| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| |
|
| | mod auto_mozilla; |
| | mod auto_outlook; |
| | mod server_params; |
| |
|
| | use anyhow::{bail, ensure, Context as _, Result}; |
| | use auto_mozilla::moz_autoconfigure; |
| | use auto_outlook::outlk_autodiscover; |
| | use deltachat_contact_tools::EmailAddress; |
| | use futures::FutureExt; |
| | use futures_lite::FutureExt as _; |
| | use percent_encoding::{utf8_percent_encode, NON_ALPHANUMERIC}; |
| | use server_params::{expand_param_vector, ServerParams}; |
| | use tokio::task; |
| |
|
| | use crate::config::{self, Config}; |
| | use crate::context::Context; |
| | use crate::imap::{session::Session as ImapSession, Imap}; |
| | use crate::log::LogExt; |
| | use crate::login_param::{CertificateChecks, LoginParam, ServerLoginParam}; |
| | use crate::message::{Message, Viewtype}; |
| | use crate::oauth2::get_oauth2_addr; |
| | use crate::provider::{Protocol, Socket, UsernamePattern}; |
| | use crate::smtp::Smtp; |
| | use crate::socks::Socks5Config; |
| | use crate::stock_str; |
| | use crate::sync::Sync::*; |
| | use crate::tools::time; |
| | use crate::{chat, e2ee, provider}; |
| | use deltachat_contact_tools::addr_cmp; |
| |
|
| | macro_rules! progress { |
| | ($context:tt, $progress:expr, $comment:expr) => { |
| | assert!( |
| | $progress <= 1000, |
| | "value in range 0..1000 expected with: 0=error, 1..999=progress, 1000=success" |
| | ); |
| | $context.emit_event($crate::events::EventType::ConfigureProgress { |
| | progress: $progress, |
| | comment: $comment, |
| | }); |
| | }; |
| | ($context:tt, $progress:expr) => { |
| | progress!($context, $progress, None); |
| | }; |
| | } |
| |
|
| | impl Context { |
| | |
| | pub async fn is_configured(&self) -> Result<bool> { |
| | self.sql |
| | .get_raw_config_bool("configured") |
| | .await |
| | .map_err(Into::into) |
| | } |
| |
|
| | |
| | pub async fn configure(&self) -> Result<()> { |
| | ensure!( |
| | !self.scheduler.is_running().await, |
| | "cannot configure, already running" |
| | ); |
| | ensure!( |
| | self.sql.is_open().await, |
| | "cannot configure, database not opened." |
| | ); |
| | let cancel_channel = self.alloc_ongoing().await?; |
| |
|
| | let res = self |
| | .inner_configure() |
| | .race(cancel_channel.recv().map(|_| { |
| | progress!(self, 0); |
| | Ok(()) |
| | })) |
| | .await; |
| |
|
| | self.free_ongoing().await; |
| |
|
| | if let Err(err) = res.as_ref() { |
| | progress!( |
| | self, |
| | 0, |
| | Some( |
| | stock_str::configuration_failed( |
| | self, |
| | |
| | |
| | &format!("{err:#}"), |
| | ) |
| | .await |
| | ) |
| | ); |
| | } else { |
| | progress!(self, 1000); |
| | } |
| |
|
| | res |
| | } |
| |
|
| | async fn inner_configure(&self) -> Result<()> { |
| | info!(self, "Configure ..."); |
| |
|
| | let mut param = LoginParam::load_candidate_params(self).await?; |
| | let old_addr = self.get_config(Config::ConfiguredAddr).await?; |
| |
|
| | |
| | |
| | self.set_config_internal(Config::IsChatmail, None).await?; |
| |
|
| | let success = configure(self, &mut param).await; |
| | self.set_config_internal(Config::NotifyAboutWrongPw, None) |
| | .await?; |
| |
|
| | on_configure_completed(self, param, old_addr).await?; |
| |
|
| | success?; |
| | self.set_config_internal(Config::NotifyAboutWrongPw, Some("1")) |
| | .await?; |
| | Ok(()) |
| | } |
| | } |
| |
|
| | async fn on_configure_completed( |
