_t * );
109 static int nfsnprintf( char *buf, int blen, const char *fmt, ... );
111 static int nfvasprintf(char **strp, const char *fmt, va_list ap)
116 len = vsnprintf(tmp, sizeof(tmp), fmt, ap);
118 die("Fatal: Out of memory\n");
119 if (len >= sizeof(tmp))
120 die("imap command overflow !\n");
121 *strp = xmemdupz(tmp, len);
125 static void arc4_init( void );
126 static unsigned char arc4_getbyte( void );
128 typedef struct imap_server_conf {
137 } imap_server_conf_t;
139 typedef struct imap_store_conf {
141 imap_server_conf_t *server;
142 unsigned use_namespace:1;
145 #define NIL (void*)0x1
146 #define LIST (void*)0x2
148 typedef struct _list {
149 struct _list *next, *child;
168 typedef struct imap {
169 int uidnext; /* from SELECT responses */
170 list_t *ns_personal, *ns_other, *ns_shared; /* NAMESPACE info */
171 unsigned caps, rcaps; /* CAPABILITY results */
173 int nexttag, num_in_progress, literal_pending;
174 struct imap_cmd *in_progress, **in_progress_append;
175 buffer_t buf; /* this is BIG, so put it last */
178 typedef struct imap_store {
183 unsigned /*currentnc:1,*/ trashnc:1;
187 int (*cont)( imap_store_t *ctx, struct imap_cmd *cmd, const char *prompt );
188 void (*done)( imap_store_t *ctx, struct imap_cmd *cmd, int response);
193 unsigned create:1, trycreate:1;
197 struct imap_cmd *next;
198 struct imap_cmd_cb cb;
203 #define CAP(cap) (imap->caps & (1 << (cap)))
213 static const char *cap_list[] = {
225 static int get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd );
228 static const char *Flags[] = {
237 static void ssl_socket_perror(const char *func)
239 fprintf(stderr, "%s: %s\n", func, ERR_error_string(ERR_get_error(), 0));
244 socket_perror( const char *func, Socket_t *sock, int ret )
248 int sslerr = SSL_get_error(sock->ssl, ret);
252 case SSL_ERROR_SYSCALL:
253 perror("SSL_connect");
256 ssl_socket_perror("SSL_connect");
265 fprintf(stderr, "%s: unexpected EOF\n", func);
269 static int ssl_socket_connect(Socket_t *sock, int use_tls_only, int verify)
272 fprintf(stderr, "SSL requested but SSL support not compiled in\n");
280 SSL_load_error_strings();
283 meth = TLSv1_method();
285 meth = SSLv23_method();
288 ssl_socket_perror("SSLv23_method");
292 ctx = SSL_CTX_new(meth);
295 SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
297 if (!SSL_CTX_set_default_verify_paths(ctx)) {
298 ssl_socket_perror("SSL_CTX_set_default_verify_paths");
301 sock->ssl = SSL_new(ctx);
303 ssl_socket_perror("SSL_new");
306 if (!SSL_set_fd(sock->ssl, sock->fd)) {
307 ssl_socket_perror("SSL_set_fd");
311 ret = SSL_connect(sock->ssl);
313 socket_perror("SSL_connect", sock, ret);
322 socket_read( Socket_t *sock, char *buf, int len )
327 n = SSL_read(sock->ssl, buf, len);
330 n = xread( sock->fd, buf, len );
332 socket_perror( "read", sock, n );
340 socket_write( Socket_t *sock, const char *buf, int len )
345 n = SSL_write(sock->ssl, buf, len);
348 n = write_in_full( sock->fd, buf, len );
350 socket_perror( "write", sock, n );
357 static void socket_shutdown(Socket_t *sock)
361 SSL_shutdown(sock->ssl);
368 /* simple line buffering */
370 buffer_gets( buffer_t * b, char **s )
