larch 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
data/LICENSE ADDED
@@ -0,0 +1,280 @@
1
+ GNU GENERAL PUBLIC LICENSE
2
+ Version 2, June 1991
3
+
4
+ Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
5
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
6
+ Everyone is permitted to copy and distribute verbatim copies
7
+ of this license document, but changing it is not allowed.
8
+
9
+ Preamble
10
+
11
+ The licenses for most software are designed to take away your
12
+ freedom to share and change it. By contrast, the GNU General Public
13
+ License is intended to guarantee your freedom to share and change free
14
+ software--to make sure the software is free for all its users. This
15
+ General Public License applies to most of the Free Software
16
+ Foundation's software and to any other program whose authors commit to
17
+ using it. (Some other Free Software Foundation software is covered by
18
+ the GNU Lesser General Public License instead.) You can apply it to
19
+ your programs, too.
20
+
21
+ When we speak of free software, we are referring to freedom, not
22
+ price. Our General Public Licenses are designed to make sure that you
23
+ have the freedom to distribute copies of free software (and charge for
24
+ this service if you wish), that you receive source code or can get it
25
+ if you want it, that you can change the software or use pieces of it
26
+ in new free programs; and that you know you can do these things.
27
+
28
+ To protect your rights, we need to make restrictions that forbid
29
+ anyone to deny you these rights or to ask you to surrender the rights.
30
+ These restrictions translate to certain responsibilities for you if you
31
+ distribute copies of the software, or if you modify it.
32
+
33
+ For example, if you distribute copies of such a program, whether
34
+ gratis or for a fee, you must give the recipients all the rights that
35
+ you have. You must make sure that they, too, receive or can get the
36
+ source code. And you must show them these terms so they know their
37
+ rights.
38
+
39
+ We protect your rights with two steps: (1) copyright the software, and
40
+ (2) offer you this license which gives you legal permission to copy,
41
+ distribute and/or modify the software.
42
+
43
+ Also, for each author's protection and ours, we want to make certain
44
+ that everyone understands that there is no warranty for this free
45
+ software. If the software is modified by someone else and passed on, we
46
+ want its recipients to know that what they have is not the original, so
47
+ that any problems introduced by others will not reflect on the original
48
+ authors' reputations.
49
+
50
+ Finally, any free program is threatened constantly by software
51
+ patents. We wish to avoid the danger that redistributors of a free
52
+ program will individually obtain patent licenses, in effect making the
53
+ program proprietary. To prevent this, we have made it clear that any
54
+ patent must be licensed for everyone's free use or not licensed at all.
55
+
56
+ The precise terms and conditions for copying, distribution and
57
+ modification follow.
58
+
59
+ GNU GENERAL PUBLIC LICENSE
60
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
61
+
62
+ 0. This License applies to any program or other work which contains
63
+ a notice placed by the copyright holder saying it may be distributed
64
+ under the terms of this General Public License. The "Program", below,
65
+ refers to any such program or work, and a "work based on the Program"
66
+ means either the Program or any derivative work under copyright law:
67
+ that is to say, a work containing the Program or a portion of it,
68
+ either verbatim or with modifications and/or translated into another
69
+ language. (Hereinafter, translation is included without limitation in
70
+ the term "modification".) Each licensee is addressed as "you".
71
+
72
+ Activities other than copying, distribution and modification are not
73
+ covered by this License; they are outside its scope. The act of
74
+ running the Program is not restricted, and the output from the Program
75
+ is covered only if its contents constitute a work based on the
76
+ Program (independent of having been made by running the Program).
77
+ Whether that is true depends on what the Program does.
78
+
79
+ 1. You may copy and distribute verbatim copies of the Program's
80
+ source code as you receive it, in any medium, provided that you
81
+ conspicuously and appropriately publish on each copy an appropriate
82
+ copyright notice and disclaimer of warranty; keep intact all the
83
+ notices that refer to this License and to the absence of any warranty;
84
+ and give any other recipients of the Program a copy of this License
85
+ along with the Program.
86
+
87
+ You may charge a fee for the physical act of transferring a copy, and
88
+ you may at your option offer warranty protection in exchange for a fee.
89
+
90
+ 2. You may modify your copy or copies of the Program or any portion
91
+ of it, thus forming a work based on the Program, and copy and
92
+ distribute such modifications or work under the terms of Section 1
93
+ above, provided that you also meet all of these conditions:
94
+
95
+ a) You must cause the modified files to carry prominent notices
96
+ stating that you changed the files and the date of any change.
97
+
98
+ b) You must cause any work that you distribute or publish, that in
99
+ whole or in part contains or is derived from the Program or any
100
+ part thereof, to be licensed as a whole at no charge to all third
101
+ parties under the terms of this License.
102
+
103
+ c) If the modified program normally reads commands interactively
104
+ when run, you must cause it, when started running for such
105
+ interactive use in the most ordinary way, to print or display an
106
+ announcement including an appropriate copyright notice and a
107
+ notice that there is no warranty (or else, saying that you provide
108
+ a warranty) and that users may redistribute the program under
109
+ these conditions, and telling the user how to view a copy of this
110
+ License. (Exception: if the Program itself is interactive but
111
+ does not normally print such an announcement, your work based on
112
+ the Program is not required to print an announcement.)
