larch 1.0.0

Sign up to get free protection for your applications and to get access to all the features.
data/LICENSE ADDED
@@ -0,0 +1,280 @@
1
+ GNU GENERAL PUBLIC LICENSE
2
+ Version 2, June 1991
3
+
4
+ Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
5
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
6
+ Everyone is permitted to copy and distribute verbatim copies
7
+ of this license document, but changing it is not allowed.
8
+
9
+ Preamble
10
+
11
+ The licenses for most software are designed to take away your
12
+ freedom to share and change it. By contrast, the GNU General Public
13
+ License is intended to guarantee your freedom to share and change free
14
+ software--to make sure the software is free for all its users. This
15
+ General Public License applies to most of the Free Software
16
+ Foundation's software and to any other program whose authors commit to
17
+ using it. (Some other Free Software Foundation software is covered by
18
+ the GNU Lesser General Public License instead.) You can apply it to
19
+ your programs, too.
20
+
21
+ When we speak of free software, we are referring to freedom, not
22
+ price. Our General Public Licenses are designed to make sure that you
23
+ have the freedom to distribute copies of free software (and charge for
24
+ this service if you wish), that you receive source code or can get it
25
+ if you want it, that you can change the software or use pieces of it
26
+ in new free programs; and that you know you can do these things.
27
+
28
+ To protect your rights, we need to make restrictions that forbid
29
+ anyone to deny you these rights or to ask you to surrender the rights.
30
+ These restrictions translate to certain responsibilities for you if you
31
+ distribute copies of the software, or if you modify it.
32
+
33
+ For example, if you distribute copies of such a program, whether
34
+ gratis or for a fee, you must give the recipients all the rights that
35
+ you have. You must make sure that they, too, receive or can get the
36
+ source code. And you must show them these terms so they know their
37
+ rights.
38
+
39
+ We protect your rights with two steps: (1) copyright the software, and
40
+ (2) offer you this license which gives you legal permission to copy,
41
+ distribute and/or modify the software.
42
+
43
+ Also, for each author's protection and ours, we want to make certain
44
+ that everyone understands that there is no warranty for this free
45
+ software. If the software is modified by someone else and passed on, we
46
+ want its recipients to know that what they have is not the original, so
47
+ that any problems introduced by others will not reflect on the original
48
+ authors' reputations.
49
+
50
+ Finally, any free program is threatened constantly by software
51
+ patents. We wish to avoid the danger that redistributors of a free
52
+ program will individually obtain patent licenses, in effect making the
53
+ program proprietary. To prevent this, we have made it clear that any
54
+ patent must be licensed for everyone's free use or not licensed at all.
55
+
56
+ The precise terms and conditions for copying, distribution and
57
+ modification follow.
58
+
59
+ GNU GENERAL PUBLIC LICENSE
60
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
61
+
62
+ 0. This License applies to any program or other work which contains
63
+ a notice placed by the copyright holder saying it may be distributed
64
+ under the terms of this General Public License. The "Program", below,
65
+ refers to any such program or work, and a "work based on the Program"
66
+ means either the Program or any derivative work under copyright law:
67
+ that is to say, a work containing the Program or a portion of it,
68
+ either verbatim or with modifications and/or translated into another
69
+ language. (Hereinafter, translation is included without limitation in
70
+ the term "modification".) Each licensee is addressed as "you".
71
+
72
+ Activities other than copying, distribution and modification are not
73
+ covered by this License; they are outside its scope. The act of
74
+ running the Program is not restricted, and the output from the Program
75
+ is covered only if its contents constitute a work based on the
76
+ Program (independent of having been made by running the Program).
77
+ Whether that is true depends on what the Program does.
78
+
79
+ 1. You may copy and distribute verbatim copies of the Program's
80
+ source code as you receive it, in any medium, provided that you
81
+ conspicuously and appropriately publish on each copy an appropriate
82
+ copyright notice and disclaimer of warranty; keep intact all the
83
+ notices that refer to this License and to the absence of any warranty;
84
+ and give any other recipients of the Program a copy of this License
85
+ along with the Program.
86
+
87
+ You may charge a fee for the physical act of transferring a copy, and
88
+ you may at your option offer warranty protection in exchange for a fee.
89
+
90
+ 2. You may modify your copy or copies of the Program or any portion
91
+ of it, thus forming a work based on the Program, and copy and
92
+ distribute such modifications or work under the terms of Section 1
93
+ above, provided that you also meet all of these conditions:
94
+
95
+ a) You must cause the modified files to carry prominent notices
96
+ stating that you changed the files and the date of any change.
97
+
98
+ b) You must cause any work that you distribute or publish, that in
99
+ whole or in part contains or is derived from the Program or any
100
+ part thereof, to be licensed as a whole at no charge to all third
101
+ parties under the terms of this License.
102
+
103
+ c) If the modified program normally reads commands interactively
104
+ when run, you must cause it, when started running for such
105
+ interactive use in the most ordinary way, to print or display an
106
+ announcement including an appropriate copyright notice and a
107
+ notice that there is no warranty (or else, saying that you provide
108
+ a warranty) and that users may redistribute the program under
109
+ these conditions, and telling the user how to view a copy of this
110
+ License. (Exception: if the Program itself is interactive but
111
+ does not normally print such an announcement, your work based on
112
+ the Program is not required to print an announcement.)
