mirror of
https://github.com/mjl-/mox.git
synced 2025-07-15 03:34:35 +03:00
change javascript into typescript for webaccount and webadmin interface
all ui frontend code is now in typescript. we no longer need jshint, and we build the frontend code during "make build". this also changes tlsrpt types for a Report, not encoding field names with dashes, but to keep them valid identifiers in javascript. this makes it more conveniently to work with in the frontend, and works around a sherpats limitation.
This commit is contained in:
@ -15,6 +15,7 @@ import (
|
||||
"net"
|
||||
"net/http"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
@ -41,12 +42,22 @@ func init() {
|
||||
|
||||
var pkglog = mlog.New("webaccount", nil)
|
||||
|
||||
//go:embed accountapi.json
|
||||
//go:embed api.json
|
||||
var accountapiJSON []byte
|
||||
|
||||
//go:embed account.html
|
||||
var accountHTML []byte
|
||||
|
||||
//go:embed account.js
|
||||
var accountJS []byte
|
||||
|
||||
var webaccountFile = &mox.WebappFile{
|
||||
HTML: accountHTML,
|
||||
JS: accountJS,
|
||||
HTMLPath: filepath.FromSlash("webaccount/account.html"),
|
||||
JSPath: filepath.FromSlash("webaccount/account.js"),
|
||||
}
|
||||
|
||||
var accountDoc = mustParseAPI("account", accountapiJSON)
|
||||
|
||||
var accountSherpaHandler http.Handler
|
||||
@ -225,21 +236,15 @@ func Handle(w http.ResponseWriter, r *http.Request) {
|
||||
|
||||
switch r.URL.Path {
|
||||
case "/":
|
||||
if r.Method != "GET" {
|
||||
http.Error(w, "405 - method not allowed - get required", http.StatusMethodNotAllowed)
|
||||
switch r.Method {
|
||||
default:
|
||||
http.Error(w, "405 - method not allowed - use get", http.StatusMethodNotAllowed)
|
||||
return
|
||||
case "GET", "HEAD":
|
||||
}
|
||||
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
||||
w.Header().Set("Cache-Control", "no-cache; max-age=0")
|
||||
// We typically return the embedded admin.html, but during development it's handy
|
||||
// to load from disk.
|
||||
f, err := os.Open("webaccount/account.html")
|
||||
if err == nil {
|
||||
defer f.Close()
|
||||
_, _ = io.Copy(w, f)
|
||||
} else {
|
||||
_, _ = w.Write(accountHTML)
|
||||
}
|
||||
|
||||
webaccountFile.Serve(ctx, log, w, r)
|
||||
return
|
||||
|
||||
case "/mail-export-maildir.tgz", "/mail-export-maildir.zip", "/mail-export-mbox.tgz", "/mail-export-mbox.zip":
|
||||
maildir := strings.Contains(r.URL.Path, "maildir")
|
||||
@ -322,7 +327,7 @@ func Handle(w http.ResponseWriter, r *http.Request) {
|
||||
tmpf = nil // importStart is now responsible for cleanup.
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
_ = json.NewEncoder(w).Encode(map[string]string{"ImportToken": token})
|
||||
_ = json.NewEncoder(w).Encode(ImportProgress{Token: token})
|
||||
|
||||
default:
|
||||
if strings.HasPrefix(r.URL.Path, "/api/") {
|
||||
@ -334,6 +339,12 @@ func Handle(w http.ResponseWriter, r *http.Request) {
|
||||
}
|
||||
}
|
||||
|
||||
// ImportProgress is returned after uploading a file to import.
|
||||
type ImportProgress struct {
|
||||
// For fetching progress, or cancelling an import.
|
||||
Token string
|
||||
}
|
||||
|
||||
type ctxKey string
|
||||
|
||||
var authCtxKey ctxKey = "account"
|
||||
@ -414,3 +425,8 @@ func (Account) ImportAbort(ctx context.Context, importToken string) error {
|
||||
importers.Abort <- req
|
||||
return <-req.Response
|
||||
}
|
||||
|
||||
// Types exposes types not used in API method signatures, such as the import form upload.
|
||||
func (Account) Types() (importProgress ImportProgress) {
|
||||
return
|
||||
}
|
||||
|
@ -20,718 +20,15 @@ table > tbody > tr:nth-child(odd) { background-color: #f8f8f8; }
|
||||
p { margin-bottom: 1em; max-width: 50em; }
|
||||
[title] { text-decoration: underline; text-decoration-style: dotted; }
|
||||
fieldset { border: 0; }
|
||||
.scriptswitch { text-decoration: underline #dca053 2px; }
|
||||
#page { opacity: 1; animation: fadein 0.15s ease-in; }
|
||||
#page.loading { opacity: 0.1; animation: fadeout 1s ease-out; }
|
||||
@keyframes fadein { 0% { opacity: 0 } 100% { opacity: 1 } }
|
||||
@keyframes fadeout { 0% { opacity: 1 } 100% { opacity: 0.1 } }
|
||||
</style>
|
||||
<script src="api/sherpa.js"></script>
|
||||
<script>api._sherpa.baseurl = 'api/'</script>
|
||||
</head>
|
||||
<body>
|
||||
<div id="page">Loading...</div>
|
||||
|
||||
<script>
|
||||
const [dom, style, attr, prop] = (function() {
|
||||
function _domKids(e, ...kl) {
|
||||
kl.forEach(k => {
|
||||
if (typeof k === 'string' || k instanceof String) {
|
||||
e.appendChild(document.createTextNode(k))
|
||||
} else if (k instanceof Node) {
|
||||
e.appendChild(k)
|
||||
} else if (Array.isArray(k)) {
|
||||
_domKids(e, ...k)
|
||||
} else if (typeof k === 'function') {
|
||||
if (!k.name) {
|
||||
throw new Error('function without name', k)
|
||||
}
|
||||
e.addEventListener(k.name, k)
|
||||
} else if (typeof k === 'object' && k !== null) {
|
||||
if (k.root) {
|
||||
e.appendChild(k.root)
|
||||
return
|
||||
}
|
||||
for (const key in k) {
|
||||
const value = k[key]
|
||||
if (key === '_prop') {
|
||||
for (const prop in value) {
|
||||
e[prop] = value[prop]
|
||||
}
|
||||
} else if (key === '_attr') {
|
||||
for (const prop in value) {
|
||||
e.setAttribute(prop, value[prop])
|
||||
}
|
||||
} else if (key === '_listen') {
|
||||
e.addEventListener(...value)
|
||||
} else {
|
||||
e.style[key] = value
|
||||
}
|
||||
}
|
||||
} else {
|
||||
console.log('bad kid', k)
|
||||
throw new Error('bad kid')
|
||||
}
|
||||
})
|
||||
}
|
||||
const _dom = (kind, ...kl) => {
|
||||
const t = kind.split('.')
|
||||
const e = document.createElement(t[0])
|
||||
for (let i = 1; i < t.length; i++) {
|
||||
e.classList.add(t[i])
|
||||
}
|
||||
_domKids(e, kl)
|
||||
return e
|
||||
}
|
||||
_dom._kids = function(e, ...kl) {
|
||||
while(e.firstChild) {
|
||||
e.removeChild(e.firstChild)
|
||||
}
|
||||
_domKids(e, kl)
|
||||
}
|
||||
const dom = new Proxy(_dom, {
|
||||
get: function(dom, prop) {
|
||||
if (prop in dom) {
|
||||
return dom[prop]
|
||||
}
|
||||
const fn = (...kl) => _dom(prop, kl)
|
||||
dom[prop] = fn
|
||||
return fn
|
||||
},
|
||||
apply: function(target, that, args) {
|
||||
if (args.length === 1 && typeof args[0] === 'object' && !Array.isArray(args[0])) {
|
||||
return {_attr: args[0]}
|
||||
}
|
||||
return _dom(...args)
|
||||
},
|
||||
})
|
||||
const style = x => x
|
||||
const attr = x => { return {_attr: x} }
|
||||
const prop = x => { return {_prop: x} }
|
||||
return [dom, style, attr, prop]
|
||||
})()
|
||||
|
||||
const link = (href, anchorOpt) => dom.a(attr({href: href, rel: 'noopener noreferrer'}), anchorOpt || href)
|
||||
|
||||
const crumblink = (text, link) => dom.a(text, attr({href: link}))
|
||||
const crumbs = (...l) => [dom.h1(l.map((e, index) => index === 0 ? e : [' / ', e])), dom.br()]
|
||||
|
||||
const footer = dom.div(
|
||||
style({marginTop: '6ex', opacity: 0.75}),
|
||||
link('https://github.com/mjl-/mox', 'mox'),
|
||||
' ',
|
||||
api._sherpa.version,
|
||||
)
|
||||
|
||||
const domainName = d => {
|
||||
return d.Unicode || d.ASCII
|
||||
}
|
||||
|
||||
const domainString = d => {
|
||||
if (d.Unicode) {
|
||||
return d.Unicode+" ("+d.ASCII+")"
|
||||
}
|
||||
return d.ASCII
|
||||
}
|
||||
|
||||
const box = (color, ...l) => [
|
||||
dom.div(
|
||||
style({
|
||||
display: 'inline-block',
|
||||
padding: '.25em .5em',
|
||||
backgroundColor: color,
|
||||
borderRadius: '3px',
|
||||
margin: '.5ex 0',
|
||||
}),
|
||||
l,
|
||||
),
|
||||
dom.br(),
|
||||
]
|
||||
|
||||
const green = '#1dea20'
|
||||
const yellow = '#ffe400'
|
||||
const red = '#ff7443'
|
||||
const blue = '#8bc8ff'
|
||||
|
||||
const index = async () => {
|
||||
const [accountFullName, domain, destinations] = await api.Account()
|
||||
|
||||
let fullNameForm, fullNameFieldset, fullName
|
||||
let passwordForm, passwordFieldset, password1, password2, passwordHint
|
||||
|
||||
let importForm, importFieldset, mailboxFile, mailboxFileHint, mailboxPrefix, mailboxPrefixHint, importProgress, importAbortBox, importAbort
|
||||
|
||||
const importTrack = async (token) => {
|
||||
const importConnection = dom.div('Waiting for updates...')
