Mercurial > projects > sievemgr
view cmd/sievemgr/info.go @ 22:fc5e6970a0d5 default tip
Add support for specifying an authorization identity on the command line
author | Guido Berhoerster <guido+sievemgr@berhoerster.name> |
---|---|
date | Wed, 17 Feb 2021 07:50:55 +0100 |
parents | d14d93d011d7 |
children |
line wrap: on
line source
// Copyright (C) 2020 Guido Berhoerster <guido+sievemgr@berhoerster.name> // // Permission is hereby granted, free of charge, to any person obtaining // a copy of this software and associated documentation files (the // "Software"), to deal in the Software without restriction, including // without limitation the rights to use, copy, modify, merge, publish, // distribute, sublicense, and/or sell copies of the Software, and to // permit persons to whom the Software is furnished to do so, subject to // the following conditions: // // The above copyright notice and this permission notice shall be included // in all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. package main import ( "crypto/tls" "fmt" "net" "go.guido-berhoerster.org/managesieve" ) func init() { cmdInfo.Flag.StringVar(&acctName, "a", "", "Select the account") cmdInfo.Flag.StringVar(&authzID, "A", "", "Specify the authorization identity") } var cmdInfo = &command{ UsageLine: "info [options]", Run: runInfo, } func runInfo(cmd *command, args []string) error { if len(args) != 0 { return usageError("invalid number of arguments") } acct, err := getAccount(&conf, acctName) if err != nil { return err } if err := lookupHostPort(acct); err != nil { return err } if err := readPassword(acct); err != nil { return err } // dialPlainAuth() is not used here so that SASL mechanisms can be // determined before authentication c, err := managesieve.Dial(net.JoinHostPort(acct.Host, acct.Port)) if err != nil { return fmt.Errorf("failed to connect: %s", err) } // switch to a TLS connection except for localhost if acct.Host != "localhost" && acct.Host != "127.0.0.1" && acct.Host != "::1" { tlsConf := &tls.Config{ ServerName: acct.Host, InsecureSkipVerify: acct.Insecure, } if err := c.StartTLS(tlsConf); err != nil { return fmt.Errorf("failed to start TLS connection: %s", err) } } saslMechs := c.SASLMechanisms() auth := managesieve.PlainAuth(authzID, acct.User, acct.Password, acct.Host) if err := c.Authenticate(auth); err != nil { return fmt.Errorf("failed to authenticate user %s: %s", acct.User, err) } defer c.Logout() fmt.Printf("%s (%s)\n", net.JoinHostPort(acct.Host, acct.Port), c.Implementation()) if c.SupportsRFC5804() { fmt.Println("RFC5804 supported") } if c.SupportsTLS() { fmt.Println("STARTTLS supported") } fmt.Printf("SASL mechanisms:\n") for _, m := range saslMechs { fmt.Printf(" %s\n", m) } fmt.Printf("Extensions:\n") for _, e := range c.Extensions() { fmt.Printf(" %s\n", e) } fmt.Printf("Notification methods:\n") for _, m := range c.NotifyMethods() { fmt.Printf(" %s\n", m) } return nil }