113
+
114
+ These requirements apply to the modified work as a whole. If
115
+ identifiable sections of that work are not derived from the Program,
116
+ and can be reasonably considered independent and separate works in
117
+ themselves, then this License, and its terms, do not apply to those
118
+ sections when you distribute them as separate works. But when you
119
+ distribute the same sections as part of a whole which is a work based
120
+ on the Program, the distribution of the whole must be on the terms of
121
+ this License, whose permissions for other licensees extend to the
122
+ entire whole, and thus to each and every part regardless of who wrote it.
123
+
124
+ Thus, it is not the intent of this section to claim rights or contest
125
+ your rights to work written entirely by you; rather, the intent is to
126
+ exercise the right to control the distribution of derivative or
127
+ collective works based on the Program.
128
+
129
+ In addition, mere aggregation of another work not based on the Program
130
+ with the Program (or with a work based on the Program) on a volume of
131
+ a storage or distribution medium does not bring the other work under
132
+ the scope of this License.
133
+
134
+ 3. You may copy and distribute the Program (or a work based on it,
135
+ under Section 2) in object code or executable form under the terms of
136
+ Sections 1 and 2 above provided that you also do one of the following:
137
+
138
+ a) Accompany it with the complete corresponding machine-readable
139
+ source code, which must be distributed under the terms of Sections
140
+ 1 and 2 above on a medium customarily used for software interchange; or,
141
+
142
+ b) Accompany it with a written offer, valid for at least three
143
+ years, to give any third party, for a charge no more than your
144
+ cost of physically performing source distribution, a complete
145
+ machine-readable copy of the corresponding source code, to be
146
+ distributed under the terms of Sections 1 and 2 above on a medium
147
+ customarily used for software interchange; or,
148
+
149
+ c) Accompany it with the information you received as to the offer
150
+ to distribute corresponding source code. (This alternative is
151
+ allowed only for noncommercial distribution and only if you
152
+ received the program in object code or executable form with such
153
+ an offer, in accord with Subsection b above.)
154
+
155
+ The source code for a work means the preferred form of the work for
156
+ making modifications to it. For an executable work, complete source
157
+ code means all the source code for all modules it contains, plus any
158
+ associated interface definition files, plus the scripts used to
159
+ control compilation and installation of the executable. However, as a
160
+ special exception, the source code distributed need not include
161
+ anything that is normally distributed (in either source or binary
162
+ form) with the major components (compiler, kernel, and so on) of the
163
+ operating system on which the executable runs, unless that component
164
+ itself accompanies the executable.
165
+
166
+ If distribution of executable or object code is made by offering
167
+ access to copy from a designated place, then offering equivalent
168
+ access to copy the source code from the same place counts as
169
+ distribution of the source code, even though third parties are not
170
+ compelled to copy the source along with the object code.
171
+
172
+ 4. You may not copy, modify, sublicense, or distribute the Program
173
+ except as expressly provided under this License. Any attempt
174
+ otherwise to copy, modify, sublicense or distribute the Program is
175
+ void, and will automatically terminate your rights under this License.
176
+ However, parties who have received copies, or rights, from you under
177
+ this License will not have their licenses terminated so long as such
178
+ parties remain in full compliance.
179
+
180
+ 5. You are not required to accept this License, since you have not
181
+ signed it. However, nothing else grants you permission to modify or
182
+ distribute the Program or its derivative works. These actions are
183
+ prohibited by law if you do not accept this License. Therefore, by
184
+ modifying or distributing the Program (or any work based on the
185
+ Program), you indicate your acceptance of this License to do so, and
186
+ all its terms and conditions for copying, distributing or modifying
187
+ the Program or works based on it.
188
+
189
+ 6. Each time you redistribute the Program (or any work based on the
190
+ Program), the recipient automatically receives a license from the
191
+ original licensor to copy, distribute or modify the Program subject to
192
+ these terms and conditions. You may not impose any further
193
+ restrictions on the recipients' exercise of the rights granted herein.
194
+ You are not responsible for enforcing compliance by third parties to
195
+ this License.
196
+
197
+ 7. If, as a consequence of a court judgment or allegation of patent
198
+ infringement or for any other reason (not limited to patent issues),
199
+ conditions are imposed on you (whether by court order, agreement or
200
+ otherwise) that contradict the conditions of this License, they do not
201
+ excuse you from the conditions of this License. If you cannot
202
+ distribute so as to satisfy simultaneously your obligations under this
203
+ License and any other pertinent obligations, then as a consequence you
204
+ may not distribute the Program at all. For example, if a patent
205
+ license would not permit royalty-free redistribution of the Program by
206
+ all those who receive copies directly or indirectly through you, then
207
+ the only way you could satisfy both it and this License would be to
208
+ refrain entirely from distribution of the Program.
209
+
210
+ If any portion of this section is held invalid or unenforceable under
211
+ any particular circumstance, the balance of the section is intended to
212
+ apply and the section as a whole is intended to apply in other
213
+ circumstances.
214
+
215
+ It is not the purpose of this section to induce you to infringe any
216
+ patents or other property right claims or to contest validity of any
217
+ such claims; this section has the sole purpose of protecting the
218
+ integrity of the free software distribution system, which is
219
+ implemented by public license practices. Many people have made
220
+ generous contributions to the wide range of software distributed
221
+ through that system in reliance on consistent application of that
222
+ system; it is up to the author/donor to decide if he or she is willing
223
+ to distribute software through any other system and a licensee cannot
224
+ impose that choice.
