eventmachine 0.12.10-x86-mswin32-60 → 1.0.0.beta.2-x86-mswin32-60
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +2 -0
- data/Gemfile +1 -0
- data/README +80 -81
- data/Rakefile +7 -370
- data/docs/COPYING +60 -60
- data/docs/ChangeLog +211 -211
- data/docs/DEFERRABLES +246 -133
- data/docs/EPOLL +141 -141
- data/docs/GNU +281 -281
- data/docs/INSTALL +13 -13
- data/docs/KEYBOARD +42 -38
- data/docs/LEGAL +25 -25
- data/docs/LIGHTWEIGHT_CONCURRENCY +130 -70
- data/docs/PURE_RUBY +75 -75
- data/docs/RELEASE_NOTES +94 -94
- data/docs/SMTP +4 -2
- data/docs/SPAWNED_PROCESSES +148 -89
- data/docs/TODO +8 -8
- data/eventmachine.gemspec +19 -26
- data/examples/ex_channel.rb +42 -42
- data/examples/ex_queue.rb +2 -2
- data/examples/ex_tick_loop_array.rb +15 -0
- data/examples/ex_tick_loop_counter.rb +32 -0
- data/examples/helper.rb +1 -1
- data/ext/binder.cpp +0 -1
- data/ext/cmain.cpp +36 -25
- data/ext/ed.cpp +104 -113
- data/ext/ed.h +24 -30
- data/ext/em.cpp +349 -283
- data/ext/em.h +25 -29
- data/ext/eventmachine.h +5 -4
- data/ext/extconf.rb +58 -49
- data/ext/fastfilereader/extconf.rb +5 -3
- data/ext/fastfilereader/mapper.cpp +214 -214
- data/ext/fastfilereader/mapper.h +59 -59
- data/ext/fastfilereader/rubymain.cpp +127 -127
- data/ext/kb.cpp +1 -3
- data/ext/page.cpp +107 -107
- data/ext/page.h +51 -51
- data/ext/pipe.cpp +9 -11
- data/ext/project.h +12 -8
- data/ext/rubymain.cpp +138 -104
- data/java/.classpath +8 -8
- data/java/.project +17 -17
- data/java/src/com/rubyeventmachine/EmReactor.java +1 -0
- data/java/src/com/rubyeventmachine/EmReactorException.java +40 -40
- data/lib/em/buftok.rb +138 -138
- data/lib/em/callback.rb +25 -25
- data/lib/em/channel.rb +1 -1
- data/lib/em/connection.rb +6 -1
- data/lib/em/deferrable.rb +16 -2
- data/lib/em/file_watch.rb +53 -53
- data/lib/em/future.rb +61 -61
- data/lib/em/iterator.rb +270 -0
- data/lib/em/messages.rb +66 -66
- data/lib/em/process_watch.rb +43 -43
- data/lib/em/protocols.rb +1 -1
- data/lib/em/protocols/header_and_content.rb +138 -138
- data/lib/em/protocols/httpclient.rb +267 -262
- data/lib/em/protocols/line_protocol.rb +28 -0
- data/lib/em/protocols/memcache.rb +322 -322
- data/lib/em/protocols/postgres3.rb +247 -247
- data/lib/em/protocols/saslauth.rb +175 -175
- data/lib/em/protocols/smtpserver.rb +640 -547
- data/lib/em/protocols/stomp.rb +200 -200
- data/lib/em/protocols/tcptest.rb +52 -52
- data/lib/{pr_eventmachine.rb → em/pure_ruby.rb} +1013 -1022
- data/lib/em/queue.rb +1 -0
- data/lib/em/spawnable.rb +85 -85
- data/lib/em/streamer.rb +130 -130
- data/lib/em/tick_loop.rb +85 -0
- data/lib/em/timers.rb +2 -1
- data/lib/em/version.rb +1 -1
- data/lib/eventmachine.rb +40 -84
- data/lib/jeventmachine.rb +2 -1
- data/lib/rubyeventmachine.rb +2 -0
- data/setup.rb +1585 -1585
- data/tasks/doc.rake +30 -0
- data/tasks/package.rake +85 -0
- data/tasks/test.rake +6 -0
- data/tests/client.crt +31 -31
- data/tests/client.key +51 -51
- data/tests/test_attach.rb +13 -3
- data/tests/test_basic.rb +60 -95
- data/tests/test_channel.rb +3 -2
- data/tests/test_defer.rb +49 -47
- data/tests/test_deferrable.rb +35 -0
- data/tests/test_error_handler.rb +35 -35
- data/tests/test_errors.rb +82 -82
- data/tests/test_exc.rb +55 -55
- data/tests/test_file_watch.rb +49 -49
- data/tests/test_futures.rb +198 -198
- data/tests/test_handler_check.rb +36 -36
- data/tests/test_hc.rb +190 -218
- data/tests/test_httpclient.rb +227 -218
- data/tests/test_httpclient2.rb +3 -2
- data/tests/test_inactivity_timeout.rb +3 -3
- data/tests/test_kb.rb +60 -60
- data/tests/test_ltp.rb +13 -5
- data/tests/test_ltp2.rb +317 -317
- data/tests/test_next_tick.rb +1 -1
- data/tests/test_object_protocol.rb +36 -36
- data/tests/test_pending_connect_timeout.rb +2 -2
- data/tests/test_process_watch.rb +50 -48
- data/tests/test_proxy_connection.rb +52 -0
- data/tests/test_pure.rb +134 -125
- data/tests/test_queue.rb +44 -44
- data/tests/test_running.rb +42 -42
- data/tests/test_sasl.rb +72 -72
- data/tests/test_send_file.rb +251 -242
- data/tests/test_servers.rb +76 -76
- data/tests/test_smtpclient.rb +83 -83
- data/tests/test_smtpserver.rb +85 -85
- data/tests/test_spawn.rb +322 -322
- data/tests/test_ssl_methods.rb +49 -49
- data/tests/test_ssl_verify.rb +82 -82
- data/tests/test_tick_loop.rb +59 -0
- data/tests/test_timers.rb +13 -15
- data/tests/test_ud.rb +36 -36
- data/tests/testem.rb +31 -31
- metadata +66 -51
- data/ext/cplusplus.cpp +0 -202
- data/ext/emwin.cpp +0 -300
- data/ext/emwin.h +0 -94
- data/ext/epoll.cpp +0 -26
- data/ext/epoll.h +0 -25
- data/ext/eventmachine_cpp.h +0 -96
- data/ext/files.cpp +0 -94
- data/ext/files.h +0 -65
- data/ext/sigs.cpp +0 -89
- data/ext/sigs.h +0 -32
- data/java/src/com/rubyeventmachine/application/Application.java +0 -194
- data/java/src/com/rubyeventmachine/application/Connection.java +0 -74
- data/java/src/com/rubyeventmachine/application/ConnectionFactory.java +0 -37
- data/java/src/com/rubyeventmachine/application/DefaultConnectionFactory.java +0 -46