| | context: &Context, |
| | param: LoginParam, |
| | old_addr: Option<String>, |
| | ) -> Result<()> { |
| | if let Some(provider) = param.provider { |
| | if let Some(config_defaults) = provider.config_defaults { |
| | for def in config_defaults { |
| | if !context.config_exists(def.key).await? { |
| | info!(context, "apply config_defaults {}={}", def.key, def.value); |
| | context |
| | .set_config_ex(Nosync, def.key, Some(def.value)) |
| | .await?; |
| | } else { |
| | info!( |
| | context, |
| | "skip already set config_defaults {}={}", def.key, def.value |
| | ); |
| | } |
| | } |
| | } |
| |
|
| | if !provider.after_login_hint.is_empty() { |
| | let mut msg = Message::new(Viewtype::Text); |
| | msg.text = provider.after_login_hint.to_string(); |
| | if chat::add_device_msg(context, Some("core-provider-info"), Some(&mut msg)) |
| | .await |
| | .is_err() |
| | { |
| | warn!(context, "cannot add after_login_hint as core-provider-info"); |
| | } |
| | } |
| | } |
| |
|
| | if let Some(new_addr) = context.get_config(Config::ConfiguredAddr).await? { |
| | if let Some(old_addr) = old_addr { |
| | if !addr_cmp(&new_addr, &old_addr) { |
| | let mut msg = Message::new(Viewtype::Text); |
| | msg.text = |
| | stock_str::aeap_explanation_and_link(context, &old_addr, &new_addr).await; |
| | chat::add_device_msg(context, None, Some(&mut msg)) |
| | .await |
| | .context("Cannot add AEAP explanation") |
| | .log_err(context) |
| | .ok(); |
| | } |
| | } |
| | } |
| |
|
| | Ok(()) |
| | } |
| |
|
| | async fn configure(ctx: &Context, param: &mut LoginParam) -> Result<()> { |
| | progress!(ctx, 1); |
| |
|
| | let socks5_config = param.socks5_config.clone(); |
| | let socks5_enabled = socks5_config.is_some(); |
| |
|
| | let ctx2 = ctx.clone(); |
| | let update_device_chats_handle = task::spawn(async move { ctx2.update_device_chats().await }); |
| |
|
| | |
| |
|
| | |
| | |
| | |
| | if param.imap.oauth2 && !socks5_enabled { |
| | |
| | |
| | progress!(ctx, 10); |
| | if let Some(oauth2_addr) = get_oauth2_addr(ctx, ¶m.addr, ¶m.imap.password) |
| | .await? |
| | .and_then(|e| e.parse().ok()) |
| | { |
| | info!(ctx, "Authorized address is {}", oauth2_addr); |
| | param.addr = oauth2_addr; |
| | ctx.sql |
| | .set_raw_config("addr", Some(param.addr.as_str())) |
| | .await?; |
| | } |
| | progress!(ctx, 20); |
| | } |
| | |
| |
|
| | let parsed = EmailAddress::new(¶m.addr).context("Bad email-address")?; |
| | let param_domain = parsed.domain; |
| | let param_addr_urlencoded = utf8_percent_encode(¶m.addr, NON_ALPHANUMERIC).to_string(); |
| |
|
| | |
| | progress!(ctx, 200); |
| |
|
| | let param_autoconfig; |
| | if param.imap.server.is_empty() |
| | && param.imap.port == 0 |
| | && param.imap.security == Socket::Automatic |
| | && param.imap.user.is_empty() |
| | && param.smtp.server.is_empty() |
| | && param.smtp.port == 0 |
| | && param.smtp.security == Socket::Automatic |
| | && param.smtp.user.is_empty() |
| | { |
| | |
| |
|
| | info!( |
| | ctx, |
| | "checking internal provider-info for offline autoconfig" |
| | ); |
| |
|
| | if let Some(provider) = |
| | provider::get_provider_info(ctx, ¶m_domain, socks5_enabled).await |
| | { |
| | param.provider = Some(provider); |
| | match provider.status { |
| | provider::Status::Ok | provider::Status::Preparation => { |
| | if provider.server.is_empty() { |