225
+
226
+ This section is intended to make thoroughly clear what is believed to
227
+ be a consequence of the rest of this License.
228
+
229
+ 8. If the distribution and/or use of the Program is restricted in
230
+ certain countries either by patents or by copyrighted interfaces, the
231
+ original copyright holder who places the Program under this License
232
+ may add an explicit geographical distribution limitation excluding
233
+ those countries, so that distribution is permitted only in or among
234
+ countries not thus excluded. In such case, this License incorporates
235
+ the limitation as if written in the body of this License.
236
+
237
+ 9. The Free Software Foundation may publish revised and/or new versions
238
+ of the General Public License from time to time. Such new versions will
239
+ be similar in spirit to the present version, but may differ in detail to
240
+ address new problems or concerns.
241
+
242
+ Each version is given a distinguishing version number. If the Program
243
+ specifies a version number of this License which applies to it and "any
244
+ later version", you have the option of following the terms and conditions
245
+ either of that version or of any later version published by the Free
246
+ Software Foundation. If the Program does not specify a version number of
247
+ this License, you may choose any version ever published by the Free Software
248
+ Foundation.
249
+
250
+ 10. If you wish to incorporate parts of the Program into other free
251
+ programs whose distribution conditions are different, write to the author
252
+ to ask for permission. For software which is copyrighted by the Free
253
+ Software Foundation, write to the Free Software Foundation; we sometimes
254
+ make exceptions for this. Our decision will be guided by the two goals
255
+ of preserving the free status of all derivatives of our free software and
256
+ of promoting the sharing and reuse of software generally.
257
+
258
+ NO WARRANTY
259
+
260
+ 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
261
+ FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
262
+ OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
263
+ PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
264
+ OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
265
+ MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
266
+ TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
267
+ PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
268
+ REPAIR OR CORRECTION.
269
+
270
+ 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
271
+ WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
272
+ REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
273
+ INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
274
+ OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
275
+ TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
276
+ YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
277
+ PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
278
+ POSSIBILITY OF SUCH DAMAGES.
279
+
280
+ END OF TERMS AND CONDITIONS
@@ -0,0 +1,91 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require 'rubygems'
4
+ require 'highline/import' # optional dep: termios
5
+ require 'trollop'
6
+
7
+ require 'larch'
8
+
9
+ module Larch
10
+
11
+ # Parse command-line options.
12
+ options = Trollop.options do
13
+ version "Larch #{APP_VERSION}\n" << APP_COPYRIGHT
14
+ banner <<EOS
15
+ Larch syncs messages from one IMAP server to another. Awesomely.
16
+
17
+ Usage:
18
+ larch --from <uri> --to <uri> [options]
19
+
20
+ Required:
21
+ EOS
22
+ opt :from, "URI of the source IMAP server.", :short => '-f', :type => :string, :required => true
23
+ opt :to, "URI of the destination IMAP server.", :short => '-t', :type => :string, :required => true
24
+
25
+ text "\nOptions:"
26
+
27
+ # opt :dry_run, "Don't actually do anything.", :short => '-n'
28
+ opt :fast_scan, "Use a faster (but less accurate) method to scan mailboxes. This may result in messages being re-copied.", :short => :none
29
+ opt :from_folder, "Source folder to copy from", :short => :none, :default => 'INBOX'
30
+ opt :from_pass, "Source server password (Default: prompt)", :short => :none, :type => :string
31
+ opt :from_user, "Source server username (Default: prompt)", :short => :none, :type => :string
32
+ opt :max_retries, "Maximum number of times to retry after a recoverable error", :short => :none, :default => 3
33
+ opt :no_create_folder, "Don't create destination folders that don't already exist", :short => :none
34
+ opt :to_folder, "Destination folder to copy to", :short => :none, :default => 'INBOX'
35
+ opt :to_pass, "Destination server password (Default: prompt)", :short => :none, :type => :string
36
+ opt :to_user, "Destination server username (Default: prompt)", :short => :none, :type => :string
37
+ opt :verbosity, "Output verbosity: debug, info, warn, error, or fatal", :short => '-V', :default => 'info'
38
+ end
39
+
40
+ # Validate command-line options.
41
+ [:from, :to].each do |sym|
42
+ unless options[sym] =~ IMAP::REGEX_URI
43
+ Trollop.die sym, "must be a valid IMAP URI (e.g. imap://example.com)"
44
+ end
45
+ end
46
+
47
+ unless Logger::LEVELS.has_key?(options[:verbosity].to_sym)
48
+ Trollop.die :verbosity, "must be one of: #{Logger::LEVELS.keys.join(', ')}"
49
+ end
50
+
51
+ # Create URIs.
52
+ options[:from] = URI(options[:from])
53
+ options[:to] = URI(options[:to])
54
+ options[:from].path = '/' + CGI.escape(options[:from_folder].gsub(/^\//, ''))
55
+ options[:to].path = '/' + CGI.escape(options[:to_folder].gsub(/^\//, ''))
56
+
57
+ # Prompt for usernames and passwords if necessary.