- data/java/src/com/rubyeventmachine/application/PeriodicTimer.java +0 -38
- data/java/src/com/rubyeventmachine/application/Timer.java +0 -54
- data/java/src/com/rubyeventmachine/tests/ApplicationTest.java +0 -109
- data/java/src/com/rubyeventmachine/tests/ConnectTest.java +0 -148
- data/java/src/com/rubyeventmachine/tests/EMTest.java +0 -80
- data/java/src/com/rubyeventmachine/tests/TestDatagrams.java +0 -53
- data/java/src/com/rubyeventmachine/tests/TestServers.java +0 -75
- data/java/src/com/rubyeventmachine/tests/TestTimers.java +0 -90
- data/lib/evma.rb +0 -32
- data/lib/evma/callback.rb +0 -32
- data/lib/evma/container.rb +0 -75
- data/lib/evma/factory.rb +0 -77
- data/lib/evma/protocol.rb +0 -87
- data/lib/evma/reactor.rb +0 -48
- data/web/whatis +0 -7
@@ -1,175 +1,175 @@
|
|
1
|
-
#--
|
2
|
-
#
|
3
|
-
# Author:: Francis Cianfrocca (gmail: blackhedd)
|
4
|
-
# Homepage:: http://rubyeventmachine.com
|
5
|
-
# Date:: 15 November 2006
|
6
|
-
#
|
7
|
-
# See EventMachine and EventMachine::Connection for documentation and
|
8
|
-
# usage examples.
|
9
|
-
#
|
10
|
-
#----------------------------------------------------------------------------
|
11
|
-
#
|
12
|
-
# Copyright (C) 2006-07 by Francis Cianfrocca. All Rights Reserved.
|
13
|
-
# Gmail: blackhedd
|
14
|
-
#
|
15
|
-
# This program is free software; you can redistribute it and/or modify
|
16
|
-
# it under the terms of either: 1) the GNU General Public License
|
17
|
-
# as published by the Free Software Foundation; either version 2 of the
|
18
|
-
# License, or (at your option) any later version; or 2) Ruby's License.
|
19
|
-
#
|
20
|
-
# See the file COPYING for complete licensing information.
|
21
|
-
#
|
22
|
-
#---------------------------------------------------------------------------
|
23
|
-
#
|
24
|
-
#
|
25
|
-
#
|
26
|
-
|
27
|
-
module EventMachine
|
28
|
-
module Protocols
|
29
|
-
|
30
|
-
# Implements SASL authd.
|
31
|
-
# This is a very, very simple protocol that mimics the one used
|
32
|
-
# by saslauthd and pwcheck, two outboard daemons included in the
|
33
|
-
# standard SASL library distro.
|
34
|
-
# The only thing this is really suitable for is SASL PLAIN
|
35
|
-
# (user+password) authentication, but the SASL libs that are
|
36
|
-
# linked into standard servers (like imapd and sendmail) implement
|
37
|
-
# the other ones.
|
38
|
-
#
|
39
|
-
# SASL-auth is intended for reasonably fast operation inside a
|
40
|
-
# single machine, so it has no transport-security (although there
|
41
|
-
# have been multi-machine extensions incorporating transport-layer
|
42
|
-
# encryption).
|
43
|
-
#
|
44
|
-
# The standard saslauthd module generally runs privileged and does
|
45
|
-
# its work by referring to the system-account files.
|
46
|
-
#
|
47
|
-
# This feature was added to EventMachine to enable the development
|
48
|
-
# of custom authentication/authorization engines for standard servers.
|
49
|
-
#
|
50
|
-
# To use SASLauth, include it in a class that subclasses EM::Connection,
|
51
|
-
# and reimplement the validate method.
|
52
|
-
#
|
53
|
-
# The typical way to incorporate this module into an authentication
|
54
|
-
# daemon would be to set it as the handler for a UNIX-domain socket.
|
55
|
-
# The code might look like this:
|
56
|
-
#
|
57
|
-
# EM.start_unix_domain_server( "/var/run/saslauthd/mux", MyHandler )
|
58
|
-
# File.chmod( 0777, "/var/run/saslauthd/mux")
|
59
|
-
#
|
60
|
-
# The chmod is probably needed to ensure that unprivileged clients can
|
61
|
-
# access the UNIX-domain socket.
|
62
|
-
#
|
63
|
-
# It's also a very good idea to drop superuser privileges (if any), after
|
64
|
-
# the UNIX-domain socket has been opened.
|
65
|
-
#--
|
66
|
-
# Implementation details: assume the client can send us pipelined requests,
|
67
|
-
# and that the client will close the connection.
|
68
|
-
#
|
69
|
-
# The client sends us four values, each encoded as a two-byte length field in
|
70
|
-
# network order followed by the specified number of octets.
|
71
|
-
# The fields specify the username, password, service name (such as imap),
|
72
|
-
# and the "realm" name. We send back the barest minimum reply, a single
|
73
|
-
# field also encoded as a two-octet length in network order, followed by
|
74
|
-
# either "NO" or "OK" - simplicity itself.
|
75
|
-
#
|
76
|
-
# We enforce a maximum field size just as a sanity check.
|
77
|
-
# We do NOT automatically time out the connection.
|
78
|
-
#
|
79
|
-
# The code we use to parse out the values is ugly and probably slow.
|
80
|
-
# Improvements welcome.
|
81
|
-
#
|
82
|
-
module SASLauth
|
83
|
-
|
84
|
-
MaxFieldSize = 128*1024
|
85
|
-
def post_init
|
86
|
-
super
|
87
|
-
@sasl_data = ""
|
88
|
-
@sasl_values = []
|
89
|
-
end
|
90
|
-
|
91
|
-
def receive_data data
|
92
|
-
@sasl_data << data
|
93
|
-
while @sasl_data.length >= 2
|
94
|
-
len = (@sasl_data[0,2].unpack("n")).first
|
95
|
-
raise "SASL Max Field Length exceeded" if len > MaxFieldSize
|
96
|
-
if @sasl_data.length >= (len + 2)
|
97
|
-
@sasl_values << @sasl_data[2,len]
|
98
|
-
@sasl_data.slice!(0...(2+len))
|
99
|
-
if @sasl_values.length == 4
|
100
|
-
send_data( validate(*@sasl_values) ? "\0\002OK" : "\0\002NO" )
|
101
|
-
@sasl_values.clear
|
102
|
-
end
|
103
|
-
else
|
104
|
-
break
|
105
|
-
end
|
106
|
-
end
|
107
|
-
end
|
108
|
-
|
109
|
-
def validate username, psw, sysname, realm
|
110
|
-
p username
|
111
|
-
p psw
|
112
|
-
p sysname
|
113
|
-
p realm
|
114
|
-
true
|
115
|
-
end
|
116
|
-
end
|
117
|
-
|
118
|
-
# Implements the SASL authd client protocol.
|
119
|
-
# This is a very, very simple protocol that mimics the one used
|
120
|
-
# by saslauthd and pwcheck, two outboard daemons included in the
|
121
|
-
# standard SASL library distro.
|
122
|
-
# The only thing this is really suitable for is SASL PLAIN
|
123
|
-
# (user+password) authentication, but the SASL libs that are
|
124
|
-
# linked into standard servers (like imapd and sendmail) implement
|
125
|
-
# the other ones.
|
126
|
-
#
|
127
|
-
# You can use this module directly as a handler for EM Connections,
|
128
|
-
# or include it in a module or handler class of your own.
|
129
|
-
#
|
130
|
-
# First connect to a SASL server (it's probably a TCP server, or more
|
131
|
-
# likely a Unix-domain socket). Then call the #validate? method,
|
132
|
-
# passing at least a username and a password. #validate? returns
|
133
|
-
# a Deferrable which will either succeed or fail, depending
|
134
|
-
# on the status of the authentication operation.
|
135
|
-
#
|
136
|
-
module SASLauthclient
|
137
|
-
MaxFieldSize = 128*1024
|
138
|
-
|
139
|
-
def validate? username, psw, sysname=nil, realm=nil
|
140
|
-
|
141
|
-
str = [username, psw, sysname, realm].map {|m|
|
142
|
-
[(m || "").length, (m || "")]
|
143
|
-
}.flatten.pack( "nA*" * 4 )
|
144
|
-
send_data str
|
145
|
-
|
146
|
-
d = EM::DefaultDeferrable.new
|
147
|
-
@queries.unshift d
|
148
|
-
d
|
149
|
-
end
|
150
|
-
|
151
|
-
def post_init
|
152
|
-
@sasl_data = ""
|
153
|
-
@queries = []
|
154
|
-
end
|
155
|
-
|
156
|
-
def receive_data data
|
157
|
-
@sasl_data << data
|
158
|
-
|
159
|
-
while @sasl_data.length > 2
|
160
|
-
len = (@sasl_data[0,2].unpack("n")).first
|
161
|
-
raise "SASL Max Field Length exceeded" if len > MaxFieldSize
|
162
|
-
if @sasl_data.length >= (len + 2)
|
163
|
-
val = @sasl_data[2,len]
|
164
|
-
@sasl_data.slice!(0...(2+len))