|
||||
importProgress.appendChild(importConnection)
|
||||
|
||||
let countsTbody
|
||||
let counts = {} // mailbox -> elem
|
||||
|
||||
let problems // element
|
||||
|
||||
await new Promise((resolve, reject) => {
|
||||
const eventSource = new window.EventSource('importprogress?token=' + encodeURIComponent(token))
|
||||
eventSource.addEventListener('open', function(e) {
|
||||
console.log('eventsource open', {e})
|
||||
dom._kids(importConnection, dom.div('Waiting for updates, connected...'))
|
||||
|
||||
dom._kids(importAbortBox,
|
||||
importAbort=dom.button('Abort import', attr({title: 'If the import is not yet finished, it can be aborted and no messages will have been imported.'}), async function click(e) {
|
||||
try {
|
||||
await api.ImportAbort(token)
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + err.message)
|
||||
}
|
||||
// On success, the event source will get an aborted notification and shutdown the connection.
|
||||
})
|
||||
)
|
||||
})
|
||||
eventSource.addEventListener('error', function(e) {
|
||||
console.log('eventsource error', {e})
|
||||
dom._kids(importConnection, box(red, 'Connection error'))
|
||||
reject({message: 'Connection error'})
|
||||
})
|
||||
eventSource.addEventListener('count', (e) => {
|
||||
const data = JSON.parse(e.data) // {Mailbox: ..., Count: ...}
|
||||
console.log('import count event', {e, data})
|
||||
if (!countsTbody) {
|
||||
importProgress.appendChild(
|
||||
dom.div(
|
||||
dom.br(),
|
||||
dom.h3('Importing mailboxes and messages...'),
|
||||
dom.table(
|
||||
dom.thead(
|
||||
dom.tr(dom.th('Mailbox'), dom.th('Messages')),
|
||||
),
|
||||
countsTbody=dom.tbody(),
|
||||
),
|
||||
)
|
||||
)
|
||||
}
|
||||
let elem = counts[data.Mailbox]
|
||||
if (!elem) {
|
||||
countsTbody.appendChild(
|
||||
dom.tr(
|
||||
dom.td(data.Mailbox),
|
||||
elem=dom.td(style({textAlign: 'right'}), ''+data.Count),
|
||||
),
|
||||
)
|
||||
counts[data.Mailbox] = elem
|
||||
}
|
||||
dom._kids(elem, ''+data.Count)
|
||||
})
|
||||
eventSource.addEventListener('problem', (e) => {
|
||||
const data = JSON.parse(e.data) // {Message: ...}
|
||||
console.log('import problem event', {e, data})
|
||||
if (!problems) {
|
||||
importProgress.appendChild(
|
||||
dom.div(
|
||||
dom.br(),
|
||||
dom.h3('Problems during import'),
|
||||
problems=dom.div(),
|
||||
),
|
||||
)
|
||||
}
|
||||
problems.appendChild(dom.div(box(yellow, data.Message)))
|
||||
})
|
||||
eventSource.addEventListener('step', (e) => {
|
||||
const data = JSON.parse(e.data) // {Title: ...}
|
||||
console.log('import step event', {e, data})
|
||||
importProgress.appendChild(dom.div(dom.br(), box(blue, 'Step: '+data.Title)))
|
||||
})
|
||||
eventSource.addEventListener('done', (e) => {
|
||||
console.log('import done event', {e})
|
||||
importProgress.appendChild(dom.div(dom.br(), box(blue, 'Import finished')))
|
||||
|
||||
eventSource.close()
|
||||
dom._kids(importConnection)
|
||||
dom._kids(importAbortBox)
|
||||
window.sessionStorage.removeItem('ImportToken')
|
||||
|
||||
resolve()
|
||||
})
|
||||
eventSource.addEventListener('aborted', function(e) {
|
||||
console.log('import aborted event', {e})
|
||||
|
||||
importProgress.appendChild(dom.div(dom.br(), box(red, 'Import aborted, no message imported')))
|
||||
|
||||
eventSource.close()
|
||||
dom._kids(importConnection)
|
||||
dom._kids(importAbortBox)
|
||||
window.sessionStorage.removeItem('ImportToken')
|
||||
|
||||
reject({message: 'Import aborted'})
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
const page = document.getElementById('page')
|
||||
dom._kids(page,
|
||||
crumbs('Mox Account'),
|
||||
dom.p('NOTE: Not all account settings can be configured through these pages yet. See the configuration file for more options.'),
|
||||
dom.div(
|
||||
'Default domain: ',
|
||||
domain.ASCII ? domainString(domain) : '(none)',
|
||||
),
|
||||
dom.br(),
|
||||
|
||||
fullNameForm=dom.form(
|
||||
fullNameFieldset=dom.fieldset(
|
||||
dom.label(
|
||||
style({display: 'inline-block'}),
|
||||
'Full name',
|
||||
dom.br(),
|
||||
fullName=dom.input(attr({value: accountFullName, title: 'Name to use in From header when composing messages. Can be overridden per configured address.'})),
|
||||
|
||||
),
|
||||
' ',
|
||||
dom.button('Save'),
|
||||
),
|
||||
async function submit(e) {
|
||||
e.preventDefault()
|
||||
fullNameFieldset.disabled = true
|
||||
try {
|
||||
await api.AccountSaveFullName(fullName.value)
|
||||
fullName.setAttribute('value', fullName.value)
|
||||
fullNameForm.reset()
|
||||
window.alert('Full name has been changed.')
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + err.message)
|
||||
} finally {
|
||||
fullNameFieldset.disabled = false
|
||||
}
|
||||
},
|
||||
),
|
||||
dom.br(),
|
||||
|
||||
dom.h2('Addresses'),
|
||||
dom.ul(
|
||||
Object.entries(destinations).sort().map(t =>
|
||||
dom.li(
|
||||
dom.a(t[0], attr({href: '#destinations/'+t[0]})),
|
||||
t[0].startsWith('@') ? ' (catchall)' : [],
|
||||
),
|
||||
),
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Change password'),
|
||||
passwordForm=dom.form(
|
||||
passwordFieldset=dom.fieldset(
|
||||
dom.label(
|
||||
style({display: 'inline-block'}),
|
||||
'New password',
|
||||
dom.br(),
|
||||
password1=dom.input(attr({type: 'password', required: ''}), function focus() {
|
||||
passwordHint.style.display = ''
|
||||
}),
|
||||
),
|
||||
' ',
|
||||
dom.label(
|
||||
style({display: 'inline-block'}),
|
||||
'New password repeat',
|
||||
dom.br(),
|
||||
password2=dom.input(attr({type: 'password', required: ''})),
|
||||
),
|
||||
' ',
|
||||
dom.button('Change password'),
|
||||
),
|
||||
passwordHint=dom.div(
|
||||
style({display: 'none', marginTop: '.5ex'}),
|
||||
dom.button('Generate random password', attr({type: 'button'}), function click(e) {
|
||||
e.preventDefault()
|
||||
let b = new Uint8Array(1)
|
||||
let s = ''
|
||||
const chars = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*-_;:,<.>/'
|
||||
while (s.length < 12) {
|
||||
self.crypto.getRandomValues(b)
|
||||
if (Math.ceil(b[0]/chars.length)*chars.length > 255) {
|
||||
continue // Prevent bias.
|
||||
}
|
||||
s += chars[b[0]%chars.length]
|
||||
}
|
||||
password1.type = 'text'
|
||||
password2.type = 'text'
|
||||
password1.value = s
|
||||
password2.value = s
|
||||
}),
|
||||
dom('div.text',
|
||||
box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'),
|
||||
),
|
||||
),
|
||||
async function submit(e) {
|
||||
e.stopPropagation()
|
||||
e.preventDefault()
|
||||
if (!password1.value || password1.value !== password2.value) {
|
||||
window.alert('Passwords do not match.')
|
||||
return
|
||||
}
|
||||
passwordFieldset.disabled = true
|
||||
try {
|
||||
await api.SetPassword(password1.value)
|
||||
window.alert('Password has been changed.')
|
||||
passwordForm.reset()
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + err.message)
|
||||
} finally {
|
||||
passwordFieldset.disabled = false
|
||||
}
|
||||
},
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Export'),
|
||||
dom.p('Export all messages in all mailboxes. In maildir or mbox format, as .zip or .tgz file.'),
|
||||
dom.ul(
|
||||
dom.li(dom.a('mail-export-maildir.tgz', attr({href: 'mail-export-maildir.tgz'}))),
|
||||
dom.li(dom.a('mail-export-maildir.zip', attr({href: 'mail-export-maildir.zip'}))),
|
||||
dom.li(dom.a('mail-export-mbox.tgz', attr({href: 'mail-export-mbox.tgz'}))),
|
||||
dom.li(dom.a('mail-export-mbox.zip', attr({href: 'mail-export-mbox.zip'}))),
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Import'),
|
||||
dom.p('Import messages from a .zip or .tgz file with maildirs and/or mbox files.'),
|
||||
importForm=dom.form(
|
||||
async function submit(e) {
|
||||
e.preventDefault()
|
||||
e.stopPropagation()
|
||||
|
||||
const request = () => {
|
||||
return new Promise((resolve, reject) => {
|
||||
// Browsers can do everything. Except show a progress bar while uploading...
|
||||
let progressBox, progressPercentage, progressBar
|
||||
dom._kids(importProgress,
|
||||
progressBox=dom.div(
|
||||
dom.div('Uploading... ', progressPercentage=dom.span()),
|
||||
),
|
||||
)
|
||||
importProgress.style.display = ''
|
||||
|
||||
const xhr = new window.XMLHttpRequest()
|
||||
xhr.open('POST', 'import', true)
|
||||
xhr.upload.addEventListener('progress', (e) => {
|
||||
if (!e.lengthComputable) {
|
||||
return
|
||||
}
|
||||
const pct = Math.floor(100*e.loaded/e.total)
|
||||
dom._kids(progressPercentage, pct+'%')
|
||||
})
|
||||
xhr.addEventListener('load', () => {
|
||||
console.log('upload done', {xhr: xhr, status: xhr.status})
|
||||
if (xhr.status !== 200) {
|
||||
reject({message: 'status '+xhr.status})
|
||||
return
|
||||
}
|
||||
let resp
|
||||
try {
|
||||
resp = JSON.parse(xhr.responseText)
|
||||
} catch (err) {
|
||||
reject({message: 'parsing resonse json: '+err.message})
|
||||
return
|
||||
}
|
||||
resolve(resp)
|
||||
})
|
||||
xhr.addEventListener('error', (e) => reject({message: 'upload error', event: e}))
|
||||
xhr.addEventListener('abort', (e) => reject({message: 'upload aborted', event: e}))
|
||||
xhr.send(new window.FormData(importForm))
|
||||
})
|
||||
}
|
||||
try {
|
||||
const p = request()
|
||||
importFieldset.disabled = true
|
||||
const result = await p
|
||||
|
||||
try {
|
||||
window.sessionStorage.setItem('ImportToken', result.ImportToken)
|
||||
} catch (err) {
|
||||
console.log('storing import token in session storage', {err})
|
||||
// Ignore error, could be some browser security thing like private browsing.