58
+ unless options[:from_user]
59
+ options[:from_user] = ask("Source username (#{options[:from].host}): ")
60
+ end
61
+
62
+ unless options[:from_pass]
63
+ options[:from_pass] = ask("Source password (#{options[:from].host}): ") {|q| q.echo = false }
64
+ end
65
+
66
+ unless options[:to_user]
67
+ options[:to_user] = ask("Destination username (#{options[:to].host}): ")
68
+ end
69
+
70
+ unless options[:to_pass]
71
+ options[:to_pass] = ask("Destination password (#{options[:to].host}): ") {|q| q.echo = false }
72
+ end
73
+
74
+ # Go go go!
75
+ init(options[:verbosity])
76
+
77
+ source = IMAP.new(options[:from], options[:from_user], options[:from_pass],
78
+ :fast_scan => options[:fast_scan],
79
+ :max_retries => options[:max_retries])
80
+
81
+ dest = IMAP.new(options[:to], options[:to_user], options[:to_pass],
82
+ :create_mailbox => !options[:no_create_folder],
83
+ :fast_scan => options[:fast_scan],
84
+ :max_retries => options[:max_retries])
85
+
86
+ for sig in [:SIGINT, :SIGQUIT, :SIGTERM]
87
+ trap(sig) { @log.fatal "Interrupted (#{sig})"; summary; exit }
88
+ end
89
+
90
+ copy(source, dest)
91
+ end
@@ -0,0 +1,123 @@
1
+ # Append this file's directory to the include path if it's not there already.
2
+ $:.unshift(File.dirname(File.expand_path(__FILE__)))
3
+ $:.uniq!
4
+
5
+ require 'cgi'
6
+ require 'digest/md5'
7
+ require 'net/imap'
8
+ require 'thread'
9
+ require 'time'
10
+ require 'uri'
11
+
12
+ require 'larch/util'
13
+ require 'larch/errors'
14
+ require 'larch/imap'
15
+ require 'larch/logger'
16
+ require 'larch/version'
17
+
18
+ module Larch
19
+
20
+ class << self
21
+ attr_reader :log
22
+
23
+ def init(log_level = :info)
24
+ @log = Logger.new(log_level)
25
+
26
+ @copied = 0
27
+ @failed = 0
28
+ @total = 0
29
+ end
30
+
31
+ # Copies messages from _source_ to _dest_ if they don't already exist in
32
+ # _dest_. Both _source_ and _dest_ must be instances of Larch::IMAP.
33
+ def copy(source, dest)
34
+ raise ArgumentError, "source must be a Larch::IMAP instance" unless source.is_a?(IMAP)
35
+ raise ArgumentError, "dest must be a Larch::IMAP instance" unless dest.is_a?(IMAP)
36
+
37
+ msgq = SizedQueue.new(8)
38
+ mutex = Mutex.new
39
+
40
+ @copied = 0
41
+ @failed = 0
42
+ @total = 0
43
+
44
+ @log.info "copying messages from #{source.uri} to #{dest.uri}"
45
+
46
+ source_scan = Thread.new do
47
+ source.scan_mailbox
48
+ end
49
+
50
+ dest_scan = Thread.new do
51
+ dest.scan_mailbox
52
+ end
53
+
54
+ source_scan.join
55
+ dest_scan.join
56
+
57
+ source_copy = Thread.new do
58
+ begin
59
+ mutex.synchronize { @total = source.length }
60
+
61
+ source.each do |id|
62
+ next if dest.has_message?(id)
63
+
64
+ begin
65
+ msgq << source.peek(id)
66
+ rescue Larch::IMAP::Error => e
67
+ # TODO: Keep failed message envelopes in a buffer for later output?
68
+ mutex.synchronize { @failed += 1 }
69
+ @log.error e.message
70
+ next
71
+ end
72
+ end
73
+
74
+ rescue => e
75
+ @log.fatal e.message
76
+
77
+ ensure
78
+ msgq << :finished
79
+ end
80
+ end
81
+
82
+ dest_copy = Thread.new do
83
+ begin
84
+ while msg = msgq.pop do
85
+ break if msg == :finished
86
+
87
+ if msg.envelope.from
88
+ env_from = msg.envelope.from.first
89
+ from = "#{env_from.mailbox}@#{env_from.host}"
90
+ else
91
+ from = '?'
92
+ end
93
+
94
+ @log.info "copying message: #{from} - #{msg.envelope.subject}"
95
+ dest << msg
96
+
97
+ mutex.synchronize { @copied += 1 }
98
+ end
99
+
100
+ rescue IMAP::FatalError => e
101
+ @log.fatal e.message
102
+
103
+ rescue => e
104
+ mutex.synchronize { @failed += 1 }
105
+ @log.error e.message
106
+ retry
107
+ end
108
+ end
109
+
110
+ dest_copy.join
111
+
112
+ source.disconnect
113
+ dest.disconnect
114
+
115
+ summary
116
+ end
117
+
118
+ def summary
119
+ @log.info "#{@copied} message(s) copied, #{@failed} failed, #{@total - @copied - @failed} untouched out of #{@total} total"
120
+ end
121
+ end
122
+
123
+ end
@@ -0,0 +1,9 @@
1
+ module Larch
2
+ class Error < StandardError; end
3
+
4
+ class IMAP
5
+ class Error < Larch::Error; end
6
+ class FatalError < Error; end
7
+ class NotFoundError < Error; end
8
+ end
9
+ end
@@ -0,0 +1,418 @@
1
+ module Larch
2
+
3
+ # Manages a connection to an IMAP server and all the glorious fun that entails.