113
+
114
+ These requirements apply to the modified work as a whole. If
115
+ identifiable sections of that work are not derived from the Program,
116
+ and can be reasonably considered independent and separate works in
117
+ themselves, then this License, and its terms, do not apply to those
118
+ sections when you distribute them as separate works. But when you
119
+ distribute the same sections as part of a whole which is a work based
120
+ on the Program, the distribution of the whole must be on the terms of
121
+ this License, whose permissions for other licensees extend to the
122
+ entire whole, and thus to each and every part regardless of who wrote it.
123
+
124
+ Thus, it is not the intent of this section to claim rights or contest
125
+ your rights to work written entirely by you; rather, the intent is to
126
+ exercise the right to control the distribution of derivative or
127
+ collective works based on the Program.
128
+
129
+ In addition, mere aggregation of another work not based on the Program
130
+ with the Program (or with a work based on the Program) on a volume of
131
+ a storage or distribution medium does not bring the other work under
132
+ the scope of this License.
133
+
134
+ 3. You may copy and distribute the Program (or a work based on it,
135
+ under Section 2) in object code or executable form under the terms of
136
+ Sections 1 and 2 above provided that you also do one of the following:
137
+
138
+ a) Accompany it with the complete corresponding machine-readable
139
+ source code, which must be distributed under the terms of Sections
140
+ 1 and 2 above on a medium customarily used for software interchange; or,
141
+
142
+ b) Accompany it with a written offer, valid for at least three
143
+ years, to give any third party, for a charge no more than your
144
+ cost of physically performing source distribution, a complete
145
+ machine-readable copy of the corresponding source code, to be
146
+ distributed under the terms of Sections 1 and 2 above on a medium
147
+ customarily used for software interchange; or,
148
+
149
+ c) Accompany it with the information you received as to the offer
150
+ to distribute corresponding source code. (This alternative is
151
+ allowed only for noncommercial distribution and only if you
152
+ received the program in object code or executable form with such
153
+ an offer, in accord with Subsection b above.)
154
+
155
+ The source code for a work means the preferred form of the work for
156
+ making modifications to it. For an executable work, complete source
157
+ code means all the source code for all modules it contains, plus any
158
+ associated interface definition files, plus the scripts used to
159
+ control compilation and installation of the executable. However, as a
160
+ special exception, the source code distributed need not include
161
+ anything that is normally distributed (in either source or binary
162
+ form) with the major components (compiler, kernel, and so on) of the
163
+ operating system on which the executable runs, unless that component
164
+ itself accompanies the executable.
165
+
166
+ If distribution of executable or object code is made by offering
167
+ access to copy from a designated place, then offering equivalent
168
+ access to copy the source code from the same place counts as
169
+ distribution of the source code, even though third parties are not
170
+ compelled to copy the source along with the object code.
171
+
172
+ 4. You may not copy, modify, sublicense, or distribute the Program
173
+ except as expressly provided under this License. Any attempt
174
+ otherwise to copy, modify, sublicense or distribute the Program is
175
+ void, and will automatically terminate your rights under this License.
176
+ However, parties who have received copies, or rights, from you under
177
+ this License will not have their licenses terminated so long as such
178
+ parties remain in full compliance.
179
+
180
+ 5. You are not required to accept this License, since you have not
181
+ signed it. However, nothing else grants you permission to modify or
182
+ distribute the Program or its derivative works. These actions are
183
+ prohibited by law if you do not accept this License. Therefore, by
184
+ modifying or distributing the Program (or any work based on the
185
+ Program), you indicate your acceptance of this License to do so, and
186
+ all its terms and conditions for copying, distributing or modifying
187
+ the Program or works based on it.
188
+
189
+ 6. Each time you redistribute the Program (or any work based on the
190
+ Program), the recipient automatically receives a license from the
191
+ original licensor to copy, distribute or modify the Program subject to
192
+ these terms and conditions. You may not impose any further
193
+ restrictions on the recipients' exercise of the rights granted herein.
194
+ You are not responsible for enforcing compliance by third parties to
195
+ this License.
196
+
197
+ 7. If, as a consequence of a court judgment or allegation of patent
198
+ infringement or for any other reason (not limited to patent issues),
199
+ conditions are imposed on you (whether by court order, agreement or
200
+ otherwise) that contradict the conditions of this License, they do not
201
+ excuse you from the conditions of this License. If you cannot
202
+ distribute so as to satisfy simultaneously your obligations under this
203
+ License and any other pertinent obligations, then as a consequence you
204
+ may not distribute the Program at all. For example, if a patent
205
+ license would not permit royalty-free redistribution of the Program by
206
+ all those who receive copies directly or indirectly through you, then
207
+ the only way you could satisfy both it and this License would be to
208
+ refrain entirely from distribution of the Program.
209
+
210
+ If any portion of this section is held invalid or unenforceable under
211
+ any particular circumstance, the balance of the section is intended to
212
+ apply and the section as a whole is intended to apply in other
213
+ circumstances.
214
+
215
+ It is not the purpose of this section to induce you to infringe any
216
+ patents or other property right claims or to contest validity of any
217
+ such claims; this section has the sole purpose of protecting the
218
+ integrity of the free software distribution system, which is
219
+ implemented by public license practices. Many people have made
220
+ generous contributions to the wide range of software distributed
221
+ through that system in reliance on consistent application of that
222
+ system; it is up to the author/donor to decide if he or she is willing
223
+ to distribute software through any other system and a licensee cannot
224
+ impose that choice.
