eventmachine 0.12.6-x86-mswin32-60
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +13 -0
- data/Rakefile +254 -0
- data/docs/COPYING +60 -0
- data/docs/ChangeLog +211 -0
- data/docs/DEFERRABLES +138 -0
- data/docs/EPOLL +141 -0
- data/docs/GNU +281 -0
- data/docs/INSTALL +15 -0
- data/docs/KEYBOARD +38 -0
- data/docs/LEGAL +25 -0
- data/docs/LIGHTWEIGHT_CONCURRENCY +72 -0
- data/docs/PURE_RUBY +77 -0
- data/docs/README +74 -0
- data/docs/RELEASE_NOTES +96 -0
- data/docs/SMTP +9 -0
- data/docs/SPAWNED_PROCESSES +93 -0
- data/docs/TODO +10 -0
- data/eventmachine.gemspec +32 -0
- data/ext/binder.cpp +126 -0
- data/ext/binder.h +48 -0
- data/ext/cmain.cpp +586 -0
- data/ext/cplusplus.cpp +193 -0
- data/ext/ed.cpp +1522 -0
- data/ext/ed.h +380 -0
- data/ext/em.cpp +1937 -0
- data/ext/em.h +186 -0
- data/ext/emwin.cpp +300 -0
- data/ext/emwin.h +94 -0
- data/ext/epoll.cpp +26 -0
- data/ext/epoll.h +25 -0
- data/ext/eventmachine.h +98 -0
- data/ext/eventmachine_cpp.h +95 -0
- data/ext/extconf.rb +129 -0
- data/ext/fastfilereader/extconf.rb +77 -0
- data/ext/fastfilereader/mapper.cpp +214 -0
- data/ext/fastfilereader/mapper.h +59 -0
- data/ext/fastfilereader/rubymain.cpp +127 -0
- data/ext/files.cpp +94 -0
- data/ext/files.h +65 -0
- data/ext/kb.cpp +82 -0
- data/ext/page.cpp +107 -0
- data/ext/page.h +51 -0
- data/ext/pipe.cpp +351 -0
- data/ext/project.h +119 -0
- data/ext/rubymain.cpp +847 -0
- data/ext/sigs.cpp +89 -0
- data/ext/sigs.h +32 -0
- data/ext/ssl.cpp +423 -0
- data/ext/ssl.h +90 -0
- data/java/.classpath +8 -0
- data/java/.project +17 -0
- data/java/src/com/rubyeventmachine/Application.java +196 -0
- data/java/src/com/rubyeventmachine/Connection.java +74 -0
- data/java/src/com/rubyeventmachine/ConnectionFactory.java +37 -0
- data/java/src/com/rubyeventmachine/DefaultConnectionFactory.java +46 -0
- data/java/src/com/rubyeventmachine/EmReactor.java +408 -0
- data/java/src/com/rubyeventmachine/EmReactorException.java +40 -0
- data/java/src/com/rubyeventmachine/EventableChannel.java +57 -0
- data/java/src/com/rubyeventmachine/EventableDatagramChannel.java +171 -0
- data/java/src/com/rubyeventmachine/EventableSocketChannel.java +244 -0
- data/java/src/com/rubyeventmachine/PeriodicTimer.java +38 -0
- data/java/src/com/rubyeventmachine/Timer.java +54 -0
- data/java/src/com/rubyeventmachine/tests/ApplicationTest.java +108 -0
- data/java/src/com/rubyeventmachine/tests/ConnectTest.java +124 -0
- data/java/src/com/rubyeventmachine/tests/EMTest.java +80 -0
- data/java/src/com/rubyeventmachine/tests/TestDatagrams.java +53 -0
- data/java/src/com/rubyeventmachine/tests/TestServers.java +74 -0
- data/java/src/com/rubyeventmachine/tests/TestTimers.java +89 -0
- data/lib/em/deferrable.rb +208 -0
- data/lib/em/eventable.rb +39 -0
- data/lib/em/future.rb +62 -0
- data/lib/em/messages.rb +66 -0
- data/lib/em/processes.rb +113 -0
- data/lib/em/spawnable.rb +88 -0
- data/lib/em/streamer.rb +112 -0
- data/lib/eventmachine.rb +1926 -0
- data/lib/eventmachine_version.rb +31 -0
- data/lib/evma.rb +32 -0
- data/lib/evma/callback.rb +32 -0
- data/lib/evma/container.rb +75 -0
- data/lib/evma/factory.rb +77 -0
- data/lib/evma/protocol.rb +87 -0
- data/lib/evma/reactor.rb +48 -0