|
||||
}
|
||||
|
||||
await importTrack(result.ImportToken)
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: '+err.message)
|
||||
} finally {
|
||||
importFieldset.disabled = false
|
||||
}
|
||||
},
|
||||
importFieldset=dom.fieldset(
|
||||
dom.div(
|
||||
style({marginBottom: '1ex'}),
|
||||
dom.label(
|
||||
dom.div(style({marginBottom: '.5ex'}), 'File'),
|
||||
mailboxFile=dom.input(attr({type: 'file', required: '', name: 'file'}), function focus() {
|
||||
mailboxFileHint.style.display = ''
|
||||
}),
|
||||
),
|
||||
mailboxFileHint=dom.p(style({display: 'none', fontStyle: 'italic', marginTop: '.5ex'}), 'This file must either be a zip file or a gzipped tar file with mbox and/or maildir mailboxes. For maildirs, an optional file "dovecot-keywords" is read additional keywords, like Forwarded/Junk/NotJunk. If an imported mailbox already exists by name, messages are added to the existing mailbox. If a mailbox does not yet exist it will be created.'),
|
||||
),
|
||||
dom.div(
|
||||
style({marginBottom: '1ex'}),
|
||||
dom.label(
|
||||
dom.div(style({marginBottom: '.5ex'}), 'Skip mailbox prefix (optional)'),
|
||||
mailboxPrefix=dom.input(attr({name: 'skipMailboxPrefix'}), function focus() {
|
||||
mailboxPrefixHint.style.display = ''
|
||||
}),
|
||||
),
|
||||
mailboxPrefixHint=dom.p(style({display: 'none', fontStyle: 'italic', marginTop: '.5ex'}), 'If set, any mbox/maildir path with this prefix will have it stripped before importing. For example, if all mailboxes are in a directory "Takeout", specify that path in the field above so mailboxes like "Takeout/Inbox.mbox" are imported into a mailbox called "Inbox" instead of "Takeout/Inbox".'),
|
||||
),
|
||||
dom.div(
|
||||
dom.button('Upload and import'),
|
||||
dom.p(style({fontStyle: 'italic', marginTop: '.5ex'}), 'The file is uploaded first, then its messages are imported, finally messages are matched for threading. Importing is done in a transaction, you can abort the entire import before it is finished.'),
|
||||
),
|
||||
),
|
||||
),
|
||||
importAbortBox=dom.div(), // Outside fieldset because it gets disabled, above progress because may be scrolling it down quickly with problems.
|
||||
importProgress=dom.div(
|
||||
style({display: 'none'}),
|
||||
),
|
||||
footer,
|
||||
)
|
||||
|
||||
// Try to show the progress of an earlier import session. The user may have just
|
||||
// refreshed the browser.
|
||||
let importToken
|
||||
try {
|
||||
importToken = window.sessionStorage.getItem('ImportToken')
|
||||
} catch (err) {
|
||||
console.log('looking up ImportToken in session storage', {err})
|
||||
return
|
||||
}
|
||||
if (!importToken) {
|
||||
return
|
||||
}
|
||||
importFieldset.disabled = true
|
||||
dom._kids(importProgress,
|
||||
dom.div(
|
||||
dom.div('Reconnecting to import...'),
|
||||
),
|
||||
)
|
||||
importProgress.style.display = ''
|
||||
importTrack(importToken)
|
||||
.catch((err) => {
|
||||
if (window.confirm('Error reconnecting to import. Remove this import session?')) {
|
||||
window.sessionStorage.removeItem('ImportToken')
|
||||
dom._kids(importProgress)
|
||||
importProgress.style.display = 'none'
|
||||
}
|
||||
})
|
||||
.finally(() => {
|
||||
importFieldset.disabled = false
|
||||
})
|
||||
}
|
||||
|
||||
const destination = async (name) => {
|
||||
const [_, domain, destinations] = await api.Account()
|
||||
let dest = destinations[name]
|
||||
if (!dest) {
|
||||
throw new Error('destination not found')
|
||||
}
|
||||
|
||||
let rulesetsTbody = dom.tbody()
|
||||
let rulesetsRows = []
|
||||
|
||||
const addRulesetsRow = (rs) => {
|
||||
let headersCell = dom.td()
|
||||
let headers = [] // Holds objects: {key, value, root}
|
||||
const addHeader = (k, v) => {
|
||||
let h = {}
|
||||
h.root = dom.div(
|
||||
h.key=dom.input(attr({value: k})),
|
||||
' ',
|
||||
h.value=dom.input(attr({value: v})),
|
||||
' ',
|
||||
dom.button('-', style({width: '1.5em'}), function click(e) {
|
||||
h.root.remove()
|
||||
headers = headers.filter(x => x !== h)
|
||||
if (headers.length === 0) {
|
||||
const b = dom.button('+', style({width: '1.5em'}), function click(e) {
|
||||
e.target.remove()
|
||||
addHeader('', '')
|
||||
})
|
||||
headersCell.appendChild(dom.div(style({textAlign: 'right'}), b))
|
||||
}
|
||||
}),
|
||||
' ',
|
||||
dom.button('+', style({width: '1.5em'}), function click(e) {
|
||||
addHeader('', '')
|
||||
}),
|
||||
)
|
||||
headers.push(h)
|
||||
headersCell.appendChild(h.root)
|
||||
}
|
||||
Object.entries(rs.HeadersRegexp || {}).sort().forEach(t =>
|
||||
addHeader(t[0], t[1])
|
||||
)
|
||||
if (Object.entries(rs.HeadersRegexp || {}).length === 0) {
|
||||
const b = dom.button('+', style({width: '1.5em'}), function click(e) {
|
||||
e.target.remove()
|
||||
addHeader('', '')
|
||||
})
|
||||
headersCell.appendChild(dom.div(style({textAlign: 'right'}), b))
|
||||
}
|
||||
|
||||
let row = {headers}
|
||||
row.root=dom.tr(
|
||||
dom.td(row.SMTPMailFromRegexp=dom.input(attr({value: rs.SMTPMailFromRegexp || ''}))),
|
||||
dom.td(row.VerifiedDomain=dom.input(attr({value: rs.VerifiedDomain || ''}))),
|
||||
headersCell,
|
||||
dom.td(dom.label(row.IsForward=dom.input(attr({type: 'checkbox'}), rs.IsForward ? attr({checked: ''}) : [] ))),
|
||||
dom.td(row.ListAllowDomain=dom.input(attr({value: rs.ListAllowDomain || ''}))),
|
||||
dom.td(row.AcceptRejectsToMailbox=dom.input(attr({value: rs.AcceptRejectsToMailbox || ''}))),
|
||||
dom.td(row.Mailbox=dom.input(attr({value: rs.Mailbox || ''}))),
|
||||
dom.td(
|
||||
dom.button('Remove ruleset', function click(e) {
|
||||
row.root.remove()
|
||||
rulesetsRows = rulesetsRows.filter(e => e !== row)
|
||||
}),
|
||||
),
|
||||
)
|
||||
rulesetsRows.push(row)
|
||||
rulesetsTbody.appendChild(row.root)
|
||||
}
|
||||
|
||||
(dest.Rulesets || []).forEach(rs => {
|
||||
addRulesetsRow(rs)
|
||||
})
|
||||
|
||||
let defaultMailbox
|
||||
let fullName
|
||||
let saveButton
|
||||
|
||||
const addresses = [name, ...Object.keys(destinations).filter(a => !a.startsWith('@') && a !== name)]
|
||||
|
||||
const page = document.getElementById('page')
|
||||
dom._kids(page,
|
||||
crumbs(
|
||||
crumblink('Mox Account', '#'),
|
||||
'Destination ' + name,
|
||||
),
|
||||
dom.div(
|
||||
dom.span('Default mailbox', attr({title: 'Default mailbox where email for this recipient is delivered to if it does not match any ruleset. Default is Inbox.'})),
|
||||
dom.br(),
|
||||
defaultMailbox=dom.input(attr({value: dest.Mailbox, placeholder: 'Inbox'})),
|
||||
),
|
||||
dom.br(),
|
||||
dom.div(
|
||||
dom.span('Full name', attr({title: 'Name to use in From header when composing messages. If not set, the account default full name is used.'})),
|
||||
dom.br(),
|
||||
fullName=dom.input(attr({value: dest.FullName})),
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Rulesets'),
|
||||
dom.p('Incoming messages are checked against the rulesets. If a ruleset matches, the message is delivered to the mailbox configured for the ruleset instead of to the default mailbox.'),
|
||||
dom.p('"Is Forward" does not affect matching, but changes prevents the sending mail server from being included in future junk classifications by clearing fields related to the forwarding email server (IP address, EHLO domain, MAIL FROM domain and a matching DKIM domain), and prevents DMARC rejects for forwarded messages.'),
|
||||
dom.p('"List allow domain" does not affect matching, but skips the regular spam checks if one of the verified domains is a (sub)domain of the domain mentioned here.'),
|
||||
dom.p('"Accept rejects to mailbox" does not affect matching, but causes messages classified as junk to be accepted and delivered to this mailbox, instead of being rejected during the SMTP transaction. Useful for incoming forwarded messages where rejecting incoming messages may cause the forwarding server to stop forwarding.'),
|
||||
dom.table(
|
||||
dom.thead(
|
||||
dom.tr(
|
||||
dom.th('SMTP "MAIL FROM" regexp', attr({title: 'Matches if this regular expression matches (a substring of) the SMTP MAIL FROM address (not the message From-header). E.g. user@example.org.'})),
|
||||
dom.th('Verified domain', attr({title: 'Matches if this domain matches an SPF- and/or DKIM-verified (sub)domain.'})),
|
||||
dom.th('Headers regexp', attr({title: 'Matches if these header field/value regular expressions all match (substrings of) the message headers. Header fields and valuees are converted to lower case before matching. Whitespace is trimmed from the value before matching. A header field can occur multiple times in a message, only one instance has to match. For mailing lists, you could match on ^list-id$ with the value typically the mailing list address in angled brackets with @ replaced with a dot, e.g. <name\\.lists\\.example\\.org>.'})),
|
||||