| | info!(ctx, "offline autoconfig found, but no servers defined"); |
| | param_autoconfig = None; |
| | } else { |
| | info!(ctx, "offline autoconfig found"); |
| | let servers = provider |
| | .server |
| | .iter() |
| | .map(|s| ServerParams { |
| | protocol: s.protocol, |
| | socket: s.socket, |
| | hostname: s.hostname.to_string(), |
| | port: s.port, |
| | username: match s.username_pattern { |
| | UsernamePattern::Email => param.addr.to_string(), |
| | UsernamePattern::Emaillocalpart => { |
| | if let Some(at) = param.addr.find('@') { |
| | param.addr.split_at(at).0.to_string() |
| | } else { |
| | param.addr.to_string() |
| | } |
| | } |
| | }, |
| | strict_tls: Some(provider.opt.strict_tls), |
| | }) |
| | .collect(); |
| |
|
| | param_autoconfig = Some(servers) |
| | } |
| | } |
| | provider::Status::Broken => { |
| | info!(ctx, "offline autoconfig found, provider is broken"); |
| | param_autoconfig = None; |
| | } |
| | } |
| | } else { |
| | |
| | info!(ctx, "no offline autoconfig found"); |
| | param_autoconfig = if socks5_enabled { |
| | |
| | |
| | info!(ctx, "socks5 enabled, skipping autoconfig"); |
| | None |
| | } else { |
| | get_autoconfig(ctx, param, ¶m_domain, ¶m_addr_urlencoded).await |
| | } |
| | } |
| | } else { |
| | param_autoconfig = None; |
| | } |
| |
|
| | progress!(ctx, 500); |
| |
|
| | let mut servers = param_autoconfig.unwrap_or_default(); |
| | if !servers |
| | .iter() |
| | .any(|server| server.protocol == Protocol::Imap) |
| | { |
| | servers.push(ServerParams { |
| | protocol: Protocol::Imap, |
| | hostname: param.imap.server.clone(), |
| | port: param.imap.port, |
| | socket: param.imap.security, |
| | username: param.imap.user.clone(), |
| | strict_tls: None, |
| | }) |
| | } |
| | if !servers |
| | .iter() |
| | .any(|server| server.protocol == Protocol::Smtp) |
| | { |
| | servers.push(ServerParams { |
| | protocol: Protocol::Smtp, |
| | hostname: param.smtp.server.clone(), |
| | port: param.smtp.port, |
| | socket: param.smtp.security, |
| | username: param.smtp.user.clone(), |
| | strict_tls: None, |
| | }) |
| | } |
| |
|
| | |
| | for server in &mut servers { |
| | let certificate_checks = match server.protocol { |
| | Protocol::Imap => param.imap.certificate_checks, |
| | Protocol::Smtp => param.smtp.certificate_checks, |
| | }; |
| | server.strict_tls = match certificate_checks { |
| | CertificateChecks::AcceptInvalidCertificates |
| | | CertificateChecks::AcceptInvalidCertificates2 => Some(false), |
| | CertificateChecks::Strict => Some(true), |
| | CertificateChecks::Automatic => server.strict_tls, |
| | }; |
| | } |
| |
|
| | let servers = expand_param_vector(servers, ¶m.addr, ¶m_domain); |
| |
|
| | progress!(ctx, 550); |
| |
|
| | |
| | let mut smtp = Smtp::new(); |
| |
|
| | let context_smtp = ctx.clone(); |
| | let mut smtp_param = param.smtp.clone(); |
| | let smtp_addr = param.addr.clone(); |
| | let smtp_servers: Vec<ServerParams> = servers |
| | .iter() |
| | .filter(|params| params.protocol == Protocol::Smtp) |
| | .cloned() |
| | .collect(); |
| | let provider_strict_tls = param |
| | .provider |
| | .map_or(socks5_config.is_some(), |provider| provider.opt.strict_tls); |
| |
|
| | let smtp_config_task = task::spawn(async move { |
| | let mut smtp_configured = false; |
| | let mut errors = Vec::new(); |
| | for smtp_server in smtp_servers { |
| | smtp_param.user.clone_from(&smtp_server.username); |