|
165
|
-
q = @queries.pop
|
166
|
-
(val == "NO") ? q.fail : q.succeed
|
167
|
-
else
|
168
|
-
break
|
169
|
-
end
|
170
|
-
end
|
171
|
-
end
|
172
|
-
end
|
173
|
-
|
174
|
-
end
|
175
|
-
end
|
1
|
+
#--
|
2
|
+
#
|
3
|
+
# Author:: Francis Cianfrocca (gmail: blackhedd)
|
4
|
+
# Homepage:: http://rubyeventmachine.com
|
5
|
+
# Date:: 15 November 2006
|
6
|
+
#
|
7
|
+
# See EventMachine and EventMachine::Connection for documentation and
|
8
|
+
# usage examples.
|
9
|
+
#
|
10
|
+
#----------------------------------------------------------------------------
|
11
|
+
#
|
12
|
+
# Copyright (C) 2006-07 by Francis Cianfrocca. All Rights Reserved.
|
13
|
+
# Gmail: blackhedd
|
14
|
+
#
|
15
|
+
# This program is free software; you can redistribute it and/or modify
|
16
|
+
# it under the terms of either: 1) the GNU General Public License
|
17
|
+
# as published by the Free Software Foundation; either version 2 of the
|
18
|
+
# License, or (at your option) any later version; or 2) Ruby's License.
|
19
|
+
#
|
20
|
+
# See the file COPYING for complete licensing information.
|
21
|
+
#
|
22
|
+
#---------------------------------------------------------------------------
|
23
|
+
#
|
24
|
+
#
|
25
|
+
#
|
26
|
+
|
27
|
+
module EventMachine
|
28
|
+
module Protocols
|
29
|
+
|
30
|
+
# Implements SASL authd.
|
31
|
+
# This is a very, very simple protocol that mimics the one used
|
32
|
+
# by saslauthd and pwcheck, two outboard daemons included in the
|
33
|
+
# standard SASL library distro.
|
34
|
+
# The only thing this is really suitable for is SASL PLAIN
|
35
|
+
# (user+password) authentication, but the SASL libs that are
|
36
|
+
# linked into standard servers (like imapd and sendmail) implement
|
37
|
+
# the other ones.
|
38
|
+
#
|
39
|
+
# SASL-auth is intended for reasonably fast operation inside a
|
40
|
+
# single machine, so it has no transport-security (although there
|
41
|
+
# have been multi-machine extensions incorporating transport-layer
|
42
|
+
# encryption).
|
43
|
+
#
|
44
|
+
# The standard saslauthd module generally runs privileged and does
|
45
|
+
# its work by referring to the system-account files.
|
46
|
+
#
|
47
|
+
# This feature was added to EventMachine to enable the development
|
48
|
+
# of custom authentication/authorization engines for standard servers.
|
49
|
+
#
|
50
|
+
# To use SASLauth, include it in a class that subclasses EM::Connection,
|
51
|
+
# and reimplement the validate method.
|
52
|
+
#
|
53
|
+
# The typical way to incorporate this module into an authentication
|
54
|
+
# daemon would be to set it as the handler for a UNIX-domain socket.
|
55
|
+
# The code might look like this:
|
56
|
+
#
|
57
|
+
# EM.start_unix_domain_server( "/var/run/saslauthd/mux", MyHandler )
|
58
|
+
# File.chmod( 0777, "/var/run/saslauthd/mux")
|
59
|
+
#
|
60
|
+
# The chmod is probably needed to ensure that unprivileged clients can
|
61
|
+
# access the UNIX-domain socket.
|
62
|
+
#
|
63
|
+
# It's also a very good idea to drop superuser privileges (if any), after
|
64
|
+
# the UNIX-domain socket has been opened.
|
65
|
+
#--
|
66
|
+
# Implementation details: assume the client can send us pipelined requests,
|
67
|
+
# and that the client will close the connection.
|
68
|
+
#
|
69
|
+
# The client sends us four values, each encoded as a two-byte length field in
|
70
|
+
# network order followed by the specified number of octets.
|
71
|
+
# The fields specify the username, password, service name (such as imap),
|
72
|
+
# and the "realm" name. We send back the barest minimum reply, a single
|
73
|
+
# field also encoded as a two-octet length in network order, followed by
|
74
|
+
# either "NO" or "OK" - simplicity itself.
|
75
|
+
#
|
76
|
+
# We enforce a maximum field size just as a sanity check.
|
77
|
+
# We do NOT automatically time out the connection.
|
78
|
+
#
|
79
|
+
# The code we use to parse out the values is ugly and probably slow.
|
80
|
+
# Improvements welcome.
|
81
|
+
#
|
82
|
+
module SASLauth
|
83
|
+
|
84
|
+
MaxFieldSize = 128*1024
|
85
|
+
def post_init
|
86
|
+
super
|
87
|
+
@sasl_data = ""
|
88
|
+
@sasl_values = []
|
89
|
+
end
|
90
|
+
|
91
|
+
def receive_data data
|
92
|
+
@sasl_data << data
|
93
|
+
while @sasl_data.length >= 2
|
94
|
+
len = (@sasl_data[0,2].unpack("n")).first
|
95
|
+
raise "SASL Max Field Length exceeded" if len > MaxFieldSize
|
96
|
+
if @sasl_data.length >= (len + 2)
|
97
|
+
@sasl_values << @sasl_data[2,len]
|
98
|
+
@sasl_data.slice!(0...(2+len))
|
99
|
+
if @sasl_values.length == 4
|
100
|
+
send_data( validate(*@sasl_values) ? "\0\002OK" : "\0\002NO" )
|
101
|
+
@sasl_values.clear
|
102
|
+
end
|
103
|
+
else
|
104
|
+
break
|
105
|
+
end
|
106
|
+
end
|
107
|
+
end
|
108
|
+
|
109
|
+
def validate username, psw, sysname, realm
|
110
|
+
p username
|
111
|
+
p psw
|
112
|
+
p sysname
|
113
|
+
p realm
|
114
|
+
true
|
115
|
+
end
|
116
|
+
end
|
117
|
+
|
118
|
+
# Implements the SASL authd client protocol.
|
119
|
+
# This is a very, very simple protocol that mimics the one used
|
120
|
+
# by saslauthd and pwcheck, two outboard daemons included in the
|
121
|
+
# standard SASL library distro.
|
122
|
+
# The only thing this is really suitable for is SASL PLAIN
|
123
|
+
# (user+password) authentication, but the SASL libs that are
|
124
|
+
# linked into standard servers (like imapd and sendmail) implement
|
125
|
+
# the other ones.
|
126
|
+
#
|
127
|
+
# You can use this module directly as a handler for EM Connections,
|
128
|
+
# or include it in a module or handler class of your own.
|
129
|
+
#
|
130
|
+
# First connect to a SASL server (it's probably a TCP server, or more
|
131
|
+
# likely a Unix-domain socket). Then call the #validate? method,
|
132
|
+
# passing at least a username and a password. #validate? returns
|
133
|
+
# a Deferrable which will either succeed or fail, depending
|
134
|
+
# on the status of the authentication operation.
|
135
|
+
#
|
136
|
+
module SASLauthclient
|
137
|
+
MaxFieldSize = 128*1024
|
138
|
+
|
139
|
+
def validate? username, psw, sysname=nil, realm=nil
|
140
|
+
|
141
|
+
str = [username, psw, sysname, realm].map {|m|
|
142
|
+
[(m || "").length, (m || "")]
|
143
|
+
}.flatten.pack( "nA*" * 4 )
|
144
|
+
send_data str
|
145
|
+
|
146
|
+
d = EM::DefaultDeferrable.new
|
147
|
+
@queries.unshift d
|
148
|
+
d
|
149
|
+
end
|
150
|
+
|
151
|
+
def post_init
|
152
|
+
@sasl_data = ""
|
153
|
+
@queries = []
|
154
|
+
end
|
155
|
+
|
156
|
+
def receive_data data
|
157
|
+
@sasl_data << data
|
158
|
+
|
159
|
+
while @sasl_data.length > 2
|
160
|
+
len = (@sasl_data[0,2].unpack("n")).first
|
161
|
+
raise "SASL Max Field Length exceeded" if len > MaxFieldSize
|
162
|
+
if @sasl_data.length >= (len + 2)
|
163
|
+
val = @sasl_data[2,len]
|
164
|
+
@sasl_data.slice!(0...(2+len))