- data/lib/jeventmachine.rb +137 -0
- data/lib/pr_eventmachine.rb +1011 -0
- data/lib/protocols/buftok.rb +127 -0
- data/lib/protocols/header_and_content.rb +129 -0
- data/lib/protocols/httpcli2.rb +803 -0
- data/lib/protocols/httpclient.rb +270 -0
- data/lib/protocols/line_and_text.rb +126 -0
- data/lib/protocols/linetext2.rb +161 -0
- data/lib/protocols/memcache.rb +293 -0
- data/lib/protocols/postgres.rb +261 -0
- data/lib/protocols/saslauth.rb +179 -0
- data/lib/protocols/smtpclient.rb +308 -0
- data/lib/protocols/smtpserver.rb +556 -0
- data/lib/protocols/stomp.rb +153 -0
- data/lib/protocols/tcptest.rb +57 -0
- data/setup.rb +1585 -0
- data/tasks/cpp.rake +77 -0
- data/tasks/project.rake +78 -0
- data/tasks/tests.rake +193 -0
- data/tests/test_attach.rb +83 -0
- data/tests/test_basic.rb +231 -0
- data/tests/test_connection_count.rb +45 -0
- data/tests/test_defer.rb +47 -0
- data/tests/test_epoll.rb +163 -0
- data/tests/test_error_handler.rb +35 -0
- data/tests/test_errors.rb +82 -0
- data/tests/test_eventables.rb +77 -0
- data/tests/test_exc.rb +58 -0
- data/tests/test_futures.rb +214 -0
- data/tests/test_handler_check.rb +37 -0
- data/tests/test_hc.rb +218 -0
- data/tests/test_httpclient.rb +215 -0
- data/tests/test_httpclient2.rb +155 -0
- data/tests/test_kb.rb +61 -0
- data/tests/test_ltp.rb +188 -0
- data/tests/test_ltp2.rb +320 -0
- data/tests/test_next_tick.rb +109 -0
- data/tests/test_processes.rb +95 -0
- data/tests/test_pure.rb +129 -0
- data/tests/test_running.rb +47 -0
- data/tests/test_sasl.rb +74 -0
- data/tests/test_send_file.rb +243 -0
- data/tests/test_servers.rb +80 -0
- data/tests/test_smtpclient.rb +83 -0
- data/tests/test_smtpserver.rb +93 -0
- data/tests/test_spawn.rb +329 -0
- data/tests/test_ssl_args.rb +68 -0
- data/tests/test_ssl_methods.rb +50 -0
- data/tests/test_timers.rb +148 -0
- data/tests/test_ud.rb +43 -0
- data/tests/testem.rb +31 -0
- data/web/whatis +7 -0
- metadata +207 -0
@@ -0,0 +1,556 @@
|
|
1
|
+
# $Id$
|
2
|
+
#
|
3
|
+
# Author:: Francis Cianfrocca (gmail: blackhedd)
|
4
|
+
# Homepage:: http://rubyeventmachine.com
|
5
|
+
# Date:: 16 July 2006
|
6
|
+
#
|
7
|
+
# See EventMachine and EventMachine::Connection for documentation and
|
8
|
+
# usage examples.
|
9
|
+
#
|
10
|
+
#----------------------------------------------------------------------------
|
11
|
+
#
|
12
|
+
# Copyright (C) 2006-07 by Francis Cianfrocca. All Rights Reserved.
|
13
|
+
# Gmail: blackhedd
|
14
|
+
#
|
15
|
+
# This program is free software; you can redistribute it and/or modify
|
16
|
+
# it under the terms of either: 1) the GNU General Public License
|
17
|
+
# as published by the Free Software Foundation; either version 2 of the
|
18
|
+
# License, or (at your option) any later version; or 2) Ruby's License.
|
19
|
+
#
|
20
|
+
# See the file COPYING for complete licensing information.
|
21
|
+
#
|
22
|
+
#---------------------------------------------------------------------------
|
23
|
+
#
|
24
|
+
#
|
25
|
+
|
26
|
+
|
27
|
+
#require 'base64'
|
28
|
+
|
29
|
+
module EventMachine
|
30
|
+
module Protocols
|
31
|
+
|
32
|
+
|
33
|
+
=begin
|
34
|
+
This is a protocol handler for the server side of SMTP.