225
+
226
+ This section is intended to make thoroughly clear what is believed to
227
+ be a consequence of the rest of this License.
228
+
229
+ 8. If the distribution and/or use of the Program is restricted in
230
+ certain countries either by patents or by copyrighted interfaces, the
231
+ original copyright holder who places the Program under this License
232
+ may add an explicit geographical distribution limitation excluding
233
+ those countries, so that distribution is permitted only in or among
234
+ countries not thus excluded. In such case, this License incorporates
235
+ the limitation as if written in the body of this License.
236
+
237
+ 9. The Free Software Foundation may publish revised and/or new versions
238
+ of the General Public License from time to time. Such new versions will
239
+ be similar in spirit to the present version, but may differ in detail to
240
+ address new problems or concerns.
241
+
242
+ Each version is given a distinguishing version number. If the Program
243
+ specifies a version number of this License which applies to it and "any
244
+ later version", you have the option of following the terms and conditions
245
+ either of that version or of any later version published by the Free
246
+ Software Foundation. If the Program does not specify a version number of
247
+ this License, you may choose any version ever published by the Free Software
248
+ Foundation.
249
+
250
+ 10. If you wish to incorporate parts of the Program into other free
251
+ programs whose distribution conditions are different, write to the author
252
+ to ask for permission. For software which is copyrighted by the Free
253
+ Software Foundation, write to the Free Software Foundation; we sometimes
254
+ make exceptions for this. Our decision will be guided by the two goals
255
+ of preserving the free status of all derivatives of our free software and
256
+ of promoting the sharing and reuse of software generally.
257
+
258
+ NO WARRANTY
259
+
260
+ 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
261
+ FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
262
+ OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
263
+ PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
264
+ OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
265
+ MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
266
+ TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
267
+ PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
268
+ REPAIR OR CORRECTION.
269
+
270
+ 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
271
+ WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
272
+ REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
273
+ INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
274
+ OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
275
+ TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
276
+ YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
277
+ PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
278
+ POSSIBILITY OF SUCH DAMAGES.
279
+
280
+ END OF TERMS AND CONDITIONS
@@ -0,0 +1,91 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require 'rubygems'
4
+ require 'highline/import' # optional dep: termios
5
+ require 'trollop'
6
+
7
+ require 'larch'
8
+
9
+ module Larch
10
+
11
+ # Parse command-line options.
12
+ options = Trollop.options do
13
+ version "Larch #{APP_VERSION}\n" << APP_COPYRIGHT
14
+ banner <<EOS
15
+ Larch syncs messages from one IMAP server to another. Awesomely.
16
+
17
+ Usage:
18
+ larch --from <uri> --to <uri> [options]
19
+
20
+ Required:
21
+ EOS
22
+ opt :from, "URI of the source IMAP server.", :short => '-f', :type => :string, :required => true
23
+ opt :to, "URI of the destination IMAP server.", :short => '-t', :type => :string, :required => true
24
+
25
+ text "\nOptions:"
26
+
27
+ # opt :dry_run, "Don't actually do anything.", :short => '-n'
28
+ opt :fast_scan, "Use a faster (but less accurate) method to scan mailboxes. This may result in messages being re-copied.", :short => :none
29
+ opt :from_folder, "Source folder to copy from", :short => :none, :default => 'INBOX'
30
+ opt :from_pass, "Source server password (Default: prompt)", :short => :none, :type => :string
31
+ opt :from_user, "Source server username (Default: prompt)", :short => :none, :type => :string
32
+ opt :max_retries, "Maximum number of times to retry after a recoverable error", :short => :none, :default => 3
33
+ opt :no_create_folder, "Don't create destination folders that don't already exist", :short => :none
34
+ opt :to_folder, "Destination folder to copy to", :short => :none, :default => 'INBOX'
35
+ opt :to_pass, "Destination server password (Default: prompt)", :short => :none, :type => :string
36
+ opt :to_user, "Destination server username (Default: prompt)", :short => :none, :type => :string
37
+ opt :verbosity, "Output verbosity: debug, info, warn, error, or fatal", :short => '-V', :default => 'info'
38
+ end
39
+
40
+ # Validate command-line options.
41
+ [:from, :to].each do |sym|
42
+ unless options[sym] =~ IMAP::REGEX_URI
43
+ Trollop.die sym, "must be a valid IMAP URI (e.g. imap://example.com)"
44
+ end
45
+ end
46
+
47
+ unless Logger::LEVELS.has_key?(options[:verbosity].to_sym)
48
+ Trollop.die :verbosity, "must be one of: #{Logger::LEVELS.keys.join(', ')}"
49
+ end
50
+
51
+ # Create URIs.
52
+ options[:from] = URI(options[:from])
53
+ options[:to] = URI(options[:to])
54
+ options[:from].path = '/' + CGI.escape(options[:from_folder].gsub(/^\//, ''))
55
+ options[:to].path = '/' + CGI.escape(options[:to_folder].gsub(/^\//, ''))
56
+
57
+ # Prompt for usernames and passwords if necessary.