4
+ #
5
+ # This class borrows heavily from Sup, the source code of which should be
6
+ # required reading if you're doing anything with IMAP in Ruby:
7
+ # http://sup.rubyforge.org
8
+ class IMAP
9
+
10
+ # Recoverable connection errors.
11
+ RECOVERABLE_ERRORS = [
12
+ Errno::EPIPE,
13
+ Errno::ETIMEDOUT,
14
+ Net::IMAP::NoResponseError,
15
+ OpenSSL::SSL::SSLError
16
+ ]
17
+
18
+ # Regex to capture the individual fields in an IMAP fetch command.
19
+ REGEX_FIELDS = /([0-9A-Z\.]+\[[^\]]+\](?:<[0-9\.]+>)?|[0-9A-Z\.]+)/
20
+
21
+ # Regex to capture a Message-Id header.
22
+ REGEX_MESSAGE_ID = /message-id\s*:\s*(\S+)/i
23
+
24
+ # URI format validation regex.
25
+ REGEX_URI = URI.regexp(['imap', 'imaps'])
26
+
27
+ # Minimum time (in seconds) allowed between mailbox scans.
28
+ SCAN_INTERVAL = 60
29
+
30
+ # Larch::IMAP::Message represents a transferable IMAP message which can be
31
+ # passed between Larch::IMAP instances.
32
+ Message = Struct.new(:id, :envelope, :rfc822, :flags, :internaldate)
33
+
34
+ # Initializes a new Larch::IMAP instance that will connect to the specified
35
+ # IMAP URI and authenticate using the specified _username_ and _password_.
36
+ #
37
+ # The following options may also be specified:
38
+ #
39
+ # [:create_mailbox]
40
+ # If +true+, the specified mailbox will be created if necessary.
41
+ #
42
+ # [:fast_scan]
43
+ # If +true+, a faster but less accurate method will be used to scan
44
+ # mailboxes. This will speed up the initial mailbox scan, but will also
45
+ # reduce the effectiveness of the message unique id generator. This is
46
+ # probably acceptable when copying a very large mailbox to an empty mailbox,
47
+ # but if the destination already contains messages, using this option is not
48
+ # advised.
49
+ #
50
+ # [:max_retries]
51
+ # After a recoverable error occurs, retry the operation up to this many
52
+ # times. Default is 3.
53
+ #
54
+ def initialize(uri, username, password, options = {})
55
+ raise ArgumentError, "not an IMAP URI: #{uri}" unless uri.is_a?(URI) || uri =~ REGEX_URI
56
+ raise ArgumentError, "must provide a username and password" unless username && password
57
+ raise ArgumentError, "options must be a Hash" unless options.is_a?(Hash)
58
+
59
+ @uri = uri.is_a?(URI) ? uri : URI(uri)
60
+ @username = username
61
+ @password = password
62
+ @options = {:max_retries => 3}.merge(options)
63
+
64
+ @ids = {}
65
+ @imap = nil
66
+ @last_id = 0
67
+ @last_scan = nil
68
+ @message_ids = nil
69
+ @mutex = Mutex.new
70
+
71
+ # Create private convenience methods (debug, info, warn, etc.) to make
72
+ # logging easier.
73
+ Logger::LEVELS.each_key do |level|
74
+ IMAP.class_eval do
75
+ define_method(level) do |msg|
76
+ Larch.log.log(level, "#{@username}@#{host}: #{msg}")
77
+ end
78
+
79
+ private level
80
+ end
81
+ end
82
+ end
83
+
84
+ # Appends the specified Larch::IMAP::Message to this mailbox if it doesn't
85
+ # already exist. Returns +true+ if the message was appended successfully,
86
+ # +false+ if the message already exists in the mailbox.
87
+ def append(message)
88
+ raise ArgumentError, "must provide a Larch::IMAP::Message object" unless message.is_a?(Message)
89
+ return false if has_message?(message)
90
+
91
+ safely do
92
+ @mutex.synchronize do
93
+ begin
94
+ @imap.select(mailbox)
95
+ rescue Net::IMAP::NoResponseError => e
96
+ if @options[:create_mailbox]
97
+ info "creating mailbox: #{mailbox}"
98
+ @imap.create(mailbox)
99
+ retry
100
+ end
101
+
102
+ raise
103
+ end
104
+ end
105
+
106
+ debug "appending message: #{message.id}"
107
+ @imap.append(mailbox, message.rfc822, message.flags, message.internaldate)
108
+ end
109
+
110
+ true
111
+ end
112
+ alias << append
113
+
114
+ # Connects to the IMAP server and logs in if a connection hasn't already been
115
+ # established.
116
+ def connect
117
+ return if @imap
118
+ safely {} # connect, but do nothing else
119
+ end
120
+
121
+ # Closes the IMAP connection if one is currently open.
122
+ def disconnect
123
+ return unless @imap
124
+
125
+ @imap.disconnect
126
+ @imap = nil
127
+
128
+ info "disconnected"
129
+ end
130
+ synchronized :disconnect
131
+
132
+ # Iterates through Larch message ids in this mailbox, yielding each one to the
133
+ # provided block.
134
+ def each
135
+ ids = @mutex.synchronize do
136
+ unsync_scan_mailbox
137
+ @ids
138
+ end
139
+
140
+ ids.each_key {|id| yield id }
141
+ end
142
+
143
+ # Gets a Net::IMAP::Envelope for the specified message id.