373 int start = b->offset;
378 /* make sure we have enough data to read the \r\n sequence */
379 if (b->offset + 1 >= b->bytes) {
381 /* shift down used bytes */
384 assert( start <= b->bytes );
385 n = b->bytes - start;
388 memmove(b->buf, b->buf + start, n);
394 n = socket_read( &b->sock, b->buf + b->bytes,
395 sizeof(b->buf) - b->bytes );
403 if (b->buf[b->offset] == '\r') {
404 assert( b->offset + 1 < b->bytes );
405 if (b->buf[b->offset + 1] == '\n') {
406 b->buf[b->offset] = 0; /* terminate the string */
407 b->offset += 2; /* next line */
420 imap_info( const char *msg, ... )
433 imap_warn( const char *msg, ... )
439 vfprintf( stderr, msg, va );
451 while (isspace( (unsigned char) **s ))
460 *s = strchr( *s, '"' );
463 while (**s && !isspace( (unsigned char) **s ))
476 free_generic_messages( message_t *msgs )
480 for (; msgs; msgs = tmsg) {
487 nfsnprintf( char *buf, int blen, const char *fmt, ... )
493 if (blen <= 0 || (unsigned)(ret = vsnprintf( buf, blen, fmt, va )) >= (unsigned)blen)
494 die( "Fatal: buffer too small. Please report a bug.\n");
500 unsigned char i, j, s[256];
507 unsigned char j, si, dat[128];
509 if ((fd = open( "/dev/urandom", O_RDONLY )) < 0 && (fd = open( "/dev/random", O_RDONLY )) < 0) {
510 fprintf( stderr, "Fatal: no random number source available.\n" );
513 if (read_in_full( fd, dat, 128 ) != 128) {
514 fprintf( stderr, "Fatal: cannot read random number source.\n" );
519 for (i = 0; i < 256; i++)
521 for (i = j = 0; i < 256; i++) {
523 j += si + dat[i & 127];
529 for (i = 0; i < 256; i++)
536 unsigned char si, sj;
544 return rs.s[(si + sj) & 0xff];
547 static struct imap_cmd *
548 v_issue_imap_cmd( imap_store_t *ctx, struct imap_cmd_cb *cb,
549 const char *fmt, va_list ap )
551 imap_t *imap = ctx->imap;
552 struct imap_cmd *cmd;
556 cmd = xmalloc( sizeof(struct imap_cmd) );
557 nfvasprintf( &cmd->cmd, fmt, ap );
558 cmd->tag = ++imap->nexttag;
563 memset( &cmd->cb, 0, sizeof(cmd->cb) );
565 while (imap->literal_pending)
566 get_cmd_result( ctx, NULL );
568 bufl = nfsnprintf( buf, sizeof(buf), cmd->cb.data ? CAP(LITERALPLUS) ?
569 "%d %s{%d+}\r\n" : "%d %s{%d}\r\n" : "%d %s\r\n",
570 cmd->tag, cmd->cmd, cmd->cb.dlen );
572 if (imap->num_in_progress)
573 printf( "(%d in progress) ", imap->num_in_progress );
574 if (memcmp( cmd->cmd, "LOGIN", 5 ))
575 printf( ">>> %s", buf );
577 printf( ">>> %d LOGIN <user> <pass>\n", cmd->tag );
579 if (socket_write( &imap->buf.sock, buf, bufl ) != bufl) {
587 if (CAP(LITERALPLUS)) {
588 n = socket_write( &imap->buf.sock, cmd->cb.data, cmd->cb.dlen );
589 free( cmd->cb.data );
590 if (n != cmd->cb.dlen ||
591 (n = socket_write( &imap->buf.sock, "\r\n", 2 )) != 2)
599 imap->literal_pending = 1;
600 } else if (cmd->cb.cont)
601 imap->literal_pending = 1;
603 *imap->in_progress_append = cmd;
604 imap->in_progress_append = &cmd->next;
605 imap->num_in_progress++;
609 static struct imap_cmd *
610 issue_imap_cmd( imap_store_t *ctx, struct imap_cmd_cb *cb, const char *fmt, ... )
612 struct imap_cmd *ret;
616 ret = v_issue_imap_cmd( ctx, cb, fmt, ap );
622 imap_exec( imap_store_t *ctx, struct imap_cmd_cb *cb, const char *fmt, ... )