|
165
|
+
q = @queries.pop
|
166
|
+
(val == "NO") ? q.fail : q.succeed
|
167
|
+
else
|
168
|
+
break
|
169
|
+
end
|
170
|
+
end
|
171
|
+
end
|
172
|
+
end
|
173
|
+
|
174
|
+
end
|
175
|
+
end
|
@@ -1,547 +1,640 @@
|
|
1
|
-
#--
|
2
|
-
#
|
3
|
-
# Author:: Francis Cianfrocca (gmail: blackhedd)
|
4
|
-
# Homepage:: http://rubyeventmachine.com
|
5
|
-
# Date:: 16 July 2006
|
6
|
-
#
|
7
|
-
# See EventMachine and EventMachine::Connection for documentation and
|
8
|
-
# usage examples.
|
9
|
-
#
|
10
|
-
#----------------------------------------------------------------------------
|
11
|
-
#
|
12
|
-
# Copyright (C) 2006-07 by Francis Cianfrocca. All Rights Reserved.
|
13
|
-
# Gmail: blackhedd
|
14
|
-
#
|
15
|
-
# This program is free software; you can redistribute it and/or modify
|
16
|
-
# it under the terms of either: 1) the GNU General Public License
|
17
|
-
# as published by the Free Software Foundation; either version 2 of the
|
18
|
-
# License, or (at your option) any later version; or 2) Ruby's License.
|
19
|
-
#
|
20
|
-
# See the file COPYING for complete licensing information.
|
21
|
-
#
|
22
|
-
#---------------------------------------------------------------------------
|
23
|
-
#
|
24
|
-
#
|
25
|
-
|
26
|
-
module EventMachine
|
27
|
-
module Protocols
|
28
|
-
|
29
|
-
# This is a protocol handler for the server side of SMTP.
|
30
|
-
# It's NOT a complete SMTP server obeying all the semantics of servers conforming to
|
31
|
-
# RFC2821. Rather, it uses overridable method stubs to communicate protocol states
|
32
|
-
# and data to user code. User code is responsible for doing the right things with the
|
33
|
-
# data in order to get complete and correct SMTP server behavior.
|
34
|
-
#
|
35
|
-
|
36
|
-
#
|
37
|
-
#
|
38
|
-
#
|
39
|
-
#
|
40
|
-
#
|
41
|
-
#
|
42
|
-
#
|
43
|
-
#
|
44
|
-
#
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
108
|
-
|
109
|
-
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
|
130
|
-
|
131
|
-
|
132
|
-
|
133
|
-
|
134
|
-
|
135
|
-
|
136
|
-
|
137
|
-
|
138
|
-
|
139
|
-
|
140
|
-
|
141
|
-
|
142
|
-
|
143
|
-
|
144
|
-
|
145
|
-
|
146
|
-
|
147
|
-
|
148
|
-
|
149
|
-
|
150
|
-
#
|
151
|
-
|
152
|
-
|
153
|
-
|
154
|
-
|
155
|
-
|
156
|
-
|
157
|
-
|
158
|
-
|
159
|
-
|
160
|
-
|
161
|
-
|
162
|
-
|
163
|
-
|
164
|
-
|
165
|
-
|
166
|
-
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
171
|
-
|
172
|
-
#
|
173
|
-
#
|
174
|
-
#
|
175
|
-
#
|
176
|
-
#
|
177
|
-
#
|
178
|
-
#
|
179
|
-
#
|
180
|
-
#
|
181
|
-
#
|
182
|
-
|
183
|
-
|
184
|
-
|
185
|
-
|
186
|
-
|
187
|
-
|
188
|
-
|
189
|
-
def
|
190
|
-
|
191
|
-
end
|
192
|
-
|
193
|
-
|
194
|
-
|
195
|
-
|
196
|
-
|
197
|
-
|
198
|
-
|
199
|
-
|
200
|
-
|
201
|
-
|
202
|
-
|
203
|
-
|
204
|
-
|
205
|
-
|
206
|
-
|
207
|
-
|
208
|
-
|
209
|
-
|
210
|
-
|
211
|
-
|
212
|
-
|
213
|
-
|
214
|
-
|
215
|
-
|
216
|
-
|
217
|
-
|
218
|
-
|
219
|
-
|
220
|
-
|
221
|
-
|
222
|
-
|
223
|
-
|
224
|
-
|
225
|
-
|
226
|
-
else
|
227
|
-
|
228
|
-
end
|
229
|
-
end
|
230
|
-
|
231
|
-
|
232
|
-
|
233
|
-
|
234
|
-
|
235
|
-
|
236
|
-
|
237
|
-
|
238
|
-
|
239
|
-
|
240
|
-
|
241
|
-
|
242
|
-
|
243
|
-
|
244
|
-
|
245
|
-
|
246
|
-
|
247
|
-
|
248
|
-
|
249
|
-
|
250
|
-
|
251
|
-
|
252
|
-
|
253
|
-
|
254
|
-
|
255
|
-
#
|
256
|
-
#
|
257
|
-
#
|
258
|
-
#
|
259
|
-
|
260
|
-
|
261
|
-
|
262
|
-
|
263
|
-
|
264
|
-
|
265
|
-
|
266
|
-
|
267
|
-
|
268
|
-
|
269
|
-
|
270
|
-
|
271
|
-
|
272
|
-
|
273
|
-
|
274
|
-
|
275
|
-
|
276
|
-
|
277
|
-
|
278
|
-
#
|
279
|
-
#
|
280
|
-
#
|
281
|
-
#
|
282
|
-
|
283
|
-
|
284
|
-
|
285
|
-
|
286
|
-
|
287
|
-
|
288
|
-
|
289
|
-
|
290
|
-
|
291
|
-
|
292
|
-
|
293
|
-
|
294
|
-
|
295
|
-
|
296
|
-
|
297
|
-
|
298
|
-
|
299
|
-
|
300
|
-
|
301
|
-
|
302
|
-
|
303
|
-
|
304
|
-
|
305
|
-
|
306
|
-
|
307
|
-
|
308
|
-
|
309
|
-
|
310
|
-
end
|
311
|
-
|
312
|
-
def
|
313
|
-
|
314
|
-
|
315
|
-
|
316
|
-
|
317
|
-
|
318
|
-
|
319
|
-
|
320
|
-
|
321
|
-
|
322
|
-
|
323
|
-
|
324
|
-
|
325
|
-
|
326
|
-
|
327
|
-
|
328
|
-
|
329
|
-
|
330
|
-
|
331
|
-
|
332
|
-
|
333
|
-
|
334
|
-
|
335
|
-
|
336
|
-
|
337
|
-
|
338
|
-
|
339
|
-
#
|
340
|
-
|
341
|
-
|
342
|
-
|
343
|
-
|
344
|
-
|
345
|
-
|
346
|
-
|
347
|
-
|
348
|
-
|
349
|
-
|
350
|
-
|
351
|
-
|
352
|
-
|
353
|
-
|
354
|
-
send_data "
|
355
|
-
|
356
|
-
|
357
|
-
|
358
|
-
|
359
|
-
|
360
|
-
|
361
|
-
|
362
|
-
|
363
|
-
|
364
|
-
|
365
|
-
|
366
|
-
|
367
|
-
|
368
|
-
|
369
|
-
|
370
|
-
|
371
|
-
#
|
372
|
-
#
|
373
|
-
#
|
374
|
-
#
|
375
|
-
|
376
|
-
|
377
|
-
|
378
|
-
|
379
|
-
|
380
|
-
|
381
|
-
|
382
|
-
|
383
|
-
|
384
|
-
|
385
|
-
|
386
|
-
|
387
|
-
|
388
|
-
|
389
|
-
|
390
|
-
|
391
|
-
|
392
|
-
d.