58
+ unless options[:from_user]
59
+ options[:from_user] = ask("Source username (#{options[:from].host}): ")
60
+ end
61
+
62
+ unless options[:from_pass]
63
+ options[:from_pass] = ask("Source password (#{options[:from].host}): ") {|q| q.echo = false }
64
+ end
65
+
66
+ unless options[:to_user]
67
+ options[:to_user] = ask("Destination username (#{options[:to].host}): ")
68
+ end
69
+
70
+ unless options[:to_pass]
71
+ options[:to_pass] = ask("Destination password (#{options[:to].host}): ") {|q| q.echo = false }
72
+ end
73
+
74
+ # Go go go!
75
+ init(options[:verbosity])
76
+
77
+ source = IMAP.new(options[:from], options[:from_user], options[:from_pass],
78
+ :fast_scan => options[:fast_scan],
79
+ :max_retries => options[:max_retries])
80
+
81
+ dest = IMAP.new(options[:to], options[:to_user], options[:to_pass],
82
+ :create_mailbox => !options[:no_create_folder],
83
+ :fast_scan => options[:fast_scan],
84
+ :max_retries => options[:max_retries])
85
+
86
+ for sig in [:SIGINT, :SIGQUIT, :SIGTERM]
87
+ trap(sig) { @log.fatal "Interrupted (#{sig})"; summary; exit }
88
+ end
89
+
90
+ copy(source, dest)
91
+ end
@@ -0,0 +1,123 @@
1
+ # Append this file's directory to the include path if it's not there already.
2
+ $:.unshift(File.dirname(File.expand_path(__FILE__)))
3
+ $:.uniq!
4
+
5
+ require 'cgi'
6
+ require 'digest/md5'
7
+ require 'net/imap'
8
+ require 'thread'
9
+ require 'time'
10
+ require 'uri'
11
+
12
+ require 'larch/util'
13
+ require 'larch/errors'
14
+ require 'larch/imap'
15
+ require 'larch/logger'
16
+ require 'larch/version'
17
+
18
+ module Larch
19
+
20
+ class << self
21
+ attr_reader :log
22
+
23
+ def init(log_level = :info)
24
+ @log = Logger.new(log_level)
25
+
26
+ @copied = 0
27
+ @failed = 0
28
+ @total = 0
29
+ end
30
+
31
+ # Copies messages from _source_ to _dest_ if they don't already exist in
32
+ # _dest_. Both _source_ and _dest_ must be instances of Larch::IMAP.
33
+ def copy(source, dest)
34
+ raise ArgumentError, "source must be a Larch::IMAP instance" unless source.is_a?(IMAP)
35
+ raise ArgumentError, "dest must be a Larch::IMAP instance" unless dest.is_a?(IMAP)
36
+
37
+ msgq = SizedQueue.new(8)
38
+ mutex = Mutex.new
39
+
40
+ @copied = 0
41
+ @failed = 0
42
+ @total = 0
43
+
44
+ @log.info "copying messages from #{source.uri} to #{dest.uri}"
45
+
46
+ source_scan = Thread.new do
47
+ source.scan_mailbox
48
+ end
49
+
50
+ dest_scan = Thread.new do
51
+ dest.scan_mailbox
52
+ end
53
+
54
+ source_scan.join
55
+ dest_scan.join
56
+
57
+ source_copy = Thread.new do
58
+ begin
59
+ mutex.synchronize { @total = source.length }
60
+
61
+ source.each do |id|
62
+ next if dest.has_message?(id)
63
+
64
+ begin
65
+ msgq << source.peek(id)
66
+ rescue Larch::IMAP::Error => e
67
+ # TODO: Keep failed message envelopes in a buffer for later output?
68
+ mutex.synchronize { @failed += 1 }
69
+ @log.error e.message
70
+ next
71
+ end
72
+ end
73
+
74
+ rescue => e
75
+ @log.fatal e.message
76
+
77
+ ensure
78
+ msgq << :finished
79
+ end
80
+ end
81
+
82
+ dest_copy = Thread.new do
83
+ begin
84
+ while msg = msgq.pop do
85
+ break if msg == :finished
86
+
87
+ if msg.envelope.from
88
+ env_from = msg.envelope.from.first
89
+ from = "#{env_from.mailbox}@#{env_from.host}"
90
+ else
91
+ from = '?'
92
+ end
93
+
94
+ @log.info "copying message: #{from} - #{msg.envelope.subject}"
95
+ dest << msg
96
+
97
+ mutex.synchronize { @copied += 1 }
98
+ end
99
+
100
+ rescue IMAP::FatalError => e
101
+ @log.fatal e.message
102
+
103
+ rescue => e
104
+ mutex.synchronize { @failed += 1 }
105
+ @log.error e.message
106
+ retry
107
+ end
108
+ end
109
+
110
+ dest_copy.join
111
+
112
+ source.disconnect
113
+ dest.disconnect
114
+
115
+ summary
116
+ end
117
+
118
+ def summary
119
+ @log.info "#{@copied} message(s) copied, #{@failed} failed, #{@total - @copied - @failed} untouched out of #{@total} total"
120
+ end
121
+ end
122
+
123
+ end
@@ -0,0 +1,9 @@
1
+ module Larch
2
+ class Error < StandardError; end
3
+
4
+ class IMAP
5
+ class Error < Larch::Error; end
6
+ class FatalError < Error; end
7
+ class NotFoundError < Error; end
8
+ end
9
+ end
@@ -0,0 +1,418 @@
1
+ module Larch
2
+
3
+ # Manages a connection to an IMAP server and all the glorious fun that entails.