625 struct imap_cmd *cmdp;
628 cmdp = v_issue_imap_cmd( ctx, cb, fmt, ap );
633 return get_cmd_result( ctx, cmdp );
637 imap_exec_m( imap_store_t *ctx, struct imap_cmd_cb *cb, const char *fmt, ... )
640 struct imap_cmd *cmdp;
643 cmdp = v_issue_imap_cmd( ctx, cb, fmt, ap );
646 return DRV_STORE_BAD;
648 switch (get_cmd_result( ctx, cmdp )) {
649 case RESP_BAD: return DRV_STORE_BAD;
650 case RESP_NO: return DRV_MSG_BAD;
651 default: return DRV_OK;
656 is_atom( list_t *list )
658 return list && list->val && list->val != NIL && list->val != LIST;
662 is_list( list_t *list )
664 return list && list->val == LIST;
668 free_list( list_t *list )
672 for (; list; list = tmp) {
675 free_list( list->child );
676 else if (is_atom( list ))
683 parse_imap_list_l( imap_t *imap, char **sp, list_t **curp, int level )
690 while (isspace( (unsigned char)*s ))
692 if (level && *s == ')') {
696 *curp = cur = xmalloc( sizeof(*cur) );
698 cur->val = NULL; /* for clean bail */
703 if (parse_imap_list_l( imap, &s, &cur->child, level + 1 ))
705 } else if (imap && *s == '{') {
707 bytes = cur->len = strtol( s + 1, &s, 10 );
711 s = cur->val = xmalloc( cur->len );
713 /* dump whats left over in the input buffer */
714 n = imap->buf.bytes - imap->buf.offset;
717 /* the entire message fit in the buffer */
720 memcpy( s, imap->buf.buf + imap->buf.offset, n );
724 /* mark that we used part of the buffer */
725 imap->buf.offset += n;
727 /* now read the rest of the message */
729 if ((n = socket_read (&imap->buf.sock, s, bytes)) <= 0)
735 if (buffer_gets( &imap->buf, &s ))
737 } else if (*s == '"') {
741 for (; *s != '"'; s++)
746 cur->val = xmemdupz(p, cur->len);
750 for (; *s && !isspace( (unsigned char)*s ); s++)
751 if (level && *s == ')')
754 if (cur->len == 3 && !memcmp ("NIL", p, 3)) {
757 cur->val = xmemdupz(p, cur->len);
776 parse_imap_list( imap_t *imap, char **sp )
780 if (!parse_imap_list_l( imap, sp, &head, 0 ))
787 parse_list( char **sp )
789 return parse_imap_list( NULL, sp );
793 parse_capability( imap_t *imap, char *cmd )
798 imap->caps = 0x80000000;
799 while ((arg = next_arg( &cmd )))
800 for (i = 0; i < ARRAY_SIZE(cap_list); i++)
801 if (!strcmp( cap_list[i], arg ))
802 imap->caps |= 1 << i;
803 imap->rcaps = imap->caps;
807 parse_response_code( imap_store_t *ctx, struct imap_cmd_cb *cb, char *s )
809 imap_t *imap = ctx->imap;
813 return RESP_OK; /* no response code */
815 if (!(p = strchr( s, ']' ))) {
816 fprintf( stderr, "IMAP error: malformed response code\n" );
820 arg = next_arg( &s );
821 if (!strcmp( "UIDVALIDITY", arg )) {
822 if (!(arg = next_arg( &s )) || !(ctx->gen.uidvalidity = atoi( arg ))) {
823 fprintf( stderr, "IMAP error: malformed UIDVALIDITY status\n" );
826 } else if (!strcmp( "UIDNEXT", arg )) {
827 if (!(arg = next_arg( &s )) || !(imap->uidnext = atoi( arg ))) {
828 fprintf( stderr, "IMAP error: malformed NEXTUID status\n" );
831 } else if (!strcmp( "CAPABILITY", arg )) {
832 parse_capability( imap, s );
833 } else if (!strcmp( "ALERT", arg )) {
834 /* RFC2060 says that these messages MUST be displayed
837 for (; isspace( (unsigned char)*p ); p++);
838 fprintf( stderr, "*** IMAP ALERT *** %s\n", p );