|
393
|
-
|
394
|
-
|
395
|
-
|
396
|
-
|
397
|
-
|
398
|
-
|
399
|
-
|
400
|
-
|
401
|
-
|
402
|
-
|
403
|
-
|
404
|
-
|
405
|
-
|
406
|
-
|
407
|
-
end
|
408
|
-
|
409
|
-
|
410
|
-
#
|
411
|
-
#
|
412
|
-
#
|
413
|
-
#
|
414
|
-
|
415
|
-
|
416
|
-
|
417
|
-
|
418
|
-
|
419
|
-
|
420
|
-
|
421
|
-
|
422
|
-
|
423
|
-
|
424
|
-
|
425
|
-
|
426
|
-
|
427
|
-
|
428
|
-
|
429
|
-
|
430
|
-
|
431
|
-
|
432
|
-
|
433
|
-
|
434
|
-
|
435
|
-
|
436
|
-
|
437
|
-
|
438
|
-
|
439
|
-
|
440
|
-
|
441
|
-
|
442
|
-
|
443
|
-
|
444
|
-
|
445
|
-
|
446
|
-
|
447
|
-
|
448
|
-
|
449
|
-
|
450
|
-
|
451
|
-
|
452
|
-
|
453
|
-
|
454
|
-
|
455
|
-
|
456
|
-
|
457
|
-
|
458
|
-
|
459
|
-
|
460
|
-
|
461
|
-
|
462
|
-
#
|
463
|
-
|
464
|
-
#
|
465
|
-
|
466
|
-
|
467
|
-
|
468
|
-
#
|
469
|
-
#
|
470
|
-
def
|
471
|
-
|
472
|
-
|
473
|
-
|
474
|
-
|
475
|
-
|
476
|
-
|
477
|
-
|
478
|
-
|
479
|
-
|
480
|
-
|
481
|
-
|
482
|
-
|
483
|
-
|
484
|
-
|
485
|
-
|
486
|
-
|
487
|
-
|
488
|
-
|
489
|
-
|
490
|
-
|
491
|
-
|
492
|
-
|
493
|
-
|
494
|
-
|
495
|
-
|
496
|
-
|
497
|
-
|
498
|
-
|
499
|
-
|
500
|
-
|
501
|
-
|
502
|
-
|
503
|
-
#
|
504
|
-
#
|
505
|
-
|
506
|
-
|
507
|
-
|
508
|
-
#
|
509
|
-
#
|
510
|
-
|
511
|
-
|
512
|
-
|
513
|
-
#
|
514
|
-
#
|
515
|
-
#
|
516
|
-
#
|
517
|
-
|
518
|
-
|
519
|
-
|
520
|
-
|
521
|
-
|
522
|
-
|
523
|
-
|
524
|
-
|
525
|
-
|
526
|
-
|
527
|
-
|
528
|
-
|
529
|
-
|
530
|
-
|
531
|
-
|
532
|
-
|
533
|
-
|
534
|
-
|
535
|
-
|
536
|
-
|
537
|
-
|
538
|
-
|
539
|
-
|
540
|
-
|
541
|
-
|
542
|
-
|
543
|
-
|
544
|
-
|
545
|
-
|
546
|
-
|
547
|
-
|
1
|
+
#--
|
2
|
+
#
|
3
|
+
# Author:: Francis Cianfrocca (gmail: blackhedd)
|
4
|
+
# Homepage:: http://rubyeventmachine.com
|
5
|
+
# Date:: 16 July 2006
|
6
|
+
#
|
7
|
+
# See EventMachine and EventMachine::Connection for documentation and
|
8
|
+
# usage examples.
|
9
|
+
#
|
10
|
+
#----------------------------------------------------------------------------
|
11
|
+
#
|
12
|
+
# Copyright (C) 2006-07 by Francis Cianfrocca. All Rights Reserved.
|
13
|
+
# Gmail: blackhedd
|
14
|
+
#
|
15
|
+
# This program is free software; you can redistribute it and/or modify
|
16
|
+
# it under the terms of either: 1) the GNU General Public License
|
17
|
+
# as published by the Free Software Foundation; either version 2 of the
|
18
|
+
# License, or (at your option) any later version; or 2) Ruby's License.
|
19
|
+
#
|
20
|
+
# See the file COPYING for complete licensing information.
|
21
|
+
#
|
22
|
+
#---------------------------------------------------------------------------
|
23
|
+
#
|
24
|
+
#
|
25
|
+
|
26
|
+
module EventMachine
|
27
|
+
module Protocols
|
28
|
+
|
29
|
+
# This is a protocol handler for the server side of SMTP.
|
30
|
+
# It's NOT a complete SMTP server obeying all the semantics of servers conforming to
|
31
|
+
# RFC2821. Rather, it uses overridable method stubs to communicate protocol states
|
32
|
+
# and data to user code. User code is responsible for doing the right things with the
|
33
|
+
# data in order to get complete and correct SMTP server behavior.
|
34
|
+
#
|
35
|
+
# Simple SMTP server example:
|
36
|
+
#
|
37
|
+
# class EmailServer < EM::P::SmtpServer
|
38
|
+
# def receive_plain_auth(user, pass)
|
39
|
+
# true
|
40
|
+
# end
|
41
|
+
#
|
42
|
+
# def get_server_domain
|
43
|
+
# "mock.smtp.server.local"
|
44
|
+
# end
|
45
|
+
#
|
46
|
+
# def get_server_greeting
|
47
|
+
# "mock smtp server greets you with impunity"
|
48
|
+
# end
|
49
|
+
#
|
50
|
+
# def receive_sender(sender)
|
51
|
+
# current.sender = sender
|
52
|
+
# true
|
53
|
+
# end
|
54
|
+
#
|
55
|
+
# def receive_recipient(recipient)
|
56
|
+
# current.recipient = recipient
|
57
|
+
# true
|
58
|
+
# end
|
59
|
+
#
|
60
|
+
# def receive_message
|
61
|
+
# current.received = true
|
62
|
+
# current.completed_at = Time.now
|
63
|
+
#
|
64
|
+
# p [:received_email, current]
|
65
|
+
# @current = OpenStruct.new
|
66
|
+
# true
|
67
|
+
# end
|
68
|
+
#
|
69
|
+
# def receive_ehlo_domain(domain)
|
70
|
+
# @ehlo_domain = domain
|
71
|
+
# true
|
72
|
+
# end
|
73
|
+
#
|
74
|
+
# def receive_data_command
|
75
|
+
# current.data = ""
|
76
|
+
# true
|
77
|
+
# end
|
78
|
+
#
|
79
|
+
# def receive_data_chunk(data)
|
80
|
+
# current.data << data.join("\n")
|
81
|
+
# true
|
82
|
+
# end
|
83
|
+
#
|
84
|
+
# def receive_transaction
|
85
|
+
# if @ehlo_domain
|
86
|
+
# current.ehlo_domain = @ehlo_domain
|
87
|
+
# @ehlo_domain = nil
|
88
|
+
# end
|
89
|
+
# true
|
90
|
+
# end
|
91
|
+
#
|
92
|
+
# def current
|
93
|
+
# @current ||= OpenStruct.new
|
94
|
+
# end
|
95
|
+
#
|
96
|
+
# def self.start(host = 'localhost', port = 1025)
|
97
|
+
# require 'ostruct'
|
98
|
+
# @server = EM.start_server host, port, self
|
99
|
+
# end
|
100
|
+
#
|
101
|
+
# def self.stop
|
102
|
+
# if @server
|
103
|
+
# EM.stop_server @server
|
104
|
+
# @server = nil
|
105
|
+
# end
|
106
|
+
# end
|
107
|
+
#
|
108
|
+
# def self.running?
|
109
|
+
# !!@server
|
110
|
+
# end
|
111
|
+
# end
|
112
|
+
#
|
113
|
+
# EM.run{ EmailServer.start }
|
114
|
+
#
|
115
|
+
#--
|
116
|
+
# Useful paragraphs in RFC-2821:
|
117
|
+
# 4.3.2: Concise list of command-reply sequences, in essence a text representation
|
118
|
+
# of the command state-machine.
|
119
|
+
#
|
120
|
+
# STARTTLS is defined in RFC2487.
|
121
|
+
# Observe that there are important rules governing whether a publicly-referenced server
|
122
|
+
# (meaning one whose Internet address appears in public MX records) may require the
|
123
|
+
# non-optional use of TLS.
|
124
|
+