4
+ #
5
+ # This class borrows heavily from Sup, the source code of which should be
6
+ # required reading if you're doing anything with IMAP in Ruby:
7
+ # http://sup.rubyforge.org
8
+ class IMAP
9
+
10
+ # Recoverable connection errors.
11
+ RECOVERABLE_ERRORS = [
12
+ Errno::EPIPE,
13
+ Errno::ETIMEDOUT,
14
+ Net::IMAP::NoResponseError,
15
+ OpenSSL::SSL::SSLError
16
+ ]
17
+
18
+ # Regex to capture the individual fields in an IMAP fetch command.
19
+ REGEX_FIELDS = /([0-9A-Z\.]+\[[^\]]+\](?:<[0-9\.]+>)?|[0-9A-Z\.]+)/
20
+
21
+ # Regex to capture a Message-Id header.
22
+ REGEX_MESSAGE_ID = /message-id\s*:\s*(\S+)/i
23
+
24
+ # URI format validation regex.
25
+ REGEX_URI = URI.regexp(['imap', 'imaps'])
26
+
27
+ # Minimum time (in seconds) allowed between mailbox scans.
28
+ SCAN_INTERVAL = 60
29
+
30
+ # Larch::IMAP::Message represents a transferable IMAP message which can be
31
+ # passed between Larch::IMAP instances.
32
+ Message = Struct.new(:id, :envelope, :rfc822, :flags, :internaldate)
33
+
34
+ # Initializes a new Larch::IMAP instance that will connect to the specified
35
+ # IMAP URI and authenticate using the specified _username_ and _password_.
36
+ #
37
+ # The following options may also be specified:
38
+ #
39
+ # [:create_mailbox]
40
+ # If +true+, the specified mailbox will be created if necessary.
41
+ #
42
+ # [:fast_scan]
43
+ # If +true+, a faster but less accurate method will be used to scan
44
+ # mailboxes. This will speed up the initial mailbox scan, but will also
45
+ # reduce the effectiveness of the message unique id generator. This is
46
+ # probably acceptable when copying a very large mailbox to an empty mailbox,
47
+ # but if the destination already contains messages, using this option is not
48
+ # advised.
49
+ #
50
+ # [:max_retries]
51
+ # After a recoverable error occurs, retry the operation up to this many
52
+ # times. Default is 3.
53
+ #
54
+ def initialize(uri, username, password, options = {})
55
+ raise ArgumentError, "not an IMAP URI: #{uri}" unless uri.is_a?(URI) || uri =~ REGEX_URI
56
+ raise ArgumentError, "must provide a username and password" unless username && password
57
+ raise ArgumentError, "options must be a Hash" unless options.is_a?(Hash)
58
+
59
+ @uri = uri.is_a?(URI) ? uri : URI(uri)
60
+ @username = username
61
+ @password = password
62
+ @options = {:max_retries => 3}.merge(options)
63
+
64
+ @ids = {}
65
+ @imap = nil
66
+ @last_id = 0
67
+ @last_scan = nil
68
+ @message_ids = nil
69
+ @mutex = Mutex.new
70
+
71
+ # Create private convenience methods (debug, info, warn, etc.) to make
72
+ # logging easier.
73
+ Logger::LEVELS.each_key do |level|
74
+ IMAP.class_eval do
75
+ define_method(level) do |msg|
76
+ Larch.log.log(level, "#{@username}@#{host}: #{msg}")
77
+ end
78
+
79
+ private level
80
+ end
81
+ end
82
+ end
83
+
84
+ # Appends the specified Larch::IMAP::Message to this mailbox if it doesn't
85
+ # already exist. Returns +true+ if the message was appended successfully,
86
+ # +false+ if the message already exists in the mailbox.
87
+ def append(message)
88
+ raise ArgumentError, "must provide a Larch::IMAP::Message object" unless message.is_a?(Message)
89
+ return false if has_message?(message)
90
+
91
+ safely do
92
+ @mutex.synchronize do
93
+ begin
94
+ @imap.select(mailbox)
95
+ rescue Net::IMAP::NoResponseError => e
96
+ if @options[:create_mailbox]
97
+ info "creating mailbox: #{mailbox}"
98
+ @imap.create(mailbox)
99
+ retry
100
+ end
101
+
102
+ raise
103
+ end
104
+ end
105
+
106
+ debug "appending message: #{message.id}"
107
+ @imap.append(mailbox, message.rfc822, message.flags, message.internaldate)
108
+ end
109
+
110
+ true
111
+ end
112
+ alias << append
113
+
114
+ # Connects to the IMAP server and logs in if a connection hasn't already been
115
+ # established.
116
+ def connect
117
+ return if @imap
118
+ safely {} # connect, but do nothing else
119
+ end
120
+
121
+ # Closes the IMAP connection if one is currently open.
122
+ def disconnect
123
+ return unless @imap
124
+
125
+ @imap.disconnect
126
+ @imap = nil
127
+
128
+ info "disconnected"
129
+ end
130
+ synchronized :disconnect
131
+
132
+ # Iterates through Larch message ids in this mailbox, yielding each one to the
133
+ # provided block.
134
+ def each
135
+ ids = @mutex.synchronize do
136
+ unsync_scan_mailbox
137
+ @ids
138
+ end
139
+
140
+ ids.each_key {|id| yield id }
141
+ end
142
+
143
+ # Gets a Net::IMAP::Envelope for the specified message id.