839 } else if (cb && cb->ctx && !strcmp( "APPENDUID", arg )) {
840 if (!(arg = next_arg( &s )) || !(ctx->gen.uidvalidity = atoi( arg )) ||
841 !(arg = next_arg( &s )) || !(*(int *)cb->ctx = atoi( arg )))
843 fprintf( stderr, "IMAP error: malformed APPENDUID status\n" );
851 get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
853 imap_t *imap = ctx->imap;
854 struct imap_cmd *cmdp, **pcmdp, *ncmdp;
855 char *cmd, *arg, *arg1, *p;
856 int n, resp, resp2, tag;
859 if (buffer_gets( &imap->buf, &cmd ))
862 arg = next_arg( &cmd );
864 arg = next_arg( &cmd );
866 fprintf( stderr, "IMAP error: unable to parse untagged response\n" );
870 if (!strcmp( "NAMESPACE", arg )) {
871 imap->ns_personal = parse_list( &cmd );
872 imap->ns_other = parse_list( &cmd );
873 imap->ns_shared = parse_list( &cmd );
874 } else if (!strcmp( "OK", arg ) || !strcmp( "BAD", arg ) ||
875 !strcmp( "NO", arg ) || !strcmp( "BYE", arg )) {
876 if ((resp = parse_response_code( ctx, NULL, cmd )) != RESP_OK)
878 } else if (!strcmp( "CAPABILITY", arg ))
879 parse_capability( imap, cmd );
880 else if ((arg1 = next_arg( &cmd ))) {
881 if (!strcmp( "EXISTS", arg1 ))
882 ctx->gen.count = atoi( arg );
883 else if (!strcmp( "RECENT", arg1 ))
884 ctx->gen.recent = atoi( arg );
886 fprintf( stderr, "IMAP error: unable to parse untagged response\n" );
889 } else if (!imap->in_progress) {
890 fprintf( stderr, "IMAP error: unexpected reply: %s %s\n", arg, cmd ? cmd : "" );
892 } else if (*arg == '+') {
893 /* This can happen only with the last command underway, as
894 it enforces a round-trip. */
895 cmdp = (struct imap_cmd *)((char *)imap->in_progress_append -
896 offsetof(struct imap_cmd, next));
898 n = socket_write( &imap->buf.sock, cmdp->cb.data, cmdp->cb.dlen );
899 free( cmdp->cb.data );
900 cmdp->cb.data = NULL;
901 if (n != (int)cmdp->cb.dlen)
903 } else if (cmdp->cb.cont) {
904 if (cmdp->cb.cont( ctx, cmdp, cmd ))
907 fprintf( stderr, "IMAP error: unexpected command continuation request\n" );
910 if (socket_write( &imap->buf.sock, "\r\n", 2 ) != 2)
913 imap->literal_pending = 0;
918 for (pcmdp = &imap->in_progress; (cmdp = *pcmdp); pcmdp = &cmdp->next)
919 if (cmdp->tag == tag)
921 fprintf( stderr, "IMAP error: unexpected tag %s\n", arg );
924 if (!(*pcmdp = cmdp->next))
925 imap->in_progress_append = pcmdp;
926 imap->num_in_progress--;
927 if (cmdp->cb.cont || cmdp->cb.data)
928 imap->literal_pending = 0;
929 arg = next_arg( &cmd );
930 if (!strcmp( "OK", arg ))
933 if (!strcmp( "NO", arg )) {
934 if (cmdp->cb.create && cmd && (cmdp->cb.trycreate || !memcmp( cmd, "[TRYCREATE]", 11 ))) { /* SELECT, APPEND or UID COPY */
935 p = strchr( cmdp->cmd, '"' );
936 if (!issue_imap_cmd( ctx, NULL, "CREATE \"%.*s\"", strchr( p + 1, '"' ) - p + 1, p )) {
940 /* not waiting here violates the spec, but a server that does not
941 grok this nonetheless violates it too. */
943 if (!(ncmdp = issue_imap_cmd( ctx, &cmdp->cb, "%s", cmdp->cmd ))) {
950 return 0; /* ignored */
956 } else /*if (!strcmp( "BAD", arg ))*/
958 fprintf( stderr, "IMAP command '%s' returned response (%s) - %s\n",
959 memcmp (cmdp->cmd, "LOGIN", 5) ?