dom.th('Is Forward', attr({title: "Influences spam filtering only, this option does not change whether a message matches this ruleset. Can only be used together with SMTPMailFromRegexp and VerifiedDomain. SMTPMailFromRegexp must be set to the address used to deliver the forwarded message, e.g. '^user(|\\+.*)@forward\\.example$'. Changes to junk analysis: 1. Messages are not rejects for failing a DMARC policy, because a legitimate forwarded message without valid/intact/aligned DKIM signature would be rejected because any verified SPF domain will be 'unaligned', of the forwarding mail server. 2. The sending mail server IP address, and sending EHLO and MAIL FROM domains and matching DKIM domain aren't used in future reputation-based spam classifications (but other verified DKIM domains are) because the forwarding server is not a useful spam signal for future messages."})),
|
||||
dom.th('List allow domain', attr({title: "Influences spam filtering only, this option does not change whether a message matches this ruleset. If this domain matches an SPF- and/or DKIM-verified (sub)domain, the message is accepted without further spam checks, such as a junk filter or DMARC reject evaluation. DMARC rejects should not apply for mailing lists that are not configured to rewrite the From-header of messages that don't have a passing DKIM signature of the From-domain. Otherwise, by rejecting messages, you may be automatically unsubscribed from the mailing list. The assumption is that mailing lists do their own spam filtering/moderation."})),
|
||||
dom.th('Allow rejects to mailbox', attr({title: "Influences spam filtering only, this option does not change whether a message matches this ruleset. If a message is classified as spam, it isn't rejected during the SMTP transaction (the normal behaviour), but accepted during the SMTP transaction and delivered to the specified mailbox. The specified mailbox is not automatically cleaned up like the account global Rejects mailbox, unless set to that Rejects mailbox."})),
|
||||
dom.th('Mailbox', attr({title: 'Mailbox to deliver to if this ruleset matches.'})),
|
||||
dom.th('Action'),
|
||||
)
|
||||
),
|
||||
rulesetsTbody,
|
||||
dom.tfoot(
|
||||
dom.tr(
|
||||
dom.td(attr({colspan: '5'})),
|
||||
dom.td(
|
||||
dom.button('Add ruleset', function click(e) {
|
||||
addRulesetsRow({})
|
||||
}),
|
||||
),
|
||||
),
|
||||
),
|
||||
),
|
||||
dom.br(),
|
||||
saveButton=dom.button('Save', async function click(e) {
|
||||
saveButton.disabled = true
|
||||
try {
|
||||
const newDest = {
|
||||
Mailbox: defaultMailbox.value,
|
||||
FullName: fullName.value,
|
||||
Rulesets: rulesetsRows.map(row => {
|
||||
return {
|
||||
SMTPMailFromRegexp: row.SMTPMailFromRegexp.value,
|
||||
VerifiedDomain: row.VerifiedDomain.value,
|
||||
HeadersRegexp: Object.fromEntries(row.headers.map(h => [h.key.value, h.value.value])),
|
||||
IsForward: row.IsForward.checked,
|
||||
ListAllowDomain: row.ListAllowDomain.value,
|
||||
AcceptRejectsToMailbox: row.AcceptRejectsToMailbox.value,
|
||||
Mailbox: row.Mailbox.value,
|
||||
}
|
||||
}),
|
||||
}
|
||||
page.classList.add('loading')
|
||||
await api.DestinationSave(name, dest, newDest)
|
||||
window.location.reload() // todo: only refresh part of ui
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: '+err.message)
|
||||
page.classList.remove('loading')
|
||||
return
|
||||
} finally {
|
||||
saveButton.disabled = false
|
||||
}
|
||||
}),
|
||||
dom.br(),
|
||||
dom.br(),
|
||||
dom.br(),
|
||||
dom.p("Apple's mail applications don't do account autoconfiguration, and when adding an account it can choose defaults that don't work with modern email servers. Adding an account through a \"mobileconfig\" profile file can be more convenient: It contains the IMAP/SMTP settings such as host name, port, TLS, authentication mechanism and user name. This profile does not contain a login password. Opening the profile adds it under Profiles in System Preferences (macOS) or Settings (iOS), where you can install it. These profiles are not signed, so users will have to ignore the warnings about them being unsigned. ",
|
||||
dom.br(),
|
||||
dom.a(attr({href: 'https://autoconfig.'+domainName(domain)+'/profile.mobileconfig?addresses='+encodeURIComponent(addresses.join(','))+'&name='+encodeURIComponent(dest.FullName), download: ''}), 'Download .mobileconfig email account profile'),
|
||||
dom.br(),
|
||||
dom.a(attr({href: 'https://autoconfig.'+domainName(domain)+'/profile.mobileconfig.qrcode.png?addresses='+encodeURIComponent(addresses.join(','))+'&name='+encodeURIComponent(dest.FullName), download: ''}), 'Open QR-code with link to .mobileconfig profile'),
|
||||
),
|
||||
)
|
||||
}
|
||||
|
||||
const init = async () => {
|
||||
let curhash
|
||||
|
||||
const page = document.getElementById('page')
|
||||
|
||||
const hashChange = async () => {
|
||||
if (curhash === window.location.hash) {
|
||||
return
|
||||
}
|
||||
let h = decodeURIComponent(window.location.hash)
|
||||
if (h !== '' && h.substring(0, 1) == '#') {
|
||||
h = h.substring(1)
|
||||
}
|
||||
const t = h.split('/')
|
||||
page.classList.add('loading')
|
||||
try {
|
||||
if (h === '') {
|
||||
await index()
|
||||
} else if (t[0] === 'destinations' && t.length === 2) {
|
||||
await destination(t[1])
|
||||
} else {
|
||||
dom._kids(page, 'page not found')
|
||||
}
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + err.message)
|
||||
window.location.hash = curhash
|
||||
curhash = window.location.hash
|
||||
return
|
||||
}
|
||||
curhash = window.location.hash
|
||||
page.classList.remove('loading')
|
||||
}
|
||||
window.addEventListener('hashchange', hashChange)
|
||||
hashChange()
|
||||
}
|
||||
|
||||
window.addEventListener('load', init)
|
||||
</script>
|
||||
<div id="page"><div style="padding: 1em">Loading...</div></div>
|
||||
<script>/* placeholder */</script>
|
||||
</body>
|
||||
</html>
|
||||
|
1065
webaccount/account.js
Normal file
1065
webaccount/account.js
Normal file
File diff suppressed because it is too large
Load Diff
699
webaccount/account.ts
Normal file
699
webaccount/account.ts
Normal file
@ -0,0 +1,699 @@
|
||||
// Javascript is generated from typescript, do not modify generated javascript because changes will be overwritten.
|
||||
|
||||
// From HTML.
|
||||
declare let page: HTMLElement
|
||||
declare let moxversion: string
|
||||
|
||||
const client = new api.Client()
|
||||
|
||||
const link = (href: string, anchorOpt: string) => dom.a(attr.href(href), attr.rel('noopener noreferrer'), anchorOpt || href)
|
||||
|
||||
const crumblink = (text: string, link: string) => dom.a(text, attr.href(link))
|
||||
const crumbs = (...l: ElemArg[]) => [dom.h1(l.map((e, index) => index === 0 ? e : [' / ', e])), dom.br()]
|
||||
|
||||
const errmsg = (err: unknown) => ''+((err as any).message || '(no error message)')
|
||||
|
||||
const footer = dom.div(
|
||||
style({marginTop: '6ex', opacity: 0.75}),
|
||||
link('https://github.com/mjl-/mox', 'mox'),
|
||||
' ',
|
||||
moxversion,
|
||||
)
|
||||
|
||||
const domainName = (d: api.Domain) => {
|
||||
return d.Unicode || d.ASCII
|
||||
}
|
||||
|
||||
const domainString = (d: api.Domain) => {
|
||||
if (d.Unicode) {
|
||||
return d.Unicode+" ("+d.ASCII+")"
|
||||
}
|
||||
return d.ASCII
|
||||
}
|
||||
|
||||
const box = (color: string, ...l: ElemArg[]) => [
|
||||
dom.div(
|
||||
style({
|
||||
display: 'inline-block',
|
||||
padding: '.25em .5em',
|
||||
backgroundColor: color,
|
||||
borderRadius: '3px',
|
||||
margin: '.5ex 0',
|
||||
}),
|
||||
l,
|
||||
),
|
||||
dom.br(),
|
||||
]
|
||||
|
||||
const green = '#1dea20'
|
||||
const yellow = '#ffe400'
|
||||
const red = '#ff7443'
|
||||
const blue = '#8bc8ff'
|
||||
|
||||
const index = async () => {
|
||||
const [accountFullName, domain, destinations] = await client.Account()
|
||||
|
||||
let fullNameForm: HTMLFormElement
|
||||
let fullNameFieldset: HTMLFieldSetElement
|
||||
let fullName: HTMLInputElement
|
||||
let passwordForm: HTMLFormElement
|
||||
let passwordFieldset: HTMLFieldSetElement
|
||||
let password1: HTMLInputElement
|
||||
let password2: HTMLInputElement
|
||||
let passwordHint: HTMLElement
|
||||
|
||||
let importForm: HTMLFormElement
|
||||
let importFieldset: HTMLFieldSetElement
|
||||
let mailboxFileHint: HTMLElement
|
||||
let mailboxPrefixHint: HTMLElement
|
||||
let importProgress: HTMLElement
|
||||
let importAbortBox: HTMLElement
|
||||
|
||||
const importTrack = async (token: string) => {
|
||||
const importConnection = dom.div('Waiting for updates...')
|
||||
importProgress.appendChild(importConnection)
|
||||
|
||||
let countsTbody: HTMLElement
|
||||
let counts = new Map<string, HTMLElement>() // mailbox -> elem
|
||||
|
||||
let problems: HTMLElement // element
|
||||
|
||||
await new Promise((resolve, reject) => {
|
||||
const eventSource = new window.EventSource('importprogress?token=' + encodeURIComponent(token))
|
||||
eventSource.addEventListener('open', function(e) {
|
||||
console.log('eventsource open', {e})
|
||||
dom._kids(importConnection, dom.div('Waiting for updates, connected...'))