|
35
|
+
It's NOT a complete SMTP server obeying all the semantics of servers conforming to
|
36
|
+
RFC2821. Rather, it uses overridable method stubs to communicate protocol states
|
37
|
+
and data to user code. User code is responsible for doing the right things with the
|
38
|
+
data in order to get complete and correct SMTP server behavior.
|
39
|
+
|
40
|
+
Useful paragraphs in RFC-2821:
|
41
|
+
4.3.2: Concise list of command-reply sequences, in essence a text representation
|
42
|
+
of the command state-machine.
|
43
|
+
|
44
|
+
STARTTLS is defined in RFC2487.
|
45
|
+
Observe that there are important rules governing whether a publicly-referenced server
|
46
|
+
(meaning one whose Internet address appears in public MX records) may require the
|
47
|
+
non-optional use of TLS.
|
48
|
+
Non-optional TLS does not apply to EHLO, NOOP, QUIT or STARTTLS.
|
49
|
+
|
50
|
+
=end
|
51
|
+
|
52
|
+
class SmtpServer < EventMachine::Connection
|
53
|
+
include Protocols::LineText2
|
54
|
+
|
55
|
+
HeloRegex = /\AHELO\s*/i
|
56
|
+
EhloRegex = /\AEHLO\s*/i
|
57
|
+
QuitRegex = /\AQUIT/i
|
58
|
+
MailFromRegex = /\AMAIL FROM:\s*/i
|
59
|
+
RcptToRegex = /\ARCPT TO:\s*/i
|
60
|
+
DataRegex = /\ADATA/i
|
61
|
+
NoopRegex = /\ANOOP/i
|
62
|
+
RsetRegex = /\ARSET/i
|
63
|
+
VrfyRegex = /\AVRFY\s+/i
|
64
|
+
ExpnRegex = /\AEXPN\s+/i
|
65
|
+
HelpRegex = /\AHELP/i
|
66
|
+
StarttlsRegex = /\ASTARTTLS/i
|
67
|
+
AuthRegex = /\AAUTH\s+/i
|
68
|
+
|
69
|
+
|
70
|
+
# Class variable containing default parameters that can be overridden
|
71
|
+
# in application code.
|
72
|
+
# Individual objects of this class will make an instance-local copy of
|
73
|
+
# the class variable, so that they can be reconfigured on a per-instance
|
74
|
+
# basis.
|
75
|
+
#
|
76
|
+
# Chunksize is the number of data lines we'll buffer before
|
77
|
+
# sending them to the application. TODO, make this user-configurable.
|
78
|
+
#
|
79
|
+
@@parms = {
|
80
|
+
:chunksize => 4000,
|
81
|
+
:verbose => false
|
82
|
+
}
|
83
|
+
def self.parms= parms={}
|
84
|
+
@@parms.merge!(parms)
|
85
|
+
end
|
86
|
+
|
87
|
+
|
88
|
+
|
89
|
+
def initialize *args
|
90
|
+
super
|
91
|
+
@parms = @@parms
|
92
|
+
init_protocol_state
|
93
|
+
end
|
94
|
+
|
95
|
+
def parms= parms={}
|
96
|
+
@parms.merge!(parms)