| | smtp_param.server.clone_from(&smtp_server.hostname); |
| | smtp_param.port = smtp_server.port; |
| | smtp_param.security = smtp_server.socket; |
| | smtp_param.certificate_checks = match smtp_server.strict_tls { |
| | Some(true) => CertificateChecks::Strict, |
| | Some(false) => CertificateChecks::AcceptInvalidCertificates, |
| | None => CertificateChecks::Automatic, |
| | }; |
| |
|
| | match try_smtp_one_param( |
| | &context_smtp, |
| | &smtp_param, |
| | &socks5_config, |
| | &smtp_addr, |
| | provider_strict_tls, |
| | &mut smtp, |
| | ) |
| | .await |
| | { |
| | Ok(_) => { |
| | smtp_configured = true; |
| | break; |
| | } |
| | Err(e) => errors.push(e), |
| | } |
| | } |
| |
|
| | if smtp_configured { |
| | Ok(smtp_param) |
| | } else { |
| | Err(errors) |
| | } |
| | }); |
| |
|
| | progress!(ctx, 600); |
| |
|
| | |
| |
|
| | let mut imap: Option<(Imap, ImapSession)> = None; |
| | let imap_servers: Vec<&ServerParams> = servers |
| | .iter() |
| | .filter(|params| params.protocol == Protocol::Imap) |
| | .collect(); |
| | let imap_servers_count = imap_servers.len(); |
| | let mut errors = Vec::new(); |
| | for (imap_server_index, imap_server) in imap_servers.into_iter().enumerate() { |
| | param.imap.user.clone_from(&imap_server.username); |
| | param.imap.server.clone_from(&imap_server.hostname); |
| | param.imap.port = imap_server.port; |
| | param.imap.security = imap_server.socket; |
| | param.imap.certificate_checks = match imap_server.strict_tls { |
| | Some(true) => CertificateChecks::Strict, |
| | Some(false) => CertificateChecks::AcceptInvalidCertificates, |
| | None => CertificateChecks::Automatic, |
| | }; |
| |
|
| | match try_imap_one_param( |
| | ctx, |
| | ¶m.imap, |
| | ¶m.socks5_config, |
| | ¶m.addr, |
| | provider_strict_tls, |
| | ) |
| | .await |
| | { |
| | Ok(configured_imap) => { |
| | imap = Some(configured_imap); |
| | break; |
| | } |
| | Err(e) => errors.push(e), |
| | } |
| | progress!( |
| | ctx, |
| | 600 + (800 - 600) * (1 + imap_server_index) / imap_servers_count |
| | ); |
| | } |
| | let (mut imap, mut imap_session) = match imap { |
| | Some(imap) => imap, |
| | None => bail!(nicer_configuration_error(ctx, errors).await), |
| | }; |
| |
|
| | progress!(ctx, 850); |
| |
|
| | |
| | match smtp_config_task.await.unwrap() { |
| | Ok(smtp_param) => { |
| | param.smtp = smtp_param; |
| | } |
| | Err(errors) => { |
| | bail!(nicer_configuration_error(ctx, errors).await); |
| | } |
| | } |
| |
|
| | progress!(ctx, 900); |
| |
|
| | if imap_session.is_chatmail() { |
| | ctx.set_config(Config::SentboxWatch, None).await?; |
| | ctx.set_config(Config::MvboxMove, Some("0")).await?; |
| | ctx.set_config(Config::OnlyFetchMvbox, None).await?; |
| | ctx.set_config(Config::ShowEmails, None).await?; |
| | ctx.set_config(Config::E2eeEnabled, Some("1")).await?; |
| | } |
| |
|
| | let create_mvbox = ctx.should_watch_mvbox().await?; |
| |
|
| | imap.configure_folders(ctx, &mut imap_session, create_mvbox) |
| | .await?; |
| |
|
| | imap_session |
| | .select_with_uidvalidity(ctx, "INBOX") |
| | .await |
| | .context("could not read INBOX status")?; |
| |
|
| | drop(imap); |
| |
|
| | progress!(ctx, 910); |
| |
|
| | if let Some(configured_addr) = ctx.get_config(Config::ConfiguredAddr).await? { |
| | if configured_addr != param.addr { |
| | |
| | info!(ctx, "Scheduling resync because the address has changed."); |