|
||||
|
||||
dom._kids(importAbortBox,
|
||||
dom.clickbutton('Abort import', attr.title('If the import is not yet finished, it can be aborted and no messages will have been imported.'), async function click() {
|
||||
try {
|
||||
await client.ImportAbort(token)
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
}
|
||||
// On success, the event source will get an aborted notification and shutdown the connection.
|
||||
})
|
||||
)
|
||||
})
|
||||
eventSource.addEventListener('error', function(e) {
|
||||
console.log('eventsource error', {e})
|
||||
dom._kids(importConnection, box(red, 'Connection error'))
|
||||
reject({message: 'Connection error'})
|
||||
})
|
||||
eventSource.addEventListener('count', (e) => {
|
||||
const data = JSON.parse(e.data) // {Mailbox: ..., Count: ...}
|
||||
console.log('import count event', {e, data})
|
||||
if (!countsTbody) {
|
||||
importProgress.appendChild(
|
||||
dom.div(
|
||||
dom.br(),
|
||||
dom.h3('Importing mailboxes and messages...'),
|
||||
dom.table(
|
||||
dom.thead(
|
||||
dom.tr(dom.th('Mailbox'), dom.th('Messages')),
|
||||
),
|
||||
countsTbody=dom.tbody(),
|
||||
),
|
||||
)
|
||||
)
|
||||
}
|
||||
let elem = counts.get(data.Mailbox)
|
||||
if (!elem) {
|
||||
countsTbody.appendChild(
|
||||
dom.tr(
|
||||
dom.td(data.Mailbox),
|
||||
elem=dom.td(style({textAlign: 'right'}), ''+data.Count),
|
||||
),
|
||||
)
|
||||
counts.set(data.Mailbox, elem)
|
||||
}
|
||||
dom._kids(elem, ''+data.Count)
|
||||
})
|
||||
eventSource.addEventListener('problem', (e) => {
|
||||
const data = JSON.parse(e.data) // {Message: ...}
|
||||
console.log('import problem event', {e, data})
|
||||
if (!problems) {
|
||||
importProgress.appendChild(
|
||||
dom.div(
|
||||
dom.br(),
|
||||
dom.h3('Problems during import'),
|
||||
problems=dom.div(),
|
||||
),
|
||||
)
|
||||
}
|
||||
problems.appendChild(dom.div(box(yellow, data.Message)))
|
||||
})
|
||||
eventSource.addEventListener('step', (e) => {
|
||||
const data = JSON.parse(e.data) // {Title: ...}
|
||||
console.log('import step event', {e, data})
|
||||
importProgress.appendChild(dom.div(dom.br(), box(blue, 'Step: '+data.Title)))
|
||||
})
|
||||
eventSource.addEventListener('done', (e) => {
|
||||
console.log('import done event', {e})
|
||||
importProgress.appendChild(dom.div(dom.br(), box(blue, 'Import finished')))
|
||||
|
||||
eventSource.close()
|
||||
dom._kids(importConnection)
|
||||
dom._kids(importAbortBox)
|
||||
window.sessionStorage.removeItem('ImportToken')
|
||||
|
||||
resolve(null)
|
||||
})
|
||||
eventSource.addEventListener('aborted', function(e) {
|
||||
console.log('import aborted event', {e})
|
||||
|
||||
importProgress.appendChild(dom.div(dom.br(), box(red, 'Import aborted, no message imported')))
|
||||
|
||||
eventSource.close()
|
||||
dom._kids(importConnection)
|
||||
dom._kids(importAbortBox)
|
||||
window.sessionStorage.removeItem('ImportToken')
|
||||
|
||||
reject({message: 'Import aborted'})
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
dom._kids(page,
|
||||
crumbs('Mox Account'),
|
||||
dom.p('NOTE: Not all account settings can be configured through these pages yet. See the configuration file for more options.'),
|
||||
dom.div(
|
||||
'Default domain: ',
|
||||
domain.ASCII ? domainString(domain) : '(none)',
|
||||
),
|
||||
dom.br(),
|
||||
|
||||
fullNameForm=dom.form(
|
||||
fullNameFieldset=dom.fieldset(
|
||||
dom.label(
|
||||
style({display: 'inline-block'}),
|
||||
'Full name',
|
||||
dom.br(),
|
||||
fullName=dom.input(attr.value(accountFullName), attr.title('Name to use in From header when composing messages. Can be overridden per configured address.')),
|
||||
|
||||
),
|
||||
' ',
|
||||
dom.submitbutton('Save'),
|
||||
),
|
||||
async function submit(e: SubmitEvent) {
|
||||
e.preventDefault()
|
||||
fullNameFieldset.disabled = true
|
||||
try {
|
||||
await client.AccountSaveFullName(fullName.value)
|
||||
fullName.setAttribute('value', fullName.value)
|
||||
fullNameForm.reset()
|
||||
window.alert('Full name has been changed.')
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
} finally {
|
||||
fullNameFieldset.disabled = false
|
||||
}
|
||||
},
|
||||
),
|
||||
dom.br(),
|
||||
|
||||
dom.h2('Addresses'),
|
||||
dom.ul(
|
||||
Object.entries(destinations).sort().map(t =>
|
||||
dom.li(
|
||||
dom.a(t[0], attr.href('#destinations/'+t[0])),
|
||||
t[0].startsWith('@') ? ' (catchall)' : [],
|
||||
),
|
||||
),
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Change password'),
|
||||
passwordForm=dom.form(
|
||||
passwordFieldset=dom.fieldset(
|
||||
dom.label(
|
||||
style({display: 'inline-block'}),
|
||||
'New password',
|
||||
dom.br(),
|
||||
password1=dom.input(attr.type('password'), attr.required(''), function focus() {
|
||||
passwordHint.style.display = ''
|
||||
}),
|
||||
),
|
||||
' ',
|
||||
dom.label(
|
||||
style({display: 'inline-block'}),
|
||||
'New password repeat',
|
||||
dom.br(),
|
||||
password2=dom.input(attr.type('password'), attr.required('')),
|
||||
),
|
||||
' ',
|
||||
dom.submitbutton('Change password'),
|
||||
),
|
||||
passwordHint=dom.div(
|
||||
style({display: 'none', marginTop: '.5ex'}),
|
||||
dom.clickbutton('Generate random password', function click(e: MouseEvent) {
|
||||
e.preventDefault()
|
||||
let b = new Uint8Array(1)
|
||||
let s = ''
|
||||
const chars = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*-_;:,<.>/'
|
||||
while (s.length < 12) {
|
||||
self.crypto.getRandomValues(b)
|
||||
if (Math.ceil(b[0]/chars.length)*chars.length > 255) {
|
||||
continue // Prevent bias.
|
||||
}
|
||||
s += chars[b[0]%chars.length]
|
||||
}
|
||||
password1.type = 'text'
|
||||
password2.type = 'text'
|
||||
password1.value = s
|
||||
password2.value = s
|
||||
}),
|
||||
dom.div(dom._class('text'),
|
||||
box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'),
|
||||
),
|
||||
),
|
||||
async function submit(e: SubmitEvent) {
|
||||
e.stopPropagation()
|
||||
e.preventDefault()
|
||||
if (!password1.value || password1.value !== password2.value) {
|
||||
window.alert('Passwords do not match.')
|
||||
return
|
||||
}
|
||||
passwordFieldset.disabled = true
|
||||
try {
|
||||
await client.SetPassword(password1.value)
|
||||
window.alert('Password has been changed.')
|
||||
passwordForm.reset()
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
} finally {
|
||||
passwordFieldset.disabled = false
|
||||
}
|
||||
},
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Export'),
|
||||
dom.p('Export all messages in all mailboxes. In maildir or mbox format, as .zip or .tgz file.'),
|
||||
dom.ul(
|
||||
dom.li(dom.a('mail-export-maildir.tgz', attr.href('mail-export-maildir.tgz'))),
|
||||
dom.li(dom.a('mail-export-maildir.zip', attr.href('mail-export-maildir.zip'))),
|
||||
dom.li(dom.a('mail-export-mbox.tgz', attr.href('mail-export-mbox.tgz'))),
|
||||
dom.li(dom.a('mail-export-mbox.zip', attr.href('mail-export-mbox.zip'))),
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Import'),
|
||||
dom.p('Import messages from a .zip or .tgz file with maildirs and/or mbox files.'),
|
||||
importForm=dom.form(
|
||||
async function submit(e: SubmitEvent) {
|
||||
e.preventDefault()
|
||||
e.stopPropagation()
|
||||
|
||||
const request = async (): Promise<api.ImportProgress> => {
|
||||
return new Promise((resolve, reject) => {
|
||||
// Browsers can do everything. Except show a progress bar while uploading...
|
||||
let progressPercentage: HTMLElement
|
||||
dom._kids(importProgress,
|
||||
dom.div(
|
||||
dom.div('Uploading... ', progressPercentage=dom.span()),
|
||||
),
|
||||
)
|
||||
importProgress.style.display = ''
|
||||
|
||||
const xhr = new window.XMLHttpRequest()
|
||||
xhr.open('POST', 'import', true)
|
||||
xhr.upload.addEventListener('progress', (e) => {
|
||||
if (!e.lengthComputable) {
|
||||
return
|
||||
}
|
||||
const pct = Math.floor(100*e.loaded/e.total)
|
||||
dom._kids(progressPercentage, pct+'%')
|
||||
})
|
||||
xhr.addEventListener('load', () => {
|
||||
console.log('upload done', {xhr: xhr, status: xhr.status})
|
||||
if (xhr.status !== 200) {
|
||||
reject({message: 'status '+xhr.status})
|
||||
return
|
||||
}
|
||||
let resp: api.ImportProgress
|
||||
try {
|
||||
resp = api.parser.ImportProgress(JSON.parse(xhr.responseText))
|
||||
} catch (err) {
|
||||
reject({message: 'parsing response json: '+errmsg(err)})
|
||||
return
|
||||
}
|
||||
resolve(resp)
|
||||
})
|
||||
xhr.addEventListener('error', (e) => reject({message: 'upload error', event: e}))
|
||||
xhr.addEventListener('abort', (e) => reject({message: 'upload aborted', event: e}))
|
||||
xhr.send(new window.FormData(importForm))
|
||||
})
|
||||
}
|
||||
try {
|
||||
const p = request()
|
||||
importFieldset.disabled = true
|
||||
const result = await p
|
||||
|
||||
try {
|
||||
window.sessionStorage.setItem('ImportToken', result.Token)
|
||||
} catch (err) {
|
||||
console.log('storing import token in session storage', {err})
|
||||
// Ignore error, could be some browser security thing like private browsing.