|
97
|
+
end
|
98
|
+
|
99
|
+
# In SMTP, the server talks first. But by a (perhaps flawed) axiom in EM,
|
100
|
+
# #post_init will execute BEFORE the block passed to #start_server, for any
|
101
|
+
# given accepted connection. Since in this class we'll probably be getting
|
102
|
+
# a lot of initialization parameters, we want the guts of post_init to
|
103
|
+
# run AFTER the application has initialized the connection object. So we
|
104
|
+
# use a spawn to schedule the post_init to run later.
|
105
|
+
# It's a little weird, I admit. A reasonable alternative would be to set
|
106
|
+
# parameters as a class variable and to do that before accepting any connections.
|
107
|
+
#
|
108
|
+
# OBSOLETE, now we have @@parms. But the spawn is nice to keep as an illustration.
|
109
|
+
#
|
110
|
+
def post_init
|
111
|
+
#send_data "220 #{get_server_greeting}\r\n" (ORIGINAL)
|
112
|
+
#(EM.spawn {|x| x.send_data "220 #{x.get_server_greeting}\r\n"}).notify(self)
|
113
|
+
(EM.spawn {|x| x.send_server_greeting}).notify(self)
|
114
|
+
end
|
115
|
+
|
116
|
+
def send_server_greeting
|
117
|
+
send_data "220 #{get_server_greeting}\r\n"
|
118
|
+
end
|
119
|
+
|
120
|
+
def receive_line ln
|
121
|
+
@@parms[:verbose] and $>.puts ">>> #{ln}"
|
122
|
+
|
123
|
+
return process_data_line(ln) if @state.include?(:data)
|
124
|
+
|
125
|
+
case ln
|
126
|
+
when EhloRegex
|
127
|
+
process_ehlo $'.dup
|
128
|
+
when HeloRegex
|
129
|
+
process_helo $'.dup
|
130
|
+
when MailFromRegex
|
131
|
+
process_mail_from $'.dup
|
132
|
+
when RcptToRegex
|
133
|
+
process_rcpt_to $'.dup
|
134
|
+
when DataRegex
|
135
|
+
process_data
|
136
|
+
when RsetRegex
|
137
|
+
process_rset
|
138
|
+
when VrfyRegex
|
139
|
+
process_vrfy
|
140
|
+
when ExpnRegex
|
141
|
+
process_expn
|
142
|
+
when HelpRegex
|
143
|
+
process_help
|
144
|
+
when NoopRegex
|
145
|
+
process_noop
|
146
|
+
when QuitRegex
|
147
|
+
process_quit
|
148
|
+
when StarttlsRegex
|
149
|
+
process_starttls
|
150
|
+
when AuthRegex
|
151
|
+
process_auth $'.dup
|
152
|
+
else
|
153
|
+
process_unknown
|
154
|
+
end
|
155
|
+
end
|
156
|
+
|
157
|
+
# TODO - implement this properly, the implementation is a stub!
|
158
|
+
def process_vrfy
|
159
|
+
send_data "250 Ok, but unimplemented\r\n"
|
160
|
+
end
|
161
|
+
# TODO - implement this properly, the implementation is a stub!
|
162
|
+
def process_help
|
163
|
+
send_data "250 Ok, but unimplemented\r\n"
|
164
|
+
end
|
165
|
+
# TODO - implement this properly, the implementation is a stub!
|
166
|
+
def process_expn
|
167
|
+
send_data "250 Ok, but unimplemented\r\n"