| | ctx.schedule_resync().await?; |
| | } |
| | } |
| |
|
| | |
| | param.save_as_configured_params(ctx).await?; |
| | ctx.set_config_internal(Config::ConfiguredTimestamp, Some(&time().to_string())) |
| | .await?; |
| |
|
| | progress!(ctx, 920); |
| |
|
| | e2ee::ensure_secret_key_exists(ctx).await?; |
| | info!(ctx, "key generation completed"); |
| |
|
| | ctx.set_config_internal(Config::FetchedExistingMsgs, config::from_bool(false)) |
| | .await?; |
| | ctx.scheduler.interrupt_inbox().await; |
| |
|
| | progress!(ctx, 940); |
| | update_device_chats_handle.await??; |
| |
|
| | ctx.sql.set_raw_config_bool("configured", true).await?; |
| |
|
| | Ok(()) |
| | } |
| |
|
| | |
| | |
| | |
| | |
| | async fn get_autoconfig( |
| | ctx: &Context, |
| | param: &LoginParam, |
| | param_domain: &str, |
| | param_addr_urlencoded: &str, |
| | ) -> Option<Vec<ServerParams>> { |
| | if let Ok(res) = moz_autoconfigure( |
| | ctx, |
| | &format!( |
| | "https://autoconfig.{param_domain}/mail/config-v1.1.xml?emailaddress={param_addr_urlencoded}" |
| | ), |
| | param, |
| | ) |
| | .await |
| | { |
| | return Some(res); |
| | } |
| | progress!(ctx, 300); |
| |
|
| | if let Ok(res) = moz_autoconfigure( |
| | ctx, |
| | |
| | &format!( |
| | "https://{}/.well-known/autoconfig/mail/config-v1.1.xml?emailaddress={}", |
| | ¶m_domain, ¶m_addr_urlencoded |
| | ), |
| | param, |
| | ) |
| | .await |
| | { |
| | return Some(res); |
| | } |
| | progress!(ctx, 310); |
| |
|
| | |
| | if let Ok(res) = outlk_autodiscover( |
| | ctx, |
| | format!("https://{}/autodiscover/autodiscover.xml", ¶m_domain), |
| | ) |
| | .await |
| | { |
| | return Some(res); |
| | } |
| | progress!(ctx, 320); |
| |
|
| | if let Ok(res) = outlk_autodiscover( |
| | ctx, |
| | format!( |
| | "https://autodiscover.{}/autodiscover/autodiscover.xml", |
| | ¶m_domain |
| | ), |
| | ) |
| | .await |
| | { |
| | return Some(res); |
| | } |
| | progress!(ctx, 330); |
| |
|
| | |
| | if let Ok(res) = moz_autoconfigure( |
| | ctx, |
| | &format!("https://autoconfig.thunderbird.net/v1.1/{}", ¶m_domain), |
| | param, |
| | ) |
| | .await |
| | { |
| | return Some(res); |
| | } |
| |
|
| | None |
| | } |
| |
|
| | async fn try_imap_one_param( |
| | context: &Context, |
| | param: &ServerLoginParam, |
| | socks5_config: &Option<Socks5Config>, |
| | addr: &str, |
| | provider_strict_tls: bool, |
| | ) -> Result<(Imap, ImapSession), ConfigurationError> { |
| | let inf = format!( |
| | "imap: {}@{}:{} security={} certificate_checks={} oauth2={} socks5_config={}", |
| | param.user, |
| | param.server, |
| | param.port, |
| | param.security, |
| | param.certificate_checks, |
| | param.oauth2, |
| | if let Some(socks5_config) = socks5_config { |
| | socks5_config.to_string() |
| | } else { |
| | "None".to_string() |
| | } |
| | ); |
| | info!(context, "Trying: {}", inf); |
| |
|
| | let (_s, r) = async_channel::bounded(1); |
| |
|
| | let mut imap = match Imap::new(param, socks5_config.clone(), addr, provider_strict_tls, r) { |
| | Err(err) => { |
| | info!(context, "failure: {:#}", err); |
| | return Err(ConfigurationError { |
| | config: inf, |
| | msg: format!("{err:#}"), |
| | }); |
| | } |
| | Ok(imap) => imap, |
| | }; |
| |
|
| | match imap.connect(context).await { |
| | Err(err) => { |
| | info!(context, "failure: {:#}", err); |
| | Err(ConfigurationError { |
| | config: inf, |
| | msg: format!("{err:#}"), |