# Non-optional TLS does not apply to EHLO, NOOP, QUIT or STARTTLS.
|
125
|
+
class SmtpServer < EventMachine::Connection
|
126
|
+
include Protocols::LineText2
|
127
|
+
|
128
|
+
HeloRegex = /\AHELO\s*/i
|
129
|
+
EhloRegex = /\AEHLO\s*/i
|
130
|
+
QuitRegex = /\AQUIT/i
|
131
|
+
MailFromRegex = /\AMAIL FROM:\s*/i
|
132
|
+
RcptToRegex = /\ARCPT TO:\s*/i
|
133
|
+
DataRegex = /\ADATA/i
|
134
|
+
NoopRegex = /\ANOOP/i
|
135
|
+
RsetRegex = /\ARSET/i
|
136
|
+
VrfyRegex = /\AVRFY\s+/i
|
137
|
+
ExpnRegex = /\AEXPN\s+/i
|
138
|
+
HelpRegex = /\AHELP/i
|
139
|
+
StarttlsRegex = /\ASTARTTLS/i
|
140
|
+
AuthRegex = /\AAUTH\s+/i
|
141
|
+
|
142
|
+
|
143
|
+
# Class variable containing default parameters that can be overridden
|
144
|
+
# in application code.
|
145
|
+
# Individual objects of this class will make an instance-local copy of
|
146
|
+
# the class variable, so that they can be reconfigured on a per-instance
|
147
|
+
# basis.
|
148
|
+
#
|
149
|
+
# Chunksize is the number of data lines we'll buffer before
|
150
|
+
# sending them to the application. TODO, make this user-configurable.
|
151
|
+
#
|
152
|
+
@@parms = {
|
153
|
+
:chunksize => 4000,
|
154
|
+
:verbose => false
|
155
|
+
}
|
156
|
+
def self.parms= parms={}
|
157
|
+
@@parms.merge!(parms)
|
158
|
+
end
|
159
|
+
|
160
|
+
|
161
|
+
|
162
|
+
def initialize *args
|
163
|
+
super
|
164
|
+
@parms = @@parms
|
165
|
+
init_protocol_state
|
166
|
+
end
|
167
|
+
|
168
|
+
def parms= parms={}
|
169
|
+
@parms.merge!(parms)
|
170
|
+
end
|
171
|
+
|
172
|
+
# In SMTP, the server talks first. But by a (perhaps flawed) axiom in EM,
|
173
|
+
# #post_init will execute BEFORE the block passed to #start_server, for any
|
174
|
+
# given accepted connection. Since in this class we'll probably be getting
|
175
|
+
# a lot of initialization parameters, we want the guts of post_init to
|
176
|
+
# run AFTER the application has initialized the connection object. So we
|
177
|
+
# use a spawn to schedule the post_init to run later.
|
178
|
+
# It's a little weird, I admit. A reasonable alternative would be to set
|
179
|
+
# parameters as a class variable and to do that before accepting any connections.
|
180
|
+
#
|
181
|
+
# OBSOLETE, now we have @@parms. But the spawn is nice to keep as an illustration.
|
182
|
+
#
|
183
|
+
def post_init
|
184
|
+
#send_data "220 #{get_server_greeting}\r\n" (ORIGINAL)
|
185
|
+
#(EM.spawn {|x| x.send_data "220 #{x.get_server_greeting}\r\n"}).notify(self)
|
186
|
+
(EM.spawn {|x| x.send_server_greeting}).notify(self)
|
187
|
+
end
|
188
|
+
|
189
|
+
def send_server_greeting
|
190
|
+
send_data "220 #{get_server_greeting}\r\n"
|
191
|
+
end
|
192
|
+
|
193
|
+
def receive_line ln
|
194
|
+
@@parms[:verbose] and $>.puts ">>> #{ln}"
|
195
|
+
|
196
|
+
return process_data_line(ln) if @state.include?(:data)
|
197
|
+
return process_auth_line(ln) if @state.include?(:auth_incomplete)
|
198
|
+
|
199
|
+
case ln
|
200
|
+
when EhloRegex
|
201
|
+
process_ehlo $'.dup
|
202
|
+
when HeloRegex
|
203
|
+
process_helo $'.dup
|
204
|
+
when MailFromRegex
|
205
|
+
process_mail_from $'.dup
|
206
|
+
when RcptToRegex
|
207
|
+
process_rcpt_to $'.dup
|
208
|
+
when DataRegex
|
209
|
+
process_data
|
210
|
+
when RsetRegex
|
211
|
+
process_rset
|
212
|
+
when VrfyRegex
|
213
|
+
process_vrfy
|
214
|
+
when ExpnRegex
|
215
|
+
process_expn
|
216
|
+
when HelpRegex
|
217
|
+
process_help
|
218
|
+
when NoopRegex
|
219
|
+
process_noop
|
220
|
+
when QuitRegex
|
221
|
+
process_quit
|
222
|
+
when StarttlsRegex
|
223
|
+
process_starttls
|
224
|
+
when AuthRegex
|
225
|
+
process_auth $'.dup
|
226
|
+
else
|
227
|
+
process_unknown
|
228
|
+
end
|
229
|
+
end
|
230
|
+
|
231
|
+
# TODO - implement this properly, the implementation is a stub!
|
232
|
+
def process_vrfy
|
233
|
+
send_data "250 Ok, but unimplemented\r\n"
|
234
|
+
end
|
235
|
+
# TODO - implement this properly, the implementation is a stub!
|
236
|
+
def process_help
|
237
|
+
send_data "250 Ok, but unimplemented\r\n"
|
238
|
+
end
|
239
|
+
# TODO - implement this properly, the implementation is a stub!
|
240
|
+
def process_expn
|
241
|
+
send_data "250 Ok, but unimplemented\r\n"
|
242
|
+
end
|
243
|
+
|
244
|
+
#--
|
245
|
+
# This is called at several points to restore the protocol state
|
246
|
+
# to a pre-transaction state. In essence, we "forget" having seen
|
247
|
+
# any valid command except EHLO and STARTTLS.
|
248
|
+
# We also have to callback user code, in case they're keeping track
|
249
|
+
# of senders, recipients, and whatnot.
|
250
|
+
#
|
251
|
+
# We try to follow the convention of avoiding the verb "receive" for
|
252
|
+
# internal method names except receive_line (which we inherit), and
|
253
|
+
# using only receive_xxx for user-overridable stubs.
|
254
|
+
#
|
255
|
+
# init_protocol_state is called when we initialize the connection as
|
256
|
+
# well as during reset_protocol_state. It does NOT call the user
|
257
|
+
# override method. This enables us to promise the users that they
|
258
|
+
# won't see the overridable fire except after EHLO and RSET, and
|
259
|
+
# after a message has been received. Although the latter may be wrong.
|
260
|
+
# The standard may allow multiple DATA segments with the same set of
|
261
|
+
# senders and recipients.
|
262
|
+
#
|
263
|
+
def reset_protocol_state
|
264
|
+
init_protocol_state
|
265
|
+
s,@state = @state,[]
|
266
|
+
@state << :starttls if s.include?(:starttls)
|
267
|
+
@state << :ehlo if s.include?(:ehlo)
|
268
|
+
receive_transaction
|
269
|
+
end
|
270
|
+
def init_protocol_state
|
271
|
+
@state ||= []