144
+ def envelope(message_id)
145
+ scan_mailbox
146
+ uid = @ids[message_id]
147
+
148
+ raise NotFoundError, "message not found: #{message_id}" if uid.nil?
149
+
150
+ debug "fetching envelope: #{message_id}"
151
+ imap_uid_fetch([uid], 'ENVELOPE').first.attr['ENVELOPE']
152
+ end
153
+
154
+ # Fetches a Larch::IMAP::Message struct representing the message with the
155
+ # specified Larch message id.
156
+ def fetch(message_id, peek = false)
157
+ scan_mailbox
158
+ uid = @ids[message_id]
159
+
160
+ raise NotFoundError, "message not found: #{message_id}" if uid.nil?
161
+
162
+ debug "#{peek ? 'peeking at' : 'fetching'} message: #{message_id}"
163
+ data = imap_uid_fetch([uid], [(peek ? 'BODY.PEEK[]' : 'BODY[]'), 'FLAGS', 'INTERNALDATE', 'ENVELOPE']).first
164
+
165
+ Message.new(message_id, data.attr['ENVELOPE'], data.attr['BODY[]'],
166
+ data.attr['FLAGS'], Time.parse(data.attr['INTERNALDATE']))
167
+ end
168
+ alias [] fetch
169
+
170
+ # Returns +true+ if a message with the specified Larch <em>message_id</em>
171
+ # exists in this mailbox, +false+ otherwise.
172
+ def has_message?(message_id)
173
+ scan_mailbox
174
+ @ids.has_key?(message_id)
175
+ end
176
+
177
+ # Gets the IMAP hostname.
178
+ def host
179
+ @uri.host
180
+ end
181
+
182
+ # Gets the number of messages in this mailbox.
183
+ def length
184
+ scan_mailbox
185
+ @ids.length
186
+ end
187
+ alias size length
188
+
189
+ # Gets the IMAP mailbox.
190
+ def mailbox
191
+ mb = @uri.path[1..-1]
192
+ mb.nil? || mb.empty? ? 'INBOX' : CGI.unescape(mb)
193
+ end
194
+
195
+ # Same as fetch, but doesn't mark the message as seen.
196
+ def peek(message_id)
197
+ fetch(message_id, true)
198
+ end
199
+
200
+ # Gets the IMAP port number.
201
+ def port
202
+ @uri.port || (ssl? ? 993 : 143)
203
+ end
204
+
205
+ # Fetches message headers from the current mailbox.
206
+ def scan_mailbox
207
+ return if @last_scan && (Time.now - @last_scan) < SCAN_INTERVAL
208
+
209
+ last_id = safely do
210
+ begin
211
+ @imap.examine(mailbox)
212
+ rescue Net::IMAP::NoResponseError => e
213
+ return if @options[:create_mailbox]
214
+ raise FatalError, "unable to open mailbox: #{e.message}"
215
+ end
216
+
217
+ @imap.responses['EXISTS'].last
218
+ end
219
+
220
+ @last_scan = Time.now
221
+ return if last_id == @last_id
222
+
223
+ range = (@last_id + 1)..last_id
224
+ @last_id = last_id
225
+
226
+ info "fetching message headers #{range}" <<
227
+ (@options[:fast_scan] ? ' (fast scan)' : '')
228
+
229
+ fields = if @options[:fast_scan]
230
+ ['UID', 'RFC822.SIZE', 'INTERNALDATE']
231
+ else
232
+ "(UID BODY.PEEK[HEADER.FIELDS (MESSAGE-ID)] RFC822.SIZE INTERNALDATE)"
233
+ end
234
+
235
+ imap_fetch(range, fields).each do |data|
236
+ id = create_id(data)
237
+
238
+ unless uid = data.attr['UID']
239
+ error "UID not in IMAP response for message: #{id}"
240
+ next
241
+ end
242
+
243
+ if @ids.has_key?(id) && Larch.log.level == :debug
244
+ envelope = imap_uid_fetch([uid], 'ENVELOPE').first.attr['ENVELOPE']
245
+ debug "duplicate message? #{id} (Subject: #{envelope.subject})"
246
+ end
247
+
248
+ @ids[id] = uid
249
+ end
250
+ end
251
+ synchronized :scan_mailbox
252
+
253
+ # Gets the SSL status.
254
+ def ssl?
255
+ @uri.scheme == 'imaps'
256
+ end
257
+
258
+ # Gets the IMAP URI.
259
+ def uri
260
+ @uri.to_s
261
+ end
262
+
263
+ private
264
+
265
+ # Creates an id suitable for uniquely identifying a specific message across
266
+ # servers (we hope).
267
+ #
268
+ # If the given message data includes a valid Message-Id header, then that will
269
+ # be used to generate an MD5 hash. Otherwise, the hash will be generated based
270
+ # on the message's RFC822.SIZE and INTERNALDATE.
271
+ def create_id(data)
272
+ ['RFC822.SIZE', 'INTERNALDATE'].each do |a|
273
+ raise FatalError, "requested data not in IMAP response: #{a}" unless data.attr[a]
274
+ end
275
+
276
+ if data.attr['BODY[HEADER.FIELDS (MESSAGE-ID)]'] =~ REGEX_MESSAGE_ID
277
+ Digest::MD5.hexdigest($1)
278
+ else
279
+ Digest::MD5.hexdigest(sprintf('%d%d', data.attr['RFC822.SIZE'],
280
+ Time.parse(data.attr['INTERNALDATE']).to_i))
281
+ end
282
+ end
283
+
284
+ # Fetches the specified _fields_ for the specified message sequence id(s) from
285
+ # the IMAP server.