144
+ def envelope(message_id)
145
+ scan_mailbox
146
+ uid = @ids[message_id]
147
+
148
+ raise NotFoundError, "message not found: #{message_id}" if uid.nil?
149
+
150
+ debug "fetching envelope: #{message_id}"
151
+ imap_uid_fetch([uid], 'ENVELOPE').first.attr['ENVELOPE']
152
+ end
153
+
154
+ # Fetches a Larch::IMAP::Message struct representing the message with the
155
+ # specified Larch message id.
156
+ def fetch(message_id, peek = false)
157
+ scan_mailbox
158
+ uid = @ids[message_id]
159
+
160
+ raise NotFoundError, "message not found: #{message_id}" if uid.nil?
161
+
162
+ debug "#{peek ? 'peeking at' : 'fetching'} message: #{message_id}"
163
+ data = imap_uid_fetch([uid], [(peek ? 'BODY.PEEK[]' : 'BODY[]'), 'FLAGS', 'INTERNALDATE', 'ENVELOPE']).first
164
+
165
+ Message.new(message_id, data.attr['ENVELOPE'], data.attr['BODY[]'],
166
+ data.attr['FLAGS'], Time.parse(data.attr['INTERNALDATE']))
167
+ end
168
+ alias [] fetch
169
+
170
+ # Returns +true+ if a message with the specified Larch <em>message_id</em>
171
+ # exists in this mailbox, +false+ otherwise.
172
+ def has_message?(message_id)
173
+ scan_mailbox
174
+ @ids.has_key?(message_id)
175
+ end
176
+
177
+ # Gets the IMAP hostname.
178
+ def host
179
+ @uri.host
180
+ end
181
+
182
+ # Gets the number of messages in this mailbox.
183
+ def length
184
+ scan_mailbox
185
+ @ids.length
186
+ end
187
+ alias size length
188
+
189
+ # Gets the IMAP mailbox.
190
+ def mailbox
191
+ mb = @uri.path[1..-1]
192
+ mb.nil? || mb.empty? ? 'INBOX' : CGI.unescape(mb)
193
+ end
194
+
195
+ # Same as fetch, but doesn't mark the message as seen.
196
+ def peek(message_id)
197
+ fetch(message_id, true)
198
+ end
199
+
200
+ # Gets the IMAP port number.
201
+ def port
202
+ @uri.port || (ssl? ? 993 : 143)
203
+ end
204
+
205
+ # Fetches message headers from the current mailbox.
206
+ def scan_mailbox
207
+ return if @last_scan && (Time.now - @last_scan) < SCAN_INTERVAL
208
+
209
+ last_id = safely do
210
+ begin
211
+ @imap.examine(mailbox)
212
+ rescue Net::IMAP::NoResponseError => e
213
+ return if @options[:create_mailbox]
214
+ raise FatalError, "unable to open mailbox: #{e.message}"
215
+ end
216
+
217
+ @imap.responses['EXISTS'].last
218
+ end
219
+
220
+ @last_scan = Time.now
221
+ return if last_id == @last_id
222
+
223
+ range = (@last_id + 1)..last_id
224
+ @last_id = last_id
225
+
226
+ info "fetching message headers #{range}" <<
227
+ (@options[:fast_scan] ? ' (fast scan)' : '')
228
+
229
+ fields = if @options[:fast_scan]
230
+ ['UID', 'RFC822.SIZE', 'INTERNALDATE']
231
+ else
232
+ "(UID BODY.PEEK[HEADER.FIELDS (MESSAGE-ID)] RFC822.SIZE INTERNALDATE)"
233
+ end
234
+
235
+ imap_fetch(range, fields).each do |data|
236
+ id = create_id(data)
237
+
238
+ unless uid = data.attr['UID']
239
+ error "UID not in IMAP response for message: #{id}"
240
+ next
241
+ end
242
+
243
+ if @ids.has_key?(id) && Larch.log.level == :debug
244
+ envelope = imap_uid_fetch([uid], 'ENVELOPE').first.attr['ENVELOPE']
245
+ debug "duplicate message? #{id} (Subject: #{envelope.subject})"
246
+ end
247
+
248
+ @ids[id] = uid
249
+ end
250
+ end
251
+ synchronized :scan_mailbox
252
+
253
+ # Gets the SSL status.
254
+ def ssl?
255
+ @uri.scheme == 'imaps'
256
+ end
257
+
258
+ # Gets the IMAP URI.
259
+ def uri
260
+ @uri.to_s
261
+ end
262
+
263
+ private
264
+
265
+ # Creates an id suitable for uniquely identifying a specific message across
266
+ # servers (we hope).
267
+ #
268
+ # If the given message data includes a valid Message-Id header, then that will
269
+ # be used to generate an MD5 hash. Otherwise, the hash will be generated based
270
+ # on the message's RFC822.SIZE and INTERNALDATE.
271
+ def create_id(data)
272
+ ['RFC822.SIZE', 'INTERNALDATE'].each do |a|
273
+ raise FatalError, "requested data not in IMAP response: #{a}" unless data.attr[a]
274
+ end
275
+
276
+ if data.attr['BODY[HEADER.FIELDS (MESSAGE-ID)]'] =~ REGEX_MESSAGE_ID
277
+ Digest::MD5.hexdigest($1)
278
+ else
279
+ Digest::MD5.hexdigest(sprintf('%d%d', data.attr['RFC822.SIZE'],
280
+ Time.parse(data.attr['INTERNALDATE']).to_i))
281
+ end
282
+ end
283
+
284
+ # Fetches the specified _fields_ for the specified message sequence id(s) from
285
+ # the IMAP server.