|
168
|
+
end
|
169
|
+
|
170
|
+
#--
|
171
|
+
# This is called at several points to restore the protocol state
|
172
|
+
# to a pre-transaction state. In essence, we "forget" having seen
|
173
|
+
# any valid command except EHLO and STARTTLS.
|
174
|
+
# We also have to callback user code, in case they're keeping track
|
175
|
+
# of senders, recipients, and whatnot.
|
176
|
+
#
|
177
|
+
# We try to follow the convention of avoiding the verb "receive" for
|
178
|
+
# internal method names except receive_line (which we inherit), and
|
179
|
+
# using only receive_xxx for user-overridable stubs.
|
180
|
+
#
|
181
|
+
# init_protocol_state is called when we initialize the connection as
|
182
|
+
# well as during reset_protocol_state. It does NOT call the user
|
183
|
+
# override method. This enables us to promise the users that they
|
184
|
+
# won't see the overridable fire except after EHLO and RSET, and
|
185
|
+
# after a message has been received. Although the latter may be wrong.
|
186
|
+
# The standard may allow multiple DATA segments with the same set of
|
187
|
+
# senders and recipients.
|
188
|
+
#
|
189
|
+
def reset_protocol_state
|
190
|
+
init_protocol_state
|
191
|
+
s,@state = @state,[]
|
192
|
+
@state << :starttls if s.include?(:starttls)
|
193
|
+
@state << :ehlo if s.include?(:ehlo)
|
194
|
+
receive_transaction
|
195
|
+
end
|
196
|
+
def init_protocol_state
|
197
|
+
@state ||= []
|
198
|
+
end
|
199
|
+
|
200
|
+
|
201
|
+
#--
|
202
|
+
# EHLO/HELO is always legal, per the standard. On success
|
203
|
+
# it always clears buffers and initiates a mail "transaction."
|
204
|
+
# Which means that a MAIL FROM must follow.
|
205
|
+
#
|
206
|
+
# Per the standard, an EHLO/HELO or a RSET "initiates" an email
|
207
|
+
# transaction. Thereafter, MAIL FROM must be received before
|
208
|
+
# RCPT TO, before DATA. Not sure what this specific ordering
|
209
|
+
# achieves semantically, but it does make it easier to
|
210
|
+
# implement. We also support user-specified requirements for
|
211
|
+
# STARTTLS and AUTH. We make it impossible to proceed to MAIL FROM
|
212
|
+
# without fulfilling tls and/or auth, if the user specified either
|
213
|
+
# or both as required. We need to check the extension standard
|
214
|
+
# for auth to see if a credential is discarded after a RSET along
|
215
|
+
# with all the rest of the state. We'll behave as if it is.
|
216
|
+
# Now clearly, we can't discard tls after its been negotiated
|
217
|
+
# without dropping the connection, so that flag doesn't get cleared.
|
218
|
+
#
|
219
|
+
def process_ehlo domain
|
220
|
+
if receive_ehlo_domain domain
|
221
|
+
send_data "250-#{get_server_domain}\r\n"
|
222
|
+
if @@parms[:starttls]
|
223
|
+
send_data "250-STARTTLS\r\n"
|
224
|
+
end
|
225
|
+
if @@parms[:auth]
|
226
|
+
send_data "250-AUTH PLAIN LOGIN\r\n"
|
227
|
+
end
|
228
|
+
send_data "250-NO-SOLICITING\r\n"
|
229
|
+
# TODO, size needs to be configurable.
|
230
|
+
send_data "250 SIZE 20000000\r\n"
|
231
|
+
reset_protocol_state
|
232
|
+
@state << :ehlo
|
233
|
+
else
|
234
|
+
send_data "550 Requested action not taken\r\n"
|
235
|
+
end
|
236
|
+
end
|
237
|
+
|
238
|
+
def process_helo domain
|
239
|
+
if receive_ehlo_domain domain.dup
|
240
|
+
send_data "250 #{get_server_domain}\r\n"
|
241
|
+
reset_protocol_state
|
242
|
+
@state << :ehlo
|
243
|
+
else
|
244
|
+
send_data "550 Requested action not taken\r\n"
|
245
|
+
end
|
246
|
+
end
|
247
|
+
|
248
|
+
def process_quit
|
249
|
+
send_data "221 Ok\r\n"
|
250
|
+
close_connection_after_writing
|
251
|
+
end
|
252
|
+
|
253
|
+
def process_noop
|
254
|
+
send_data "250 Ok\r\n"
|
255
|
+
end
|
256
|
+
|
257
|
+
def process_unknown
|
258
|
+
send_data "500 Unknown command\r\n"
|
259
|
+
end
|
260
|
+
|
261
|
+
#--
|
262
|
+
# So far, only AUTH PLAIN is supported but we should do at least LOGIN as well.
|
263
|
+
# TODO, support clients that send AUTH PLAIN with no parameter, expecting a 3xx
|
264
|
+
# response and a continuation of the auth conversation.
|
265
|
+
#
|
266
|
+
def process_auth str
|
267
|
+
if @state.include?(:auth)
|
268
|
+
send_data "503 auth already issued\r\n"
|
269
|
+
elsif str =~ /\APLAIN\s+/i
|
270
|
+
plain = ($'.dup).unpack("m").first # Base64::decode64($'.dup)
|
271
|
+
discard,user,psw = plain.split("\000")
|
272
|
+
if receive_plain_auth user,psw
|
273
|
+
send_data "235 authentication ok\r\n"
|
274
|
+
@state << :auth
|
275
|
+
else
|
276
|
+
send_data "535 invalid authentication\r\n"
|
277
|
+
end
|
278
|
+
#elsif str =~ /\ALOGIN\s+/i
|
279
|
+
else
|
280
|
+
send_data "504 auth mechanism not available\r\n"