286
+ def imap_fetch(ids, fields)
287
+ data = safely { @imap.fetch(ids, fields) }
288
+
289
+ # If fields isn't an array, make it one.
290
+ fields = REGEX_FIELDS.match(fields).captures unless fields.is_a?(Array)
291
+
292
+ # Translate BODY.PEEK to BODY in fields, since that's how it'll come back in
293
+ # the response.
294
+ fields.map! {|f| f.sub(/^BODY\.PEEK\[/, 'BODY[') }
295
+
296
+ good_results = ids.respond_to?(:member?) ?
297
+ data.find_all {|i| ids.member?(i.seqno) && fields.all? {|f| i.attr.member?(f) }} :
298
+ data.find_all {|i| ids == i.seqno && fields.all? {|f| i.attr.member?(f) }}
299
+
300
+ if good_results.empty?
301
+ raise FatalError, "0 out of #{data.length} items in IMAP response for message(s) #{ids} contained all requested fields: #{fields.join(', ')}"
302
+ elsif good_results.length < data.length
303
+ error "IMAP server sent #{good_results.length} results in response to a request for #{data.length} messages"
304
+ end
305
+
306
+ good_results
307
+ end
308
+
309
+ # Fetches the specified _fields_ for the specified UID(s) from the IMAP
310
+ # server.
311
+ def imap_uid_fetch(uids, fields)
312
+ data = safely { @imap.uid_fetch(uids, fields) }
313
+
314
+ # If fields isn't an array, make it one.
315
+ fields = REGEX_FIELDS.match(fields).captures unless fields.is_a?(Array)
316
+
317
+ # Translate BODY.PEEK to BODY in fields, since that's how it'll come back in
318
+ # the response.
319
+ fields.map! {|f| f.sub(/^BODY\.PEEK\[/, 'BODY[') }
320
+
321
+ good_results = data.find_all do |i|
322
+ i.attr.member?('UID') && uids.member?(i.attr['UID']) &&
323
+ fields.all? {|f| i.attr.member?(f) }
324
+ end
325
+
326
+ if good_results.empty?
327
+ raise FatalError, "0 out of #{data.length} items in IMAP response for message UID(s) #{uids.join(', ')} contained all requested fields: #{fields.join(', ')}"
328
+ elsif good_results.length < data.length
329
+ error "IMAP server sent #{good_results.length} results in response to a request for #{data.length} messages"
330
+ end
331
+
332
+ good_results
333
+ end
334
+
335
+ # Connect if necessary, execute the given block, retry up to 3 times if a
336
+ # recoverable error occurs, die if an unrecoverable error occurs.
337
+ def safely
338
+ retries = 0
339
+
340
+ begin
341
+ unsafe_connect unless @imap
342
+ rescue *RECOVERABLE_ERRORS => e
343
+ info "#{e.class.name}: #{e.message} (will retry)"
344
+ raise unless (retries += 1) <= @options[:max_retries]
345
+
346
+ @imap = nil
347
+ sleep 1 * retries
348
+ retry
349
+ end
350
+
351
+ retries = 0
352
+
353
+ begin
354
+ yield
355
+ rescue *RECOVERABLE_ERRORS => e
356
+ info "#{e.class.name}: #{e.message} (will retry)"
357
+ raise unless (retries += 1) <= @options[:max_retries]
358
+
359
+ sleep 1 * retries
360
+ retry
361
+ end
362
+
363
+ rescue Net::IMAP::NoResponseError => e
364
+ raise Error, "#{e.class.name}: #{e.message} (giving up)"
365
+
366
+ rescue IOError, Net::IMAP::Error, OpenSSL::SSL::SSLError, SocketError, SystemCallError => e
367
+ raise FatalError, "#{e.class.name}: #{e.message} (giving up)"
368
+ end
369
+
370
+ def unsafe_connect
371
+ info "connecting..."
372
+
373
+ exception = nil
374
+
375
+ Thread.new do
376
+ begin
377
+ @imap = Net::IMAP.new(host, port, ssl?)
378
+
379
+ info "connected on port #{port}" << (ssl? ? ' using SSL' : '')
380
+
381
+ auth_methods = ['PLAIN']
382
+ tried = []
383
+
384
+ ['LOGIN', 'CRAM-MD5'].each do |method|
385
+ auth_methods << method if @imap.capability.include?("AUTH=#{method}")
386
+ end
387
+
388
+ begin
389
+ tried << method = auth_methods.pop
390
+
391
+ debug "authenticating using #{method}"
392
+
393
+ if method == 'PLAIN'
394
+ @imap.login(@username, @password)
395
+ else
396
+ @imap.authenticate(method, @username, @password)
397
+ end
398
+
399
+ info "authenticated using #{method}"
400
+
401
+ rescue Net::IMAP::BadResponseError, Net::IMAP::NoResponseError => e
402
+ debug "#{method} auth failed: #{e.message}"
403
+ retry unless auth_methods.empty?