| | }) |
| | } |
| | Ok(session) => { |
| | info!(context, "success: {}", inf); |
| | Ok((imap, session)) |
| | } |
| | } |
| | } |
| |
|
| | async fn try_smtp_one_param( |
| | context: &Context, |
| | param: &ServerLoginParam, |
| | socks5_config: &Option<Socks5Config>, |
| | addr: &str, |
| | provider_strict_tls: bool, |
| | smtp: &mut Smtp, |
| | ) -> Result<(), ConfigurationError> { |
| | let inf = format!( |
| | "smtp: {}@{}:{} security={} certificate_checks={} oauth2={} socks5_config={}", |
| | param.user, |
| | param.server, |
| | param.port, |
| | param.security, |
| | param.certificate_checks, |
| | param.oauth2, |
| | if let Some(socks5_config) = socks5_config { |
| | socks5_config.to_string() |
| | } else { |
| | "None".to_string() |
| | } |
| | ); |
| | info!(context, "Trying: {}", inf); |
| |
|
| | if let Err(err) = smtp |
| | .connect(context, param, socks5_config, addr, provider_strict_tls) |
| | .await |
| | { |
| | info!(context, "failure: {}", err); |
| | Err(ConfigurationError { |
| | config: inf, |
| | msg: format!("{err:#}"), |
| | }) |
| | } else { |
| | info!(context, "success: {}", inf); |
| | smtp.disconnect(); |
| | Ok(()) |
| | } |
| | } |
| |
|
| | |
| | #[derive(Debug, thiserror::Error)] |
| | #[error("Trying {config}…\nError: {msg}")] |
| | pub struct ConfigurationError { |
| | |
| | config: String, |
| |
|
| | |
| | msg: String, |
| | } |
| |
|
| | async fn nicer_configuration_error(context: &Context, errors: Vec<ConfigurationError>) -> String { |
| | let first_err = if let Some(f) = errors.first() { |
| | f |
| | } else { |
| | |
| | |
| | return "no error".to_string(); |
| | }; |
| |
|
| | if errors.iter().all(|e| { |
| | e.msg.to_lowercase().contains("could not resolve") |
| | || e.msg.to_lowercase().contains("no dns resolution results") |
| | || e.msg |
| | .to_lowercase() |
| | .contains("temporary failure in name resolution") |
| | || e.msg.to_lowercase().contains("name or service not known") |
| | || e.msg |
| | .to_lowercase() |
| | .contains("failed to lookup address information") |
| | }) { |
| | return stock_str::error_no_network(context).await; |
| | } |
| |
|
| | if errors.iter().all(|e| e.msg == first_err.msg) { |
| | return first_err.msg.to_string(); |
| | } |
| |
|
| | errors |
| | .iter() |
| | .map(|e| e.to_string()) |
| | .collect::<Vec<String>>() |
| | .join("\n\n") |
| | } |
| |
|
| | #[derive(Debug, thiserror::Error)] |
| | pub enum Error { |
| | #[error("Invalid email address: {0:?}")] |
| | InvalidEmailAddress(String), |
| |
|
| | #[error("XML error at position {position}: {error}")] |
| | InvalidXml { |
| | position: usize, |
| | #[source] |
| | error: quick_xml::Error, |
| | }, |
| |
|
| | #[error("Number of redirection is exceeded")] |
| | Redirection, |
| |
|
| | #[error("{0:#}")] |
| | Other(#[from] anyhow::Error), |
| | } |
| |
|
| | #[cfg(test)] |
| | mod tests { |
| | #![allow(clippy::indexing_slicing)] |
| |
|
| | use crate::config::Config; |
| | use crate::test_utils::TestContext; |
| |
|
| | #[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
| | async fn test_no_panic_on_bad_credentials() { |
| | let t = TestContext::new().await; |
| | t.set_config(Config::Addr, Some("probably@unexistant.addr")) |
| | .await |
| | .unwrap(); |
| | t.set_config(Config::MailPw, Some("123456")).await.unwrap(); |
| | assert!(t.configure().await.is_err()); |
| | } |
| | } |
| |
|