|
281
|
+
end
|
282
|
+
end
|
283
|
+
|
284
|
+
#--
|
285
|
+
# Unusually, we can deal with a Deferrable returned from the user application.
|
286
|
+
# This was added to deal with a special case in a particular application, but
|
287
|
+
# it would be a nice idea to add it to the other user-code callbacks.
|
288
|
+
#
|
289
|
+
def process_data
|
290
|
+
unless @state.include?(:rcpt)
|
291
|
+
send_data "503 Operation sequence error\r\n"
|
292
|
+
else
|
293
|
+
succeeded = proc {
|
294
|
+
send_data "354 Send it\r\n"
|
295
|
+
@state << :data
|
296
|
+
@databuffer = []
|
297
|
+
}
|
298
|
+
failed = proc {
|
299
|
+
send_data "550 Operation failed\r\n"
|
300
|
+
}
|
301
|
+
|
302
|
+
d = receive_data_command
|
303
|
+
|
304
|
+
if d.respond_to?(:callback)
|
305
|
+
d.callback(&succeeded)
|
306
|
+
d.errback(&failed)
|
307
|
+
else
|
308
|
+
(d ? succeeded : failed).call
|
309
|
+
end
|
310
|
+
end
|
311
|
+
end
|
312
|
+
|
313
|
+
def process_rset
|
314
|
+
reset_protocol_state
|
315
|
+
receive_reset
|
316
|
+
send_data "250 Ok\r\n"
|
317
|
+
end
|
318
|
+
|
319
|
+
def unbind
|
320
|
+
connection_ended
|
321
|
+
end
|
322
|
+
|
323
|
+
#--
|
324
|
+
# STARTTLS may not be issued before EHLO, or unless the user has chosen
|
325
|
+
# to support it.
|
326
|
+
# TODO, must support user-supplied certificates.
|
327
|
+
#
|
328
|
+
def process_starttls
|
329
|
+
if @@parms[:starttls]
|
330
|
+
if @state.include?(:starttls)
|
331
|
+
send_data "503 TLS Already negotiated\r\n"
|
332
|
+
elsif ! @state.include?(:ehlo)
|
333
|
+
send_data "503 EHLO required before STARTTLS\r\n"
|
334
|
+
else
|
335
|
+
send_data "220 Start TLS negotiation\r\n"
|
336
|
+
start_tls
|
337
|
+
@state << :starttls
|
338
|
+
end
|
339
|
+
else
|
340
|
+
process_unknown
|
341
|
+
end
|
342
|
+
end
|
343
|
+
|
344
|
+
|
345
|
+
#--
|
346
|
+
# Requiring TLS is touchy, cf RFC2784.
|
347
|
+
# Requiring AUTH seems to be much more reasonable.
|
348
|
+
# We don't currently support any notion of deriving an authentication from the TLS
|
349
|
+
# negotiation, although that would certainly be reasonable.
|
350
|
+
# We DON'T allow MAIL FROM to be given twice.
|
351
|
+
# We DON'T enforce all the various rules for validating the sender or
|
352
|
+
# the reverse-path (like whether it should be null), and notifying the reverse
|
353
|
+
# path in case of delivery problems. All of that is left to the calling application.
|
354
|
+
#
|
355
|
+
def process_mail_from sender
|
356
|
+
if (@@parms[:starttls]==:required and !@state.include?(:starttls))
|
357
|
+
send_data "550 This server requires STARTTLS before MAIL FROM\r\n"
|
358
|
+
elsif (@@parms[:auth]==:required and !@state.include?(:auth))
|
359
|
+
send_data "550 This server requires authentication before MAIL FROM\r\n"
|
360
|
+
elsif @state.include?(:mail_from)
|
361
|
+
send_data "503 MAIL already given\r\n"
|
362
|
+
else
|
363
|
+
unless receive_sender sender
|
364
|
+
send_data "550 sender is unacceptable\r\n"
|
365
|
+
else
|
366
|
+
send_data "250 Ok\r\n"