404
+
405
+ raise e, "#{e.message} (tried #{tried.join(', ')})"
406
+ end
407
+
408
+ rescue => e
409
+ exception = e
410
+ error e.message
411
+ end
412
+ end.join
413
+
414
+ raise exception if exception
415
+ end
416
+ end
417
+
418
+ end
@@ -0,0 +1,49 @@
1
+ module Larch
2
+
3
+ class Logger
4
+ attr_reader :level, :output
5
+
6
+ LEVELS = {
7
+ :fatal => 0,
8
+ :error => 1,
9
+ :warn => 2,
10
+ :info => 3,
11
+ :debug => 4
12
+ }
13
+
14
+ def initialize(level = :info, output = $stdout)
15
+ self.level = level.to_sym
16
+ self.output = output
17
+ end
18
+
19
+ def const_missing(name)
20
+ return LEVELS[name] if LEVELS.key?(name)
21
+ raise NameError, "uninitialized constant: #{name}"
22
+ end
23
+
24
+ def method_missing(name, *args)
25
+ return log(name, *args) if LEVELS.key?(name)
26
+ raise NoMethodError, "undefined method: #{name}"
27
+ end
28
+
29
+ def level=(level)
30
+ raise ArgumentError, "invalid log level: #{level}" unless LEVELS.key?(level)
31
+ @level = level
32
+ end
33
+
34
+ def log(level, msg)
35
+ return true if LEVELS[level] > LEVELS[@level] || msg.nil? || msg.empty?
36
+ @output.puts "[#{Time.new.strftime('%b %d %H:%M:%S')}] [#{level}] #{msg}"
37
+ true
38
+
39
+ rescue => e
40
+ false
41
+ end
42
+
43
+ def output=(output)
44
+ raise ArgumentError, "output must be an instance of class IO" unless output.is_a?(IO)
45
+ @output = output
46
+ end
47
+ end
48
+
49
+ end
@@ -0,0 +1,17 @@
1
+ class Module
2
+
3
+ # Java-style whole-method synchronization, shamelessly stolen from Sup:
4
+ # http://sup.rubyforge.org. Assumes the existence of a <tt>@mutex</tt>
5
+ # variable.
6
+ def synchronized(*methods)
7
+ methods.each do |method|
8
+ class_eval <<-EOF
9
+ alias unsync_#{method} #{method}
10
+ def #{method}(*a, &b)
11
+ @mutex.synchronize { unsync_#{method}(*a, &b) }
12
+ end
13
+ EOF
14
+ end
15
+ end
16
+
17
+ end
@@ -0,0 +1,9 @@
1
+ module Larch
2
+ APP_NAME = 'Larch'
3
+ APP_VERSION = '1.0.0'
4
+ APP_AUTHOR = 'Ryan Grove'
5
+ APP_EMAIL = 'ryan@wonko.com'
6
+ APP_URL = 'http://github.com/rgrove/larch/'
7
+ APP_COPYRIGHT = 'Copyright (c) 2009 Ryan Grove <ryan@wonko.com>. All ' <<
8
+ 'rights reserved.'
9
+ end
metadata ADDED
@@ -0,0 +1,79 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: larch
3
+ version: !ruby/object:Gem::Version
4
+ version: 1.0.0
5
+ platform: ruby
6
+ authors:
7
+ - Ryan Grove
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+
12
+ date: 2009-03-16 00:00:00 -07:00
13
+ default_executable:
14
+ dependencies:
15
+ - !ruby/object:Gem::Dependency
16
+ name: highline
17
+ type: :runtime
18
+ version_requirement:
19
+ version_requirements: !ruby/object:Gem::Requirement
20
+ requirements:
21
+ - - ~>
22
+ - !ruby/object:Gem::Version
23
+ version: 1.5.0
24
+ version:
25
+ - !ruby/object:Gem::Dependency
26
+ name: trollop
27
+ type: :runtime
28
+ version_requirement:
29
+ version_requirements: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ~>
32
+ - !ruby/object:Gem::Version
33
+ version: "1.13"
34
+ version:
35
+ description:
36
+ email: ryan@wonko.com
37
+ executables:
38
+ - larch
39
+ extensions: []
40
+
41
+ extra_rdoc_files: []
42
+
43
+ files:
44
+ - LICENSE
45
+ - bin/larch
46
+ - lib/larch.rb
47
+ - lib/larch/errors.rb
48
+ - lib/larch/imap.rb
49
+ - lib/larch/logger.rb
50
+ - lib/larch/util.rb
51
+ - lib/larch/version.rb
52
+ has_rdoc: false
53
+ homepage: http://github.com/rgrove/larch/
54
+ post_install_message:
55
+ rdoc_options: []
56
+
57
+ require_paths:
58
+ - lib
59
+ required_ruby_version: !ruby/object:Gem::Requirement
60
+ requirements:
61
+ - - ">="
62
+ - !ruby/object:Gem::Version
63
+ version: 1.8.6
64
+ version:
65
+ required_rubygems_version: !ruby/object:Gem::Requirement
66
+ requirements:
67
+ - - ">="
68
+ - !ruby/object:Gem::Version
69
+ version: "0"
70
+ version:
71
+ requirements: []
72
+
73
+ rubyforge_project:
74
+ rubygems_version: 1.3.1
75
+ signing_key:
76
+ specification_version: 2
77
+ summary: Larch syncs messages from one IMAP server to another. Awesomely.
78
+ test_files: []
79
+