960 cmdp->cmd : "LOGIN <user> <pass>",
961 arg, cmd ? cmd : "");
963 if ((resp2 = parse_response_code( ctx, &cmdp->cb, cmd )) > resp)
967 cmdp->cb.done( ctx, cmdp, resp );
968 free( cmdp->cb.data );
971 if (!tcmd || tcmd == cmdp)
979 imap_close_server( imap_store_t *ictx )
981 imap_t *imap = ictx->imap;
983 if (imap->buf.sock.fd != -1) {
984 imap_exec( ictx, NULL, "LOGOUT" );
985 socket_shutdown( &imap->buf.sock );
987 free_list( imap->ns_personal );
988 free_list( imap->ns_other );
989 free_list( imap->ns_shared );
994 imap_close_store( store_t *ctx )
996 imap_close_server( (imap_store_t *)ctx );
997 free_generic_messages( ctx->msgs );
1002 imap_open_store( imap_server_conf_t *srvc )
1008 struct sockaddr_in addr;
1009 int s, a[2], preauth;
1012 ctx = xcalloc( sizeof(*ctx), 1 );
1014 ctx->imap = imap = xcalloc( sizeof(*imap), 1 );
1015 imap->buf.sock.fd = -1;
1016 imap->in_progress_append = &imap->in_progress;
1018 /* open connection to IMAP server */
1021 imap_info( "Starting tunnel '%s'... ", srvc->tunnel );
1023 if (socketpair( PF_UNIX, SOCK_STREAM, 0, a )) {
1024 perror( "socketpair" );
1032 if (dup2( a[0], 0 ) == -1 || dup2( a[0], 1 ) == -1)
1036 execl( "/bin/sh", "sh", "-c", srvc->tunnel, NULL );
1042 imap->buf.sock.fd = a[1];
1044 imap_info( "ok\n" );
1046 memset( &addr, 0, sizeof(addr) );
1047 addr.sin_port = htons( srvc->port );
1048 addr.sin_family = AF_INET;
1050 imap_info( "Resolving %s... ", srvc->host );
1051 he = gethostbyname( srvc->host );
1053 perror( "gethostbyname" );
1056 imap_info( "ok\n" );
1058 addr.sin_addr.s_addr = *((int *) he->h_addr_list[0]);
1060 s = socket( PF_INET, SOCK_STREAM, 0 );
1062 imap_info( "Connecting to %s:%hu... ", inet_ntoa( addr.sin_addr ), ntohs( addr.sin_port ) );
1063 if (connect( s, (struct sockaddr *)&addr, sizeof(addr) )) {
1065 perror( "connect" );
1069 imap->buf.sock.fd = s;
1071 if (srvc->use_ssl &&
1072 ssl_socket_connect(&imap->buf.sock, 0, srvc->ssl_verify)) {
1076 imap_info( "ok\n" );
1079 /* read the greeting string */
1080 if (buffer_gets( &imap->buf, &rsp )) {
1081 fprintf( stderr, "IMAP error: no greeting response\n" );
1084 arg = next_arg( &rsp );
1085 if (!arg || *arg != '*' || (arg = next_arg( &rsp )) == NULL) {
1086 fprintf( stderr, "IMAP error: invalid greeting response\n" );
1090 if (!strcmp( "PREAUTH", arg ))
1092 else if (strcmp( "OK", arg ) != 0) {
1093 fprintf( stderr, "IMAP error: unknown greeting response\n" );
1096 parse_response_code( ctx, NULL, rsp );
1097 if (!imap->caps && imap_exec( ctx, NULL, "CAPABILITY" ) != RESP_OK)
1102 if (!srvc->use_ssl && CAP(STARTTLS)) {
1103 if (imap_exec(ctx, 0, "STARTTLS") != RESP_OK)
1105 if (ssl_socket_connect(&imap->buf.sock, 1,
1108 /* capabilities may have changed, so get the new capabilities */
1109 if (imap_exec(ctx, 0, "CAPABILITY") != RESP_OK)
1113 imap_info ("Logging in...\n");
1115 fprintf( stderr, "Skipping server %s, no user\n", srvc->host );
1120 sprintf( prompt, "Password (%s@%s): ", srvc->user, srvc->host );
1121 arg = getpass( prompt );
1123 perror( "getpass" );
1127 fprintf( stderr, "Skipping account %s@%s, no password\n", srvc->user, srvc->host );
1131 * getpass() returns a pointer to a static buffer. make a copy
1132 * for long term storage.