|
||||
}
|
||||
|
||||
await importTrack(result.Token)
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
} finally {
|
||||
importFieldset.disabled = false
|
||||
}
|
||||
},
|
||||
importFieldset=dom.fieldset(
|
||||
dom.div(
|
||||
style({marginBottom: '1ex'}),
|
||||
dom.label(
|
||||
dom.div(style({marginBottom: '.5ex'}), 'File'),
|
||||
dom.input(attr.type('file'), attr.required(''), attr.name('file'), function focus() {
|
||||
mailboxFileHint.style.display = ''
|
||||
}),
|
||||
),
|
||||
mailboxFileHint=dom.p(style({display: 'none', fontStyle: 'italic', marginTop: '.5ex'}), 'This file must either be a zip file or a gzipped tar file with mbox and/or maildir mailboxes. For maildirs, an optional file "dovecot-keywords" is read additional keywords, like Forwarded/Junk/NotJunk. If an imported mailbox already exists by name, messages are added to the existing mailbox. If a mailbox does not yet exist it will be created.'),
|
||||
),
|
||||
dom.div(
|
||||
style({marginBottom: '1ex'}),
|
||||
dom.label(
|
||||
dom.div(style({marginBottom: '.5ex'}), 'Skip mailbox prefix (optional)'),
|
||||
dom.input(attr.name('skipMailboxPrefix'), function focus() {
|
||||
mailboxPrefixHint.style.display = ''
|
||||
}),
|
||||
),
|
||||
mailboxPrefixHint=dom.p(style({display: 'none', fontStyle: 'italic', marginTop: '.5ex'}), 'If set, any mbox/maildir path with this prefix will have it stripped before importing. For example, if all mailboxes are in a directory "Takeout", specify that path in the field above so mailboxes like "Takeout/Inbox.mbox" are imported into a mailbox called "Inbox" instead of "Takeout/Inbox".'),
|
||||
),
|
||||
dom.div(
|
||||
dom.submitbutton('Upload and import'),
|
||||
dom.p(style({fontStyle: 'italic', marginTop: '.5ex'}), 'The file is uploaded first, then its messages are imported, finally messages are matched for threading. Importing is done in a transaction, you can abort the entire import before it is finished.'),
|
||||
),
|
||||
),
|
||||
),
|
||||
importAbortBox=dom.div(), // Outside fieldset because it gets disabled, above progress because may be scrolling it down quickly with problems.
|
||||
importProgress=dom.div(
|
||||
style({display: 'none'}),
|
||||
),
|
||||
footer,
|
||||
)
|
||||
|
||||
// Try to show the progress of an earlier import session. The user may have just
|
||||
// refreshed the browser.
|
||||
let importToken: string
|
||||
try {
|
||||
importToken = window.sessionStorage.getItem('ImportToken') || ''
|
||||
} catch (err) {
|
||||
console.log('looking up ImportToken in session storage', {err})
|
||||
return
|
||||
}
|
||||
if (!importToken) {
|
||||
return
|
||||
}
|
||||
importFieldset.disabled = true
|
||||
dom._kids(importProgress,
|
||||
dom.div(
|
||||
dom.div('Reconnecting to import...'),
|
||||
),
|
||||
)
|
||||
importProgress.style.display = ''
|
||||
importTrack(importToken)
|
||||
.catch(() => {
|
||||
if (window.confirm('Error reconnecting to import. Remove this import session?')) {
|
||||
window.sessionStorage.removeItem('ImportToken')
|
||||
dom._kids(importProgress)
|
||||
importProgress.style.display = 'none'
|
||||
}
|
||||
})
|
||||
.finally(() => {
|
||||
importFieldset.disabled = false
|
||||
})
|
||||
}
|
||||
|
||||
const destination = async (name: string) => {
|
||||
const [_, domain, destinations] = await client.Account()
|
||||
let dest = destinations[name]
|
||||
if (!dest) {
|
||||
throw new Error('destination not found')
|
||||
}
|
||||
|
||||
type Header = {
|
||||
root: HTMLElement
|
||||
|
||||
key: HTMLInputElement
|
||||
value: HTMLInputElement
|
||||
}
|
||||
|
||||
type Row = {
|
||||
root: HTMLElement
|
||||
|
||||
smtpMailFromRegexp: HTMLInputElement
|
||||
verifiedDomain: HTMLInputElement
|
||||
headers: Header[]
|
||||
isForward: HTMLInputElement // Checkbox
|
||||
listAllowDomain: HTMLInputElement
|
||||
acceptRejectsToMailbox: HTMLInputElement
|
||||
mailbox: HTMLInputElement
|
||||
}
|
||||
|
||||
let rulesetsTbody = dom.tbody()
|
||||
let rulesetsRows: Row[] = []
|
||||
|
||||
const addRulesetsRow = (rs: api.Ruleset) => {
|
||||
let row: Row
|
||||
let headersCell = dom.td()
|
||||
|
||||
const addHeader = (k: string, v: string) => {
|
||||
let h: Header
|
||||
let key: HTMLInputElement
|
||||
let value: HTMLInputElement
|
||||
|
||||
const root = dom.div(
|
||||
key=dom.input(attr.value(k)),
|
||||
' ',
|
||||
value=dom.input(attr.value(v)),
|
||||
' ',
|
||||
dom.clickbutton('-', style({width: '1.5em'}), function click() {
|
||||
h.root.remove()
|
||||
row.headers = row.headers.filter(x => x !== h)
|
||||
if (row.headers.length === 0) {
|
||||
const b = dom.clickbutton('+', style({width: '1.5em'}), function click() {
|
||||
b.remove()
|
||||
addHeader('', '')
|
||||
})
|
||||
headersCell.appendChild(dom.div(style({textAlign: 'right'}), b))
|
||||
}
|
||||
}),
|
||||
' ',
|
||||
dom.clickbutton('+', style({width: '1.5em'}), function click() {
|
||||
addHeader('', '')
|
||||
}),
|
||||
)
|
||||
h = {root: root, key: key, value: value}
|
||||
row.headers.push(h)
|
||||
headersCell.appendChild(root)
|
||||
}
|
||||
|
||||
let smtpMailFromRegexp: HTMLInputElement
|
||||
let verifiedDomain: HTMLInputElement
|
||||
let isForward: HTMLInputElement // Checkbox
|
||||
let listAllowDomain: HTMLInputElement
|
||||
let acceptRejectsToMailbox: HTMLInputElement
|
||||
let mailbox: HTMLInputElement
|
||||
|
||||
const root = dom.tr(
|
||||
dom.td(smtpMailFromRegexp=dom.input(attr.value(rs.SMTPMailFromRegexp || ''))),
|
||||
dom.td(verifiedDomain=dom.input(attr.value(rs.VerifiedDomain || ''))),
|
||||
headersCell,
|
||||
dom.td(dom.label(isForward=dom.input(attr.type('checkbox'), rs.IsForward ? attr.checked('') : [] ))),
|
||||
dom.td(listAllowDomain=dom.input(attr.value(rs.ListAllowDomain || ''))),
|
||||
dom.td(acceptRejectsToMailbox=dom.input(attr.value(rs.AcceptRejectsToMailbox || ''))),
|
||||
dom.td(mailbox=dom.input(attr.value(rs.Mailbox || ''))),
|
||||
dom.td(
|
||||
dom.clickbutton('Remove ruleset', function click() {
|
||||
row.root.remove()
|
||||
rulesetsRows = rulesetsRows.filter(e => e !== row)
|
||||
}),
|
||||
),
|
||||
)
|
||||
row = {
|
||||
root: root,
|
||||
smtpMailFromRegexp: smtpMailFromRegexp,
|
||||
verifiedDomain: verifiedDomain,
|
||||
headers: [],
|
||||
isForward: isForward,
|
||||
listAllowDomain: listAllowDomain,
|
||||
acceptRejectsToMailbox: acceptRejectsToMailbox,
|
||||
mailbox: mailbox,
|
||||
}
|
||||
rulesetsRows.push(row)
|
||||
|
||||
Object.entries(rs.HeadersRegexp || {}).sort().forEach(t =>
|
||||
addHeader(t[0], t[1])
|
||||
)
|
||||
if (Object.entries(rs.HeadersRegexp || {}).length === 0) {
|
||||
const b = dom.clickbutton('+', style({width: '1.5em'}), function click() {
|
||||
b.remove()
|
||||
addHeader('', '')
|
||||
})
|
||||
headersCell.appendChild(dom.div(style({textAlign: 'right'}), b))
|
||||
}
|
||||
|
||||
rulesetsTbody.appendChild(row.root)
|
||||
}
|
||||
|
||||
(dest.Rulesets || []).forEach(rs => {
|
||||
addRulesetsRow(rs)
|
||||
})
|
||||
|
||||
let defaultMailbox: HTMLInputElement
|
||||
let fullName: HTMLInputElement
|
||||
let saveButton: HTMLButtonElement
|
||||
|
||||
const addresses = [name, ...Object.keys(destinations).filter(a => !a.startsWith('@') && a !== name)]
|
||||
|
||||
dom._kids(page,
|
||||
crumbs(
|
||||
crumblink('Mox Account', '#'),
|
||||
'Destination ' + name,
|
||||
),
|
||||
dom.div(
|
||||
dom.span('Default mailbox', attr.title('Default mailbox where email for this recipient is delivered to if it does not match any ruleset. Default is Inbox.')),
|
||||
dom.br(),
|
||||
defaultMailbox=dom.input(attr.value(dest.Mailbox), attr.placeholder('Inbox')),
|
||||
),
|
||||
dom.br(),
|
||||
dom.div(
|
||||
dom.span('Full name', attr.title('Name to use in From header when composing messages. If not set, the account default full name is used.')),
|
||||
dom.br(),
|
||||
fullName=dom.input(attr.value(dest.FullName)),
|
||||
),
|
||||
dom.br(),
|
||||
dom.h2('Rulesets'),
|
||||
dom.p('Incoming messages are checked against the rulesets. If a ruleset matches, the message is delivered to the mailbox configured for the ruleset instead of to the default mailbox.'),
|
||||
dom.p('"Is Forward" does not affect matching, but changes prevents the sending mail server from being included in future junk classifications by clearing fields related to the forwarding email server (IP address, EHLO domain, MAIL FROM domain and a matching DKIM domain), and prevents DMARC rejects for forwarded messages.'),
|
||||
dom.p('"List allow domain" does not affect matching, but skips the regular spam checks if one of the verified domains is a (sub)domain of the domain mentioned here.'),
|
||||
dom.p('"Accept rejects to mailbox" does not affect matching, but causes messages classified as junk to be accepted and delivered to this mailbox, instead of being rejected during the SMTP transaction. Useful for incoming forwarded messages where rejecting incoming messages may cause the forwarding server to stop forwarding.'),
|
||||
dom.table(
|