286
+ def imap_fetch(ids, fields)
287
+ data = safely { @imap.fetch(ids, fields) }
288
+
289
+ # If fields isn't an array, make it one.
290
+ fields = REGEX_FIELDS.match(fields).captures unless fields.is_a?(Array)
291
+
292
+ # Translate BODY.PEEK to BODY in fields, since that's how it'll come back in
293
+ # the response.
294
+ fields.map! {|f| f.sub(/^BODY\.PEEK\[/, 'BODY[') }
295
+
296
+ good_results = ids.respond_to?(:member?) ?
297
+ data.find_all {|i| ids.member?(i.seqno) && fields.all? {|f| i.attr.member?(f) }} :
298
+ data.find_all {|i| ids == i.seqno && fields.all? {|f| i.attr.member?(f) }}
299
+
300
+ if good_results.empty?
301
+ raise FatalError, "0 out of #{data.length} items in IMAP response for message(s) #{ids} contained all requested fields: #{fields.join(', ')}"
302
+ elsif good_results.length < data.length
303
+ error "IMAP server sent #{good_results.length} results in response to a request for #{data.length} messages"
304
+ end
305
+
306
+ good_results
307
+ end
308
+
309
+ # Fetches the specified _fields_ for the specified UID(s) from the IMAP
310
+ # server.
311
+ def imap_uid_fetch(uids, fields)
312
+ data = safely { @imap.uid_fetch(uids, fields) }
313
+
314
+ # If fields isn't an array, make it one.
315
+ fields = REGEX_FIELDS.match(fields).captures unless fields.is_a?(Array)
316
+
317
+ # Translate BODY.PEEK to BODY in fields, since that's how it'll come back in
318
+ # the response.
319
+ fields.map! {|f| f.sub(/^BODY\.PEEK\[/, 'BODY[') }
320
+
321
+ good_results = data.find_all do |i|
322
+ i.attr.member?('UID') && uids.member?(i.attr['UID']) &&
323
+ fields.all? {|f| i.attr.member?(f) }
324
+ end
325
+
326
+ if good_results.empty?
327
+ raise FatalError, "0 out of #{data.length} items in IMAP response for message UID(s) #{uids.join(', ')} contained all requested fields: #{fields.join(', ')}"
328
+ elsif good_results.length < data.length
329
+ error "IMAP server sent #{good_results.length} results in response to a request for #{data.length} messages"
330
+ end
331
+
332
+ good_results
333
+ end
334
+
335
+ # Connect if necessary, execute the given block, retry up to 3 times if a
336
+ # recoverable error occurs, die if an unrecoverable error occurs.
337
+ def safely
338
+ retries = 0
339
+
340
+ begin
341
+ unsafe_connect unless @imap
342
+ rescue *RECOVERABLE_ERRORS => e
343
+ info "#{e.class.name}: #{e.message} (will retry)"
344
+ raise unless (retries += 1) <= @options[:max_retries]
345
+
346
+ @imap = nil
347
+ sleep 1 * retries
348
+ retry
349
+ end
350
+
351
+ retries = 0
352
+
353
+ begin
354
+ yield
355
+ rescue *RECOVERABLE_ERRORS => e
356
+ info "#{e.class.name}: #{e.message} (will retry)"
357
+ raise unless (retries += 1) <= @options[:max_retries]
358
+
359
+ sleep 1 * retries
360
+ retry
361
+ end
362
+
363
+ rescue Net::IMAP::NoResponseError => e
364
+ raise Error, "#{e.class.name}: #{e.message} (giving up)"
365
+
366
+ rescue IOError, Net::IMAP::Error, OpenSSL::SSL::SSLError, SocketError, SystemCallError => e
367
+ raise FatalError, "#{e.class.name}: #{e.message} (giving up)"
368
+ end
369
+
370
+ def unsafe_connect
371
+ info "connecting..."
372
+
373
+ exception = nil
374
+
375
+ Thread.new do
376
+ begin
377
+ @imap = Net::IMAP.new(host, port, ssl?)
378
+
379
+ info "connected on port #{port}" << (ssl? ? ' using SSL' : '')
380
+
381
+ auth_methods = ['PLAIN']
382
+ tried = []
383
+
384
+ ['LOGIN', 'CRAM-MD5'].each do |method|
385
+ auth_methods << method if @imap.capability.include?("AUTH=#{method}")
386
+ end
387
+
388
+ begin
389
+ tried << method = auth_methods.pop
390
+
391
+ debug "authenticating using #{method}"
392
+
393
+ if method == 'PLAIN'
394
+ @imap.login(@username, @password)
395
+ else
396
+ @imap.authenticate(method, @username, @password)
397
+ end
398
+
399
+ info "authenticated using #{method}"
400
+
401
+ rescue Net::IMAP::BadResponseError, Net::IMAP::NoResponseError => e
402
+ debug "#{method} auth failed: #{e.message}"
403
+ retry unless auth_methods.empty?