|
272
|
+
end
|
273
|
+
|
274
|
+
|
275
|
+
#--
|
276
|
+
# EHLO/HELO is always legal, per the standard. On success
|
277
|
+
# it always clears buffers and initiates a mail "transaction."
|
278
|
+
# Which means that a MAIL FROM must follow.
|
279
|
+
#
|
280
|
+
# Per the standard, an EHLO/HELO or a RSET "initiates" an email
|
281
|
+
# transaction. Thereafter, MAIL FROM must be received before
|
282
|
+
# RCPT TO, before DATA. Not sure what this specific ordering
|
283
|
+
# achieves semantically, but it does make it easier to
|
284
|
+
# implement. We also support user-specified requirements for
|
285
|
+
# STARTTLS and AUTH. We make it impossible to proceed to MAIL FROM
|
286
|
+
# without fulfilling tls and/or auth, if the user specified either
|
287
|
+
# or both as required. We need to check the extension standard
|
288
|
+
# for auth to see if a credential is discarded after a RSET along
|
289
|
+
# with all the rest of the state. We'll behave as if it is.
|
290
|
+
# Now clearly, we can't discard tls after its been negotiated
|
291
|
+
# without dropping the connection, so that flag doesn't get cleared.
|
292
|
+
#
|
293
|
+
def process_ehlo domain
|
294
|
+
if receive_ehlo_domain domain
|
295
|
+
send_data "250-#{get_server_domain}\r\n"
|
296
|
+
if @@parms[:starttls]
|
297
|
+
send_data "250-STARTTLS\r\n"
|
298
|
+
end
|
299
|
+
if @@parms[:auth]
|
300
|
+
send_data "250-AUTH PLAIN\r\n"
|
301
|
+
end
|
302
|
+
send_data "250-NO-SOLICITING\r\n"
|
303
|
+
# TODO, size needs to be configurable.
|
304
|
+
send_data "250 SIZE 20000000\r\n"
|
305
|
+
reset_protocol_state
|
306
|
+
@state << :ehlo
|
307
|
+
else
|
308
|
+
send_data "550 Requested action not taken\r\n"
|
309
|
+
end
|
310
|
+
end
|
311
|
+
|
312
|
+
def process_helo domain
|
313
|
+
if receive_ehlo_domain domain.dup
|
314
|
+
send_data "250 #{get_server_domain}\r\n"
|
315
|
+
reset_protocol_state
|
316
|
+
@state << :ehlo
|
317
|
+
else
|
318
|
+
send_data "550 Requested action not taken\r\n"
|
319
|
+
end
|
320
|
+
end
|
321
|
+
|
322
|
+
def process_quit
|
323
|
+
send_data "221 Ok\r\n"
|
324
|
+
close_connection_after_writing
|
325
|
+
end
|
326
|
+
|
327
|
+
def process_noop
|
328
|
+
send_data "250 Ok\r\n"
|
329
|
+
end
|
330
|
+
|
331
|
+
def process_unknown
|
332
|
+
send_data "500 Unknown command\r\n"
|
333
|
+
end
|
334
|
+
|
335
|
+
#--
|
336
|
+
# So far, only AUTH PLAIN is supported but we should do at least LOGIN as well.
|
337
|
+
# TODO, support clients that send AUTH PLAIN with no parameter, expecting a 3xx
|
338
|
+
# response and a continuation of the auth conversation.
|
339
|
+
#
|
340
|
+
def process_auth str
|
341
|
+
if @state.include?(:auth)
|
342
|
+
send_data "503 auth already issued\r\n"
|
343
|
+
elsif str =~ /\APLAIN\s?/i
|
344
|
+
if $'.length == 0
|
345
|
+
# we got a partial response, so let the client know to send the rest
|
346
|
+
@state << :auth_incomplete
|
347
|
+
send_data("334 \r\n")
|
348
|
+
else
|
349
|
+
# we got the initial response, so go ahead & process it
|
350
|
+
process_auth_line($')
|
351
|
+
end
|
352
|
+
#elsif str =~ /\ALOGIN\s+/i
|
353
|
+
else
|
354
|
+
send_data "504 auth mechanism not available\r\n"
|
355
|
+
end
|
356
|
+
end
|
357
|
+
|
358
|
+
def process_auth_line(line)
|
359
|
+
plain = line.unpack("m").first
|
360
|
+
discard,user,psw = plain.split("\000")
|
361
|
+
if receive_plain_auth user,psw
|
362
|
+
send_data "235 authentication ok\r\n"
|
363
|
+
@state << :auth
|
364
|
+
else
|
365
|
+
send_data "535 invalid authentication\r\n"
|
366
|
+
end
|
367
|
+
@state.delete :auth_incomplete
|
368
|
+
end
|
369
|
+
|
370
|
+
#--
|
371
|
+
# Unusually, we can deal with a Deferrable returned from the user application.
|
372
|
+
# This was added to deal with a special case in a particular application, but
|
373
|
+
# it would be a nice idea to add it to the other user-code callbacks.
|
374
|
+
#
|
375
|
+
def process_data
|
376
|
+
unless @state.include?(:rcpt)
|
377
|
+
send_data "503 Operation sequence error\r\n"
|
378
|
+
else
|
379
|
+
succeeded = proc {
|
380
|
+
send_data "354 Send it\r\n"
|
381
|
+
@state << :data
|
382
|
+
@databuffer = []
|
383
|
+
}
|
384
|
+
failed = proc {
|
385
|
+
send_data "550 Operation failed\r\n"
|
386
|
+
}
|
387
|
+
|
388
|
+
d = receive_data_command
|
389
|
+
|
390
|
+
if d.respond_to?(:callback)
|
391
|
+
d.callback(&succeeded)
|
392
|
+
d.errback(&failed)
|
393
|
+
else
|
394
|
+
(d ? succeeded : failed).call
|
395
|
+
end
|
396
|
+
end
|
397
|
+
end
|
398
|
+
|
399
|
+
def process_rset
|
400
|
+
reset_protocol_state
|
401
|
+
receive_reset
|
402
|
+
send_data "250 Ok\r\n"
|
403
|
+
end
|
404
|
+
|
405
|
+
def unbind
|
406
|
+
connection_ended
|
407
|
+
end
|
408
|
+
|
409
|
+
#--
|
410
|
+
# STARTTLS may not be issued before EHLO, or unless the user has chosen
|
411
|
+
# to support it.
|
412
|
+
# TODO, must support user-supplied certificates.
|
413
|
+
#
|
414
|
+
def process_starttls
|
415
|
+
if @@parms[:starttls]
|
416
|
+
if @state.include?(:starttls)
|
417
|
+
send_data "503 TLS Already negotiated\r\n"
|
418
|
+
elsif ! @state.include?(:ehlo)
|
419
|
+
send_data "503 EHLO required before STARTTLS\r\n"
|
420
|
+
else
|
421
|
+
send_data "220 Start TLS negotiation\r\n"
|
422
|
+
start_tls
|
423
|
+
@state << :starttls
|
424
|
+
end
|
425
|
+
else
|
426
|
+
process_unknown
|
427
|
+
end
|
428
|
+
end
|
429
|
+
|
430
|
+
|
431
|
+
#--
|
432
|
+
# Requiring TLS is touchy, cf RFC2784.
|
433
|
+
# Requiring AUTH seems to be much more reasonable.
|
434
|
+
# We don't currently support any notion of deriving an authentication from the TLS
|
435
|
+
# negotiation, although that would certainly be reasonable.
|
436
|
+
# We DON'T allow MAIL FROM to be given twice.
|
437
|
+
# We DON'T enforce all the various rules for validating the sender or
|
438
|
+
# the reverse-path (like whether it should be null), and notifying the reverse
|
439
|
+
# path in case of delivery problems. All of that is left to the calling application.
|
440
|
+
#
|
441
|
+
def process_mail_from sender
|
442
|
+
if (@@parms[:starttls]==:required and !@state.include?(:starttls))
|
443
|
+
send_data "550 This server requires STARTTLS before MAIL FROM\r\n"
|
444
|
+
elsif (@@parms[:auth]==:required and !@state.include?(:auth))
|
445
|
+
send_data "550 This server requires authentication before MAIL FROM\r\n"
|
446
|
+
elsif @state.include?(:mail_from)
|
447
|
+
send_data "503 MAIL already given\r\n"
|
448
|
+
else
|
449
|
+
unless receive_sender sender
|
450
|
+
send_data "550 sender is unacceptable\r\n"
|
451
|
+
else
|
452
|
+
send_data "250 Ok\r\n"