1134 srvc->pass = xstrdup( arg );
1137 fprintf( stderr, "Skipping account %s@%s, server forbids LOGIN\n", srvc->user, srvc->host );
1140 if (!imap->buf.sock.ssl)
1141 imap_warn( "*** IMAP Warning *** Password is being "
1142 "sent in the clear\n" );
1143 if (imap_exec( ctx, NULL, "LOGIN \"%s\" \"%s\"", srvc->user, srvc->pass ) != RESP_OK) {
1144 fprintf( stderr, "IMAP error: LOGIN failed\n" );
1151 return (store_t *)ctx;
1154 imap_close_store( &ctx->gen );
1159 imap_make_flags( int flags, char *buf )
1164 for (i = d = 0; i < ARRAY_SIZE(Flags); i++)
1165 if (flags & (1 << i)) {
1168 for (s = Flags[i]; *s; s++)
1179 imap_store_msg( store_t *gctx, msg_data_t *data, int *uid )
1181 imap_store_t *ctx = (imap_store_t *)gctx;
1182 imap_t *imap = ctx->imap;
1183 struct imap_cmd_cb cb;
1185 const char *prefix, *box;
1186 int ret, i, j, d, len, extra, nocr;
1187 int start, sbreak = 0, ebreak = 0;
1188 char flagstr[128], tuid[TUIDL * 2 + 1];
1190 memset( &cb, 0, sizeof(cb) );
1196 if (!CAP(UIDPLUS) && uid) {
1200 if (fmap[i++] == '\n') {
1202 if (i - 2 + nocr == start) {
1203 sbreak = ebreak = i - 2 + nocr;
1206 if (!memcmp( fmap + start, "X-TUID: ", 8 )) {
1207 extra -= (ebreak = i) - (sbreak = start) + nocr;
1212 /* invalid message */
1216 for (j = 0; j < TUIDL; j++)
1217 sprintf( tuid + j * 2, "%02x", arc4_getbyte() );
1218 extra += 8 + TUIDL * 2 + 2;
1221 for (; i < len; i++)
1222 if (fmap[i] == '\n')
1225 cb.dlen = len + extra;
1226 buf = cb.data = xmalloc( cb.dlen );
1228 if (!CAP(UIDPLUS) && uid) {
1230 for (; i < sbreak; i++)
1231 if (fmap[i] == '\n') {
1237 memcpy( buf, fmap, sbreak );
1240 memcpy( buf, "X-TUID: ", 8 );
1242 memcpy( buf, tuid, TUIDL * 2 );
1249 for (; i < len; i++)
1250 if (fmap[i] == '\n') {
1256 memcpy( buf, fmap + i, len - i );
1262 d = imap_make_flags( data->flags, flagstr );
1268 box = gctx->conf->trash;
1269 prefix = ctx->prefix;
1272 imap->caps = imap->rcaps & ~(1 << LITERALPLUS);
1275 prefix = !strcmp( box, "INBOX" ) ? "" : ctx->prefix;
1279 ret = imap_exec_m( ctx, &cb, "APPEND \"%s%s\" %s", prefix, box, flagstr );
1280 imap->caps = imap->rcaps;
1291 #define CHUNKSIZE 0x1000
1294 read_message( FILE *f, msg_data_t *msg )
1298 memset(msg, 0, sizeof(*msg));
1299 strbuf_init(&buf, 0);
1302 if (strbuf_fread(&buf, CHUNKSIZE, f) <= 0)
1307 msg->data = strbuf_detach(&buf, NULL);
1312 count_messages( msg_data_t *msg )
1315 char *p = msg->data;
1318 if (!prefixcmp(p, "From ")) {
1322 p = strstr( p+5, "\nFrom ");