||||
dom.thead(
|
||||
dom.tr(
|
||||
dom.th('SMTP "MAIL FROM" regexp', attr.title('Matches if this regular expression matches (a substring of) the SMTP MAIL FROM address (not the message From-header). E.g. user@example.org.')),
|
||||
dom.th('Verified domain', attr.title('Matches if this domain matches an SPF- and/or DKIM-verified (sub)domain.')),
|
||||
dom.th('Headers regexp', attr.title('Matches if these header field/value regular expressions all match (substrings of) the message headers. Header fields and valuees are converted to lower case before matching. Whitespace is trimmed from the value before matching. A header field can occur multiple times in a message, only one instance has to match. For mailing lists, you could match on ^list-id$ with the value typically the mailing list address in angled brackets with @ replaced with a dot, e.g. <name\\.lists\\.example\\.org>.')),
|
||||
dom.th('Is Forward', attr.title("Influences spam filtering only, this option does not change whether a message matches this ruleset. Can only be used together with SMTPMailFromRegexp and VerifiedDomain. SMTPMailFromRegexp must be set to the address used to deliver the forwarded message, e.g. '^user(|\\+.*)@forward\\.example$'. Changes to junk analysis: 1. Messages are not rejects for failing a DMARC policy, because a legitimate forwarded message without valid/intact/aligned DKIM signature would be rejected because any verified SPF domain will be 'unaligned', of the forwarding mail server. 2. The sending mail server IP address, and sending EHLO and MAIL FROM domains and matching DKIM domain aren't used in future reputation-based spam classifications (but other verified DKIM domains are) because the forwarding server is not a useful spam signal for future messages.")),
|
||||
dom.th('List allow domain', attr.title("Influences spam filtering only, this option does not change whether a message matches this ruleset. If this domain matches an SPF- and/or DKIM-verified (sub)domain, the message is accepted without further spam checks, such as a junk filter or DMARC reject evaluation. DMARC rejects should not apply for mailing lists that are not configured to rewrite the From-header of messages that don't have a passing DKIM signature of the From-domain. Otherwise, by rejecting messages, you may be automatically unsubscribed from the mailing list. The assumption is that mailing lists do their own spam filtering/moderation.")),
|
||||
dom.th('Allow rejects to mailbox', attr.title("Influences spam filtering only, this option does not change whether a message matches this ruleset. If a message is classified as spam, it isn't rejected during the SMTP transaction (the normal behaviour), but accepted during the SMTP transaction and delivered to the specified mailbox. The specified mailbox is not automatically cleaned up like the account global Rejects mailbox, unless set to that Rejects mailbox.")),
|
||||
dom.th('Mailbox', attr.title('Mailbox to deliver to if this ruleset matches.')),
|
||||
dom.th('Action'),
|
||||
)
|
||||
),
|
||||
rulesetsTbody,
|
||||
dom.tfoot(
|
||||
dom.tr(
|
||||
dom.td(attr.colspan('7')),
|
||||
dom.td(
|
||||
dom.clickbutton('Add ruleset', function click() {
|
||||
addRulesetsRow({
|
||||
SMTPMailFromRegexp: '',
|
||||
VerifiedDomain: '',
|
||||
HeadersRegexp: {},
|
||||
IsForward: false,
|
||||
ListAllowDomain: '',
|
||||
AcceptRejectsToMailbox: '',
|
||||
Mailbox: '',
|
||||
VerifiedDNSDomain: {ASCII: '', Unicode: ''},
|
||||
ListAllowDNSDomain: {ASCII: '', Unicode: ''},
|
||||
})
|
||||
}),
|
||||
),
|
||||
),
|
||||
),
|
||||
),
|
||||
dom.br(),
|
||||
saveButton=dom.clickbutton('Save', async function click() {
|
||||
saveButton.disabled = true
|
||||
try {
|
||||
const newDest = {
|
||||
Mailbox: defaultMailbox.value,
|
||||
FullName: fullName.value,
|
||||
Rulesets: rulesetsRows.map(row => {
|
||||
return {
|
||||
SMTPMailFromRegexp: row.smtpMailFromRegexp.value,
|
||||
VerifiedDomain: row.verifiedDomain.value,
|
||||
HeadersRegexp: Object.fromEntries(row.headers.map(h => [h.key.value, h.value.value])),
|
||||
IsForward: row.isForward.checked,
|
||||
ListAllowDomain: row.listAllowDomain.value,
|
||||
AcceptRejectsToMailbox: row.acceptRejectsToMailbox.value,
|
||||
Mailbox: row.mailbox.value,
|
||||
VerifiedDNSDomain: {ASCII: '', Unicode: ''},
|
||||
ListAllowDNSDomain: {ASCII: '', Unicode: ''},
|
||||
}
|
||||
}),
|
||||
}
|
||||
page.classList.add('loading')
|
||||
await client.DestinationSave(name, dest, newDest)
|
||||
window.location.reload() // todo: only refresh part of ui
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
page.classList.remove('loading')
|
||||
return
|
||||
} finally {
|
||||
saveButton.disabled = false
|
||||
}
|
||||
}),
|
||||
dom.br(),
|
||||
dom.br(),
|
||||
dom.br(),
|
||||
dom.p("Apple's mail applications don't do account autoconfiguration, and when adding an account it can choose defaults that don't work with modern email servers. Adding an account through a \"mobileconfig\" profile file can be more convenient: It contains the IMAP/SMTP settings such as host name, port, TLS, authentication mechanism and user name. This profile does not contain a login password. Opening the profile adds it under Profiles in System Preferences (macOS) or Settings (iOS), where you can install it. These profiles are not signed, so users will have to ignore the warnings about them being unsigned. ",
|
||||
dom.br(),
|
||||
dom.a(attr.href('https://autoconfig.'+domainName(domain)+'/profile.mobileconfig?addresses='+encodeURIComponent(addresses.join(','))+'&name='+encodeURIComponent(dest.FullName)), attr.download(''), 'Download .mobileconfig email account profile'),
|
||||
dom.br(),
|
||||
dom.a(attr.href('https://autoconfig.'+domainName(domain)+'/profile.mobileconfig.qrcode.png?addresses='+encodeURIComponent(addresses.join(','))+'&name='+encodeURIComponent(dest.FullName)), attr.download(''), 'Open QR-code with link to .mobileconfig profile'),
|
||||
),
|
||||
)
|
||||
}
|
||||
|
||||
const init = async () => {
|
||||
let curhash: string | undefined
|
||||
|
||||
const hashChange = async () => {
|
||||
if (curhash === window.location.hash) {
|
||||
return
|
||||
}
|
||||
let h = decodeURIComponent(window.location.hash)
|
||||
if (h !== '' && h.substring(0, 1) == '#') {
|
||||
h = h.substring(1)
|
||||
}
|
||||
const t = h.split('/')
|
||||
page.classList.add('loading')
|
||||
try {
|
||||
if (h === '') {
|
||||
await index()
|
||||
} else if (t[0] === 'destinations' && t.length === 2) {
|
||||
await destination(t[1])
|
||||
} else {
|
||||
dom._kids(page, 'page not found')
|
||||
}
|
||||
} catch (err) {
|
||||
console.log({err})
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
window.location.hash = curhash || ''
|
||||
curhash = window.location.hash
|
||||
return
|
||||
}
|
||||
curhash = window.location.hash
|
||||
page.classList.remove('loading')
|
||||
}
|
||||
window.addEventListener('hashchange', hashChange)
|
||||
hashChange()
|
||||
}
|
||||
|
||||
window.addEventListener('load', async () => {
|
||||
try {
|
||||
await init()
|
||||
} catch (err) {
|
||||
window.alert('Error: ' + errmsg(err))
|
||||
}
|
||||
})
|
@ -104,13 +104,12 @@ func TestAccount(t *testing.T) {
|
||||
if w.Code != http.StatusOK {
|
||||
t.Fatalf("import, got status code %d, expected 200: %s", w.Code, w.Body.Bytes())
|
||||
}
|
||||
m := map[string]string{}
|
||||
var m ImportProgress
|
||||
if err := json.Unmarshal(w.Body.Bytes(), &m); err != nil {
|
||||
t.Fatalf("parsing import response: %v", err)
|
||||
}
|
||||
token := m["ImportToken"]
|
||||
|
||||
l := importListener{token, make(chan importEvent, 100), make(chan bool)}
|
||||
l := importListener{m.Token, make(chan importEvent, 100), make(chan bool)}
|
||||
importers.Register <- &l
|
||||
if !<-l.Register {
|
||||
t.Fatalf("register failed")
|
||||
|
@ -91,6 +91,19 @@
|
||||
}
|
||||
],
|
||||
"Returns": []
|
||||
},
|
||||
{
|
||||
"Name": "Types",
|
||||
"Docs": "Types exposes types not used in API method signatures, such as the import form upload.",
|
||||
"Params": [],
|
||||
"Returns": [
|
||||
{
|
||||
"Name": "importProgress",
|
||||
"Typewords": [
|
||||
"ImportProgress"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"Sections": [],
|
||||
@ -212,6 +225,19 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"Name": "ImportProgress",
|
||||
"Docs": "ImportProgress is returned after uploading a file to import.",
|
||||
"Fields": [
|
||||
{
|
||||
"Name": "Token",
|
||||
"Docs": "For fetching progress, or cancelling an import.",
|
||||
"Typewords": [
|
||||
"string"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"Ints": [],
|
525
webaccount/api.ts
Normal file
525
webaccount/api.ts
Normal file
@ -0,0 +1,525 @@
|
||||
// NOTE: GENERATED by github.com/mjl-/sherpats, DO NOT MODIFY
|
||||
|
||||
namespace api {
|
||||
|
||||
// Domain is a domain name, with one or more labels, with at least an ASCII
|
||||
// representation, and for IDNA non-ASCII domains a unicode representation.