|
367
|
+
@state << :mail_from
|
368
|
+
end
|
369
|
+
end
|
370
|
+
end
|
371
|
+
|
372
|
+
#--
|
373
|
+
# Since we require :mail_from to have been seen before we process RCPT TO,
|
374
|
+
# we don't need to repeat the tests for TLS and AUTH.
|
375
|
+
# Note that we don't remember or do anything else with the recipients.
|
376
|
+
# All of that is on the user code.
|
377
|
+
# TODO: we should enforce user-definable limits on the total number of
|
378
|
+
# recipients per transaction.
|
379
|
+
# We might want to make sure that a given recipient is only seen once, but
|
380
|
+
# for now we'll let that be the user's problem.
|
381
|
+
#
|
382
|
+
# User-written code can return a deferrable from receive_recipient.
|
383
|
+
#
|
384
|
+
def process_rcpt_to rcpt
|
385
|
+
unless @state.include?(:mail_from)
|
386
|
+
send_data "503 MAIL is required before RCPT\r\n"
|
387
|
+
else
|
388
|
+
succeeded = proc {
|
389
|
+
send_data "250 Ok\r\n"
|
390
|
+
@state << :rcpt unless @state.include?(:rcpt)
|
391
|
+
}
|
392
|
+
failed = proc {
|
393
|
+
send_data "550 recipient is unacceptable\r\n"
|
394
|
+
}
|
395
|
+
|
396
|
+
d = receive_recipient rcpt
|
397
|
+
|
398
|
+
if d.respond_to?(:set_deferred_status)
|
399
|
+
d.callback(&succeeded)
|
400
|
+
d.errback(&failed)
|
401
|
+
else
|
402
|
+
(d ? succeeded : failed).call
|
403
|
+
end
|
404
|
+
|
405
|
+
=begin
|
406
|
+
unless receive_recipient rcpt
|
407
|
+
send_data "550 recipient is unacceptable\r\n"
|
408
|
+
else
|
409
|
+
send_data "250 Ok\r\n"
|
410
|
+
@state << :rcpt unless @state.include?(:rcpt)
|
411
|
+
end
|
412
|
+
=end
|
413
|
+
end
|
414
|
+
end
|
415
|
+
|
416
|
+
|
417
|
+
# Send the incoming data to the application one chunk at a time, rather than
|
418
|
+
# one line at a time. That lets the application be a little more flexible about
|
419
|
+
# storing to disk, etc.
|
420
|
+
# Since we clear the chunk array every time we submit it, the caller needs to be
|
421
|
+
# aware to do things like dup it if he wants to keep it around across calls.
|
422
|
+
#
|
423
|
+
# DON'T reset the transaction upon disposition of the incoming message.
|
424
|
+
# This means another DATA command can be accepted with the same sender and recipients.
|
425
|
+
# If the client wants to reset, he can call RSET.
|
426
|
+
# Not sure whether the standard requires a transaction-reset at this point, but it
|
427
|
+
# appears not to.
|
428
|
+
#
|
429
|
+
# User-written code can return a Deferrable as a response from receive_message.
|
430
|
+
#
|
431
|
+
def process_data_line ln
|
432
|
+
if ln == "."
|
433
|
+
if @databuffer.length > 0
|
434
|
+
receive_data_chunk @databuffer
|
435
|
+
@databuffer.clear
|
436
|
+
end
|
437
|
+
|
438
|
+
|
439
|
+
succeeded = proc {
|
440
|
+
send_data "250 Message accepted\r\n"
|
441
|
+
}
|
442
|
+
failed = proc {
|
443
|
+
send_data "550 Message rejected\r\n"
|
444
|
+
}
|
445
|
+
|
446
|
+
d = receive_message
|
447
|
+
|
448
|
+
if d.respond_to?(:set_deferred_status)
|
449
|
+
d.callback(&succeeded)
|
450
|
+
d.errback(&failed)
|
451
|
+
else
|
452
|
+
(d ? succeeded : failed).call
|
453
|
+
end
|
454
|
+
|
455
|
+
@state.delete :data
|
456
|
+
else
|
457
|
+
# slice off leading . if any
|
458
|
+
ln.slice!(0...1) if ln[0] == 46
|
459
|
+
@databuffer << ln
|
460
|
+
if @databuffer.length > @@parms[:chunksize]