1331 split_msg( msg_data_t *all_msgs, msg_data_t *msg, int *ofs )
1335 memset( msg, 0, sizeof *msg );
1336 if (*ofs >= all_msgs->len)
1339 data = &all_msgs->data[ *ofs ];
1340 msg->len = all_msgs->len - *ofs;
1342 if (msg->len < 5 || prefixcmp(data, "From "))
1345 p = strchr( data, '\n' );
1353 p = strstr( data, "\nFrom " );
1355 msg->len = &p[1] - data;
1357 msg->data = xmemdupz(data, msg->len);
1362 static imap_server_conf_t server =
1374 static char *imap_folder;
1377 git_imap_config(const char *key, const char *val, void *cb)
1379 char imap_key[] = "imap.";
1381 if (strncmp( key, imap_key, sizeof imap_key - 1 ))
1385 return config_error_nonbool(key);
1387 key += sizeof imap_key - 1;
1389 if (!strcmp( "folder", key )) {
1390 imap_folder = xstrdup( val );
1391 } else if (!strcmp( "host", key )) {
1392 if (!prefixcmp(val, "imap:"))
1394 else if (!prefixcmp(val, "imaps:")) {
1398 if (!prefixcmp(val, "//"))
1400 server.host = xstrdup( val );
1402 else if (!strcmp( "user", key ))
1403 server.user = xstrdup( val );
1404 else if (!strcmp( "pass", key ))
1405 server.pass = xstrdup( val );
1406 else if (!strcmp( "port", key ))
1407 server.port = git_config_int( key, val );
1408 else if (!strcmp( "tunnel", key ))
1409 server.tunnel = xstrdup( val );
1410 else if (!strcmp( "sslverify", key ))
1411 server.ssl_verify = git_config_bool( key, val );
1416 main(int argc, char **argv)
1418 msg_data_t all_msgs, msg;
1419 store_t *ctx = NULL;
1426 /* init the random number generator */
1429 setup_git_directory_gently(&nongit_ok);
1430 git_config(git_imap_config, NULL);
1433 server.port = server.use_ssl ? 993 : 143;
1436 fprintf( stderr, "no imap store specified\n" );
1440 if (!server.tunnel) {
1441 fprintf( stderr, "no imap host specified\n" );
1444 server.host = "tunnel";
1447 /* read the messages */
1448 if (!read_message( stdin, &all_msgs )) {
1449 fprintf(stderr,"nothing to send\n");
1453 total = count_messages( &all_msgs );
1455 fprintf(stderr,"no messages to send\n");
1459 /* write it to the imap server */
1460 ctx = imap_open_store( &server );
1462 fprintf( stderr,"failed to open store\n");
1466 fprintf( stderr, "sending %d message%s\n", total, (total!=1)?"s":"" );
1467 ctx->name = imap_folder;
1469 unsigned percent = n * 100 / total;
1470 fprintf( stderr, "%4u%% (%d/%d) done\r", percent, n, total );
1471 if (!split_msg( &all_msgs, &msg, &ofs ))
1473 r = imap_store_msg( ctx, &msg, &uid );
1474 if (r != DRV_OK) break;
1477 fprintf( stderr,"\n" );
1479 imap_close_store( ctx );