|
453
|
+
@state << :mail_from
|
454
|
+
end
|
455
|
+
end
|
456
|
+
end
|
457
|
+
|
458
|
+
#--
|
459
|
+
# Since we require :mail_from to have been seen before we process RCPT TO,
|
460
|
+
# we don't need to repeat the tests for TLS and AUTH.
|
461
|
+
# Note that we don't remember or do anything else with the recipients.
|
462
|
+
# All of that is on the user code.
|
463
|
+
# TODO: we should enforce user-definable limits on the total number of
|
464
|
+
# recipients per transaction.
|
465
|
+
# We might want to make sure that a given recipient is only seen once, but
|
466
|
+
# for now we'll let that be the user's problem.
|
467
|
+
#
|
468
|
+
# User-written code can return a deferrable from receive_recipient.
|
469
|
+
#
|
470
|
+
def process_rcpt_to rcpt
|
471
|
+
unless @state.include?(:mail_from)
|
472
|
+
send_data "503 MAIL is required before RCPT\r\n"
|
473
|
+
else
|
474
|
+
succeeded = proc {
|
475
|
+
send_data "250 Ok\r\n"
|
476
|
+
@state << :rcpt unless @state.include?(:rcpt)
|
477
|
+
}
|
478
|
+
failed = proc {
|
479
|
+
send_data "550 recipient is unacceptable\r\n"
|
480
|
+
}
|
481
|
+
|
482
|
+
d = receive_recipient rcpt
|
483
|
+
|
484
|
+
if d.respond_to?(:set_deferred_status)
|
485
|
+
d.callback(&succeeded)
|
486
|
+
d.errback(&failed)
|
487
|
+
else
|
488
|
+
(d ? succeeded : failed).call
|
489
|
+
end
|
490
|
+
|
491
|
+
=begin
|
492
|
+
unless receive_recipient rcpt
|
493
|
+
send_data "550 recipient is unacceptable\r\n"
|
494
|
+
else
|
495
|
+
send_data "250 Ok\r\n"
|
496
|
+
@state << :rcpt unless @state.include?(:rcpt)
|
497
|
+
end
|
498
|
+
=end
|
499
|
+
end
|
500
|
+
end
|
501
|
+
|
502
|
+
|
503
|
+
# Send the incoming data to the application one chunk at a time, rather than
|
504
|
+
# one line at a time. That lets the application be a little more flexible about
|
505
|
+
# storing to disk, etc.
|
506
|
+
# Since we clear the chunk array every time we submit it, the caller needs to be
|
507
|
+
# aware to do things like dup it if he wants to keep it around across calls.
|
508
|
+
#
|
509
|
+
# DON'T reset the transaction upon disposition of the incoming message.
|
510
|
+
# This means another DATA command can be accepted with the same sender and recipients.
|
511
|
+
# If the client wants to reset, he can call RSET.
|
512
|
+
# Not sure whether the standard requires a transaction-reset at this point, but it
|
513
|
+
# appears not to.
|
514
|
+
#
|
515
|
+
# User-written code can return a Deferrable as a response from receive_message.
|
516
|
+
#
|
517
|
+
def process_data_line ln
|
518
|
+
if ln == "."
|
519
|
+
if @databuffer.length > 0
|
520
|
+
receive_data_chunk @databuffer
|
521
|
+
@databuffer.clear
|
522
|
+
end
|
523
|
+
|
524
|
+
|
525
|
+
succeeded = proc {
|
526
|
+
send_data "250 Message accepted\r\n"
|
527
|
+
}
|
528
|
+
failed = proc {
|
529
|
+
send_data "550 Message rejected\r\n"
|
530
|
+
}
|
531
|
+
|
532
|
+
d = receive_message
|
533
|
+
|
534
|
+
if d.respond_to?(:set_deferred_status)
|
535
|
+
d.callback(&succeeded)
|
536
|
+
d.errback(&failed)
|
537
|
+
else
|
538
|
+
(d ? succeeded : failed).call
|
539
|
+
end
|
540
|
+
|
541
|
+
@state.delete :data
|
542
|
+
else
|
543
|
+
# slice off leading . if any
|
544
|
+
ln.slice!(0...1) if ln[0] == 46
|
545
|
+
@databuffer << ln
|
546
|
+
if @databuffer.length > @@parms[:chunksize]
|
547
|
+
receive_data_chunk @databuffer
|
548
|
+
@databuffer.clear
|
549
|
+
end
|
550
|
+
end
|
551
|
+
end
|
552
|
+
|
553
|
+
|
554
|
+
#------------------------------------------
|
555
|
+
# Everything from here on can be overridden in user code.
|
556
|
+
|
557
|
+
# The greeting returned in the initial connection message to the client.
|
558
|
+
def get_server_greeting
|
559
|
+
"EventMachine SMTP Server"
|
560
|
+
end
|
561
|
+
# The domain name returned in the first line of the response to a
|
562
|
+
# successful EHLO or HELO command.
|
563
|
+
def get_server_domain
|
564
|
+
"Ok EventMachine SMTP Server"
|
565
|
+
end
|
566
|
+
|
567
|
+
# A false response from this user-overridable method will cause a
|
568
|
+
# 550 error to be returned to the remote client.
|
569
|
+
#
|
570
|
+
def receive_ehlo_domain domain
|
571
|
+
true
|
572
|
+
end
|
573
|
+
|
574
|
+
# Return true or false to indicate that the authentication is acceptable.
|
575
|
+
def receive_plain_auth user, password
|
576
|
+
true
|
577
|
+
end
|
578
|
+
|
579
|
+
# Receives the argument of the MAIL FROM command. Return false to
|
580
|
+
# indicate to the remote client that the sender is not accepted.
|
581
|
+
# This can only be successfully called once per transaction.
|
582
|
+
#
|
583
|
+
def receive_sender sender
|
584
|
+
true
|
585
|
+
end
|
586
|
+
|
587
|
+
# Receives the argument of a RCPT TO command. Can be given multiple
|
588
|
+
# times per transaction. Return false to reject the recipient.
|
589
|
+
#
|
590
|
+
def receive_recipient rcpt
|
591
|
+
true
|
592
|
+
end
|
593
|
+
|
594
|
+
# Sent when the remote peer issues the RSET command.
|
595
|
+
# Since RSET is not allowed to fail (according to the protocol),
|
596
|
+
# we ignore any return value from user overrides of this method.
|
597
|
+
#
|
598
|
+
def receive_reset
|
599
|
+
end
|
600
|
+
|
601
|
+
# Sent when the remote peer has ended the connection.
|
602
|
+
#
|
603
|
+
def connection_ended
|
604
|
+
end
|
605
|
+
|
606
|
+
# Called when the remote peer sends the DATA command.
|
607
|
+
# Returning false will cause us to send a 550 error to the peer.
|
608
|
+
# This can be useful for dealing with problems that arise from processing
|
609
|
+
# the whole set of sender and recipients.
|
610
|
+
#
|
611
|
+
def receive_data_command
|
612
|
+
true
|
613
|
+
end
|
614
|
+
|
615
|
+
# Sent when data from the remote peer is available. The size can be controlled
|
616
|
+
# by setting the :chunksize parameter. This call can be made multiple times.
|
617
|
+
# The goal is to strike a balance between sending the data to the application one
|
618
|
+
# line at a time, and holding all of a very large message in memory.
|
619
|
+
#
|
620
|
+
def receive_data_chunk data
|
621
|
+
@smtps_msg_size ||= 0
|
622
|
+
@smtps_msg_size += data.join.length
|
623
|
+
STDERR.write "<#{@smtps_msg_size}>"
|
624
|
+
end
|
625
|
+
|
626
|
+
# Sent after a message has been completely received. User code
|
627
|
+
# must return true or false to indicate whether the message has
|
628
|
+
# been accepted for delivery.
|
629
|
+
def receive_message
|
630
|
+
@@parms[:verbose] and $>.puts "Received complete message"
|
631
|
+
true
|
632
|
+
end
|
633
|
+
|
634
|
+
# This is called when the protocol state is reset. It happens
|
635
|
+
# when the remote client calls EHLO/HELO or RSET.
|
636
|
+
def receive_transaction
|
637
|
+
end
|
638
|
+
end
|
639
|
+
end
|
640
|
+
end
|