|
461
|
+
receive_data_chunk @databuffer
|
462
|
+
@databuffer.clear
|
463
|
+
end
|
464
|
+
end
|
465
|
+
end
|
466
|
+
|
467
|
+
|
468
|
+
#------------------------------------------
|
469
|
+
# Everything from here on can be overridden in user code.
|
470
|
+
|
471
|
+
# The greeting returned in the initial connection message to the client.
|
472
|
+
def get_server_greeting
|
473
|
+
"EventMachine SMTP Server"
|
474
|
+
end
|
475
|
+
# The domain name returned in the first line of the response to a
|
476
|
+
# successful EHLO or HELO command.
|
477
|
+
def get_server_domain
|
478
|
+
"Ok EventMachine SMTP Server"
|
479
|
+
end
|
480
|
+
|
481
|
+
# A false response from this user-overridable method will cause a
|
482
|
+
# 550 error to be returned to the remote client.
|
483
|
+
#
|
484
|
+
def receive_ehlo_domain domain
|
485
|
+
true
|
486
|
+
end
|
487
|
+
|
488
|
+
# Return true or false to indicate that the authentication is acceptable.
|
489
|
+
def receive_plain_auth user, password
|
490
|
+
true
|
491
|
+
end
|
492
|
+
|
493
|
+
# Receives the argument of the MAIL FROM command. Return false to
|
494
|
+
# indicate to the remote client that the sender is not accepted.
|
495
|
+
# This can only be successfully called once per transaction.
|
496
|
+
#
|
497
|
+
def receive_sender sender
|
498
|
+
true
|
499
|
+
end
|
500
|
+
|
501
|
+
# Receives the argument of a RCPT TO command. Can be given multiple
|
502
|
+
# times per transaction. Return false to reject the recipient.
|
503
|
+
#
|
504
|
+
def receive_recipient rcpt
|
505
|
+
true
|
506
|
+
end
|
507
|
+
|
508
|
+
# Sent when the remote peer issues the RSET command.
|
509
|
+
# Since RSET is not allowed to fail (according to the protocol),
|
510
|
+
# we ignore any return value from user overrides of this method.
|
511
|
+
#
|
512
|
+
def receive_reset
|
513
|
+
end
|
514
|
+
|
515
|
+
# Sent when the remote peer has ended the connection.
|
516
|
+
#
|
517
|
+
def connection_ended
|
518
|
+
end
|
519
|
+
|
520
|
+
# Called when the remote peer sends the DATA command.
|
521
|
+
# Returning false will cause us to send a 550 error to the peer.
|
522
|
+
# This can be useful for dealing with problems that arise from processing
|
523
|
+
# the whole set of sender and recipients.
|
524
|
+
#
|
525
|
+
def receive_data_command
|
526
|
+
true
|
527
|
+
end
|
528
|
+
|
529
|
+
# Sent when data from the remote peer is available. The size can be controlled
|
530
|
+
# by setting the :chunksize parameter. This call can be made multiple times.
|
531
|
+
# The goal is to strike a balance between sending the data to the application one
|
532
|
+
# line at a time, and holding all of a very large message in memory.
|
533
|
+
#
|
534
|
+
def receive_data_chunk data
|
535
|
+
@smtps_msg_size ||= 0
|
536
|
+
@smtps_msg_size += data.join.length
|
537
|
+
STDERR.write "<#{@smtps_msg_size}>"
|
538
|
+
end
|
539
|
+
|
540
|
+
# Sent after a message has been completely received. User code
|
541
|
+
# must return true or false to indicate whether the message has
|
542
|
+
# been accepted for delivery.
|
543
|
+
def receive_message
|
544
|
+
@@parms[:verbose] and $>.puts "Received complete message"
|
545
|
+
true
|
546
|
+
end
|
547
|
+
|
548
|
+
# This is called when the protocol state is reset. It happens
|
549
|
+
# when the remote client calls EHLO/HELO or RSET.
|
550
|
+
def receive_transaction
|
551
|
+
end
|
552
|
+
end
|
553
|
+
end
|
554
|
+
end
|
555
|
+
|
556
|
+
|