|
||||
// The ASCII string must be used for DNS lookups. The strings do not have a
|
||||
// trailing dot. When using with StrictResolver, add the trailing dot.
|
||||
export interface Domain {
|
||||
ASCII: string // A non-unicode domain, e.g. with A-labels (xn--...) or NR-LDH (non-reserved letters/digits/hyphens) labels. Always in lower case. No trailing dot.
|
||||
Unicode: string // Name as U-labels. Empty if this is an ASCII-only domain. No trailing dot.
|
||||
}
|
||||
|
||||
export interface Destination {
|
||||
Mailbox: string
|
||||
Rulesets?: Ruleset[] | null
|
||||
FullName: string
|
||||
}
|
||||
|
||||
export interface Ruleset {
|
||||
SMTPMailFromRegexp: string
|
||||
VerifiedDomain: string
|
||||
HeadersRegexp?: { [key: string]: string }
|
||||
IsForward: boolean // todo: once we implement ARC, we can use dkim domains that we cannot verify but that the arc-verified forwarding mail server was able to verify.
|
||||
ListAllowDomain: string
|
||||
AcceptRejectsToMailbox: string
|
||||
Mailbox: string
|
||||
VerifiedDNSDomain: Domain
|
||||
ListAllowDNSDomain: Domain
|
||||
}
|
||||
|
||||
// ImportProgress is returned after uploading a file to import.
|
||||
export interface ImportProgress {
|
||||
Token: string // For fetching progress, or cancelling an import.
|
||||
}
|
||||
|
||||
export const structTypes: {[typename: string]: boolean} = {"Destination":true,"Domain":true,"ImportProgress":true,"Ruleset":true}
|
||||
export const stringsTypes: {[typename: string]: boolean} = {}
|
||||
export const intsTypes: {[typename: string]: boolean} = {}
|
||||
export const types: TypenameMap = {
|
||||
"Domain": {"Name":"Domain","Docs":"","Fields":[{"Name":"ASCII","Docs":"","Typewords":["string"]},{"Name":"Unicode","Docs":"","Typewords":["string"]}]},
|
||||
"Destination": {"Name":"Destination","Docs":"","Fields":[{"Name":"Mailbox","Docs":"","Typewords":["string"]},{"Name":"Rulesets","Docs":"","Typewords":["[]","Ruleset"]},{"Name":"FullName","Docs":"","Typewords":["string"]}]},
|
||||
"Ruleset": {"Name":"Ruleset","Docs":"","Fields":[{"Name":"SMTPMailFromRegexp","Docs":"","Typewords":["string"]},{"Name":"VerifiedDomain","Docs":"","Typewords":["string"]},{"Name":"HeadersRegexp","Docs":"","Typewords":["{}","string"]},{"Name":"IsForward","Docs":"","Typewords":["bool"]},{"Name":"ListAllowDomain","Docs":"","Typewords":["string"]},{"Name":"AcceptRejectsToMailbox","Docs":"","Typewords":["string"]},{"Name":"Mailbox","Docs":"","Typewords":["string"]},{"Name":"VerifiedDNSDomain","Docs":"","Typewords":["Domain"]},{"Name":"ListAllowDNSDomain","Docs":"","Typewords":["Domain"]}]},
|
||||
"ImportProgress": {"Name":"ImportProgress","Docs":"","Fields":[{"Name":"Token","Docs":"","Typewords":["string"]}]},
|
||||
}
|
||||
|
||||
export const parser = {
|
||||
Domain: (v: any) => parse("Domain", v) as Domain,
|
||||
Destination: (v: any) => parse("Destination", v) as Destination,
|
||||
Ruleset: (v: any) => parse("Ruleset", v) as Ruleset,
|
||||
ImportProgress: (v: any) => parse("ImportProgress", v) as ImportProgress,
|
||||
}
|
||||
|
||||
// Account exports web API functions for the account web interface. All its
|
||||
// methods are exported under api/. Function calls require valid HTTP
|
||||
// Authentication credentials of a user.
|
||||
let defaultOptions: ClientOptions = {slicesNullable: true, mapsNullable: true, nullableOptional: true}
|
||||
|
||||
export class Client {
|
||||
constructor(private baseURL=defaultBaseURL, public options?: ClientOptions) {
|
||||
if (!options) {
|
||||
this.options = defaultOptions
|
||||
}
|
||||
}
|
||||
|
||||
withOptions(options: ClientOptions): Client {
|
||||
return new Client(this.baseURL, { ...this.options, ...options })
|
||||
}
|
||||
|
||||
// SetPassword saves a new password for the account, invalidating the previous password.
|
||||
// Sessions are not interrupted, and will keep working. New login attempts must use the new password.
|
||||
// Password must be at least 8 characters.
|
||||
async SetPassword(password: string): Promise<void> {
|
||||
const fn: string = "SetPassword"
|
||||
const paramTypes: string[][] = [["string"]]
|
||||
const returnTypes: string[][] = []
|
||||
const params: any[] = [password]
|
||||
return await _sherpaCall(this.baseURL, { ...this.options }, paramTypes, returnTypes, fn, params) as void
|
||||
}
|
||||
|
||||
// Account returns information about the account: full name, the default domain,
|
||||
// and the destinations (keys are email addresses, or localparts to the default
|
||||
// domain). todo: replace with a function that returns the whole account, when
|
||||
// sherpadoc understands unnamed struct fields.
|
||||
async Account(): Promise<[string, Domain, { [key: string]: Destination }]> {
|
||||
const fn: string = "Account"
|
||||
const paramTypes: string[][] = []
|
||||
const returnTypes: string[][] = [["string"],["Domain"],["{}","Destination"]]
|
||||
const params: any[] = []
|
||||
return await _sherpaCall(this.baseURL, { ...this.options }, paramTypes, returnTypes, fn, params) as [string, Domain, { [key: string]: Destination }]
|
||||
}
|
||||
|
||||
async AccountSaveFullName(fullName: string): Promise<void> {
|
||||
const fn: string = "AccountSaveFullName"
|
||||
const paramTypes: string[][] = [["string"]]
|
||||
const returnTypes: string[][] = []
|
||||
const params: any[] = [fullName]
|
||||
return await _sherpaCall(this.baseURL, { ...this.options }, paramTypes, returnTypes, fn, params) as void
|
||||
}
|
||||
|
||||
// DestinationSave updates a destination.
|
||||
// OldDest is compared against the current destination. If it does not match, an
|
||||
// error is returned. Otherwise newDest is saved and the configuration reloaded.
|
||||
async DestinationSave(destName: string, oldDest: Destination, newDest: Destination): Promise<void> {
|
||||
const fn: string = "DestinationSave"
|
||||
const paramTypes: string[][] = [["string"],["Destination"],["Destination"]]
|
||||
const returnTypes: string[][] = []
|
||||
const params: any[] = [destName, oldDest, newDest]
|
||||
return await _sherpaCall(this.baseURL, { ...this.options }, paramTypes, returnTypes, fn, params) as void
|
||||
}
|
||||
|
||||
// ImportAbort aborts an import that is in progress. If the import exists and isn't
|
||||
// finished, no changes will have been made by the import.
|
||||
async ImportAbort(importToken: string): Promise<void> {
|
||||
const fn: string = "ImportAbort"
|
||||
const paramTypes: string[][] = [["string"]]
|
||||
const returnTypes: string[][] = []
|
||||
const params: any[] = [importToken]
|
||||
return await _sherpaCall(this.baseURL, { ...this.options }, paramTypes, returnTypes, fn, params) as void
|
||||
}
|
||||
|
||||
// Types exposes types not used in API method signatures, such as the import form upload.
|
||||
async Types(): Promise<ImportProgress> {
|
||||
const fn: string = "Types"
|
||||
const paramTypes: string[][] = []
|
||||
const returnTypes: string[][] = [["ImportProgress"]]
|
||||
const params: any[] = []
|
||||
return await _sherpaCall(this.baseURL, { ...this.options }, paramTypes, returnTypes, fn, params) as ImportProgress
|
||||
}
|
||||
}
|
||||
|
||||
export const defaultBaseURL = (function() {
|
||||
let p = location.pathname
|
||||
if (p && p[p.length - 1] !== '/') {
|
||||
let l = location.pathname.split('/')
|
||||
l = l.slice(0, l.length - 1)
|
||||
p = '/' + l.join('/') + '/'
|
||||
}
|
||||
return location.protocol + '//' + location.host + p + 'api/'
|
||||
})()
|
||||
|
||||
// NOTE: code below is shared between github.com/mjl-/sherpaweb and github.com/mjl-/sherpats.
|
||||
// KEEP IN SYNC.
|
||||
|
||||
export const supportedSherpaVersion = 1
|
||||
|
||||
export interface Section {
|
||||
Name: string
|
||||
Docs: string
|
||||
Functions: Function[]
|
||||
Sections: Section[]
|
||||
Structs: Struct[]
|
||||
Ints: Ints[]
|
||||
Strings: Strings[]
|
||||
Version: string // only for top-level section
|
||||
SherpaVersion: number // only for top-level section
|
||||
SherpadocVersion: number // only for top-level section
|
||||
}
|
||||
|
||||
export interface Function {
|
||||
Name: string
|
||||
Docs: string
|
||||
Params: Arg[]
|
||||
Returns: Arg[]
|
||||
}
|
||||
|
||||
export interface Arg {
|
||||
Name: string
|
||||
Typewords: string[]
|
||||
}
|
||||
|
||||
export interface Struct {
|
||||
Name: string
|
||||
Docs: string
|
||||
Fields: Field[]
|
||||
}
|
||||
|
||||
export interface Field {
|
||||
Name: string
|
||||
Docs: string
|
||||
Typewords: string[]
|
||||
}
|
||||
|
||||
export interface Ints {
|
||||
Name: string
|
||||
Docs: string
|
||||
Values: {
|
||||
Name: string
|
||||
Value: number
|
||||
Docs: string
|
||||
}[] | null
|
||||
}
|
||||
|
||||
export interface Strings {
|
||||
Name: string
|
||||
Docs: string
|
||||
Values: {
|
||||
Name: string
|
||||
Value: string
|
||||
Docs: string
|
||||
}[] | null
|
||||
}
|
||||
|
||||
export type NamedType = Struct | Strings | Ints
|
||||
export type TypenameMap = { [k: string]: NamedType }
|
||||
|
||||
// verifyArg typechecks "v" against "typewords", returning a new