404
+
405
+ raise e, "#{e.message} (tried #{tried.join(', ')})"
406
+ end
407
+
408
+ rescue => e
409
+ exception = e
410
+ error e.message
411
+ end
412
+ end.join
413
+
414
+ raise exception if exception
415
+ end
416
+ end
417
+
418
+ end
@@ -0,0 +1,49 @@
1
+ module Larch
2
+
3
+ class Logger
4
+ attr_reader :level, :output
5
+
6
+ LEVELS = {
7
+ :fatal => 0,
8
+ :error => 1,
9
+ :warn => 2,
10
+ :info => 3,
11
+ :debug => 4
12
+ }
13
+
14
+ def initialize(level = :info, output = $stdout)
15
+ self.level = level.to_sym
16
+ self.output = output
17
+ end
18
+
19
+ def const_missing(name)
20
+ return LEVELS[name] if LEVELS.key?(name)
21
+ raise NameError, "uninitialized constant: #{name}"
22
+ end
23
+
24
+ def method_missing(name, *args)
25
+ return log(name, *args) if LEVELS.key?(name)
26
+ raise NoMethodError, "undefined method: #{name}"
27
+ end
28
+
29
+ def level=(level)
30
+ raise ArgumentError, "invalid log level: #{level}" unless LEVELS.key?(level)
31
+ @level = level
32
+ end
33
+
34
+ def log(level, msg)
35
+ return true if LEVELS[level] > LEVELS[@level] || msg.nil? || msg.empty?
36
+ @output.puts "[#{Time.new.strftime('%b %d %H:%M:%S')}] [#{level}] #{msg}"
37
+ true
38
+
39
+ rescue => e
40
+ false
41
+ end
42
+
43
+ def output=(output)
44
+ raise ArgumentError, "output must be an instance of class IO" unless output.is_a?(IO)
45
+ @output = output
46
+ end
47
+ end
48
+
49
+ end
@@ -0,0 +1,17 @@
1
+ class Module
2
+
3
+ # Java-style whole-method synchronization, shamelessly stolen from Sup:
4
+ # http://sup.rubyforge.org. Assumes the existence of a <tt>@mutex</tt>
5
+ # variable.
6
+ def synchronized(*methods)
7
+ methods.each do |method|
8
+ class_eval <<-EOF
9
+ alias unsync_#{method} #{method}
10
+ def #{method}(*a, &b)
11
+ @mutex.synchronize { unsync_#{method}(*a, &b) }
12
+ end
13
+ EOF
14
+ end
15
+ end
16
+
17
+ end
@@ -0,0 +1,9 @@
1
+ module Larch
2
+ APP_NAME = 'Larch'
3
+ APP_VERSION = '1.0.0'
4
+ APP_AUTHOR = 'Ryan Grove'
5
+ APP_EMAIL = 'ryan@wonko.com'
6
+ APP_URL = 'http://github.com/rgrove/larch/'
7
+ APP_COPYRIGHT = 'Copyright (c) 2009 Ryan Grove <ryan@wonko.com>. All ' <<
8
+ 'rights reserved.'
9
+ end
metadata ADDED
@@ -0,0 +1,79 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: larch
3
+ version: !ruby/object:Gem::Version
4
+ version: 1.0.0
5
+ platform: ruby
6
+ authors:
7
+ - Ryan Grove
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+
12
+ date: 2009-03-16 00:00:00 -07:00
13
+ default_executable:
14
+ dependencies:
15
+ - !ruby/object:Gem::Dependency
16
+ name: highline
17
+ type: :runtime
18
+ version_requirement:
19
+ version_requirements: !ruby/object:Gem::Requirement
20
+ requirements:
21
+ - - ~>
22
+ - !ruby/object:Gem::Version
23
+ version: 1.5.0
24
+ version:
25
+ - !ruby/object:Gem::Dependency
26
+ name: trollop
27
+ type: :runtime
28
+ version_requirement:
29
+ version_requirements: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ~>
32
+ - !ruby/object:Gem::Version
33
+ version: "1.13"
34
+ version:
35
+ description:
36
+ email: ryan@wonko.com
37
+ executables:
38
+ - larch
39
+ extensions: []
40
+
41
+ extra_rdoc_files: []
42
+
43
+ files:
44
+ - LICENSE
45
+ - bin/larch
46
+ - lib/larch.rb
47
+ - lib/larch/errors.rb
48
+ - lib/larch/imap.rb
49
+ - lib/larch/logger.rb
50
+ - lib/larch/util.rb
51
+ - lib/larch/version.rb
52
+ has_rdoc: false
53
+ homepage: http://github.com/rgrove/larch/
54
+ post_install_message:
55
+ rdoc_options: []
56
+
57
+ require_paths:
58
+ - lib
59
+ required_ruby_version: !ruby/object:Gem::Requirement
60
+ requirements:
61
+ - - ">="
62
+ - !ruby/object:Gem::Version
63
+ version: 1.8.6
64
+ version:
65
+ required_rubygems_version: !ruby/object:Gem::Requirement
66
+ requirements:
67
+ - - ">="
68
+ - !ruby/object:Gem::Version
69
+ version: "0"
70
+ version:
71
+ requirements: []
72
+
73
+ rubyforge_project:
74
+ rubygems_version: 1.3.1
75
+ signing_key:
76
+ specification_version: 2
77
+ summary: Larch syncs messages from one IMAP server to another. Awesomely.
78
+ test_files: []
79
+