view cmd/sievemgr/info.go @ 22:fc5e6970a0d5 default tip

Add support for specifying an authorization identity on the command line
author Guido Berhoerster <guido+sievemgr@berhoerster.name>
date Wed, 17 Feb 2021 07:50:55 +0100
parents d14d93d011d7
children
line wrap: on
line source

// Copyright (C) 2020 Guido Berhoerster <guido+sievemgr@berhoerster.name>
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to
// permit persons to whom the Software is furnished to do so, subject to
// the following conditions:
//
// The above copyright notice and this permission notice shall be included
// in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

package main

import (
	"crypto/tls"
	"fmt"
	"net"

	"go.guido-berhoerster.org/managesieve"
)

func init() {
	cmdInfo.Flag.StringVar(&acctName, "a", "", "Select the account")
	cmdInfo.Flag.StringVar(&authzID, "A", "", "Specify the authorization identity")
}

var cmdInfo = &command{
	UsageLine: "info [options]",
	Run:       runInfo,
}

func runInfo(cmd *command, args []string) error {
	if len(args) != 0 {
		return usageError("invalid number of arguments")
	}

	acct, err := getAccount(&conf, acctName)
	if err != nil {
		return err
	}

	if err := lookupHostPort(acct); err != nil {
		return err
	}

	if err := readPassword(acct); err != nil {
		return err
	}

	// dialPlainAuth() is not used here so that SASL mechanisms can be
	// determined before authentication
	c, err := managesieve.Dial(net.JoinHostPort(acct.Host, acct.Port))
	if err != nil {
		return fmt.Errorf("failed to connect: %s", err)
	}

	// switch to a TLS connection except for localhost
	if acct.Host != "localhost" && acct.Host != "127.0.0.1" &&
		acct.Host != "::1" {
		tlsConf := &tls.Config{
			ServerName:         acct.Host,
			InsecureSkipVerify: acct.Insecure,
		}
		if err := c.StartTLS(tlsConf); err != nil {
			return fmt.Errorf("failed to start TLS connection: %s",
				err)
		}
	}
	saslMechs := c.SASLMechanisms()

	auth := managesieve.PlainAuth(authzID, acct.User, acct.Password, acct.Host)
	if err := c.Authenticate(auth); err != nil {
		return fmt.Errorf("failed to authenticate user %s: %s",
			acct.User, err)
	}
	defer c.Logout()

	fmt.Printf("%s (%s)\n", net.JoinHostPort(acct.Host, acct.Port),
		c.Implementation())
	if c.SupportsRFC5804() {
		fmt.Println("RFC5804 supported")
	}
	if c.SupportsTLS() {
		fmt.Println("STARTTLS supported")
	}
	fmt.Printf("SASL mechanisms:\n")
	for _, m := range saslMechs {
		fmt.Printf("  %s\n", m)
	}
	fmt.Printf("Extensions:\n")
	for _, e := range c.Extensions() {
		fmt.Printf("  %s\n", e)
	}
	fmt.Printf("Notification methods:\n")
	for _, m := range c.NotifyMethods() {
		fmt.Printf("  %s\n", m)
	}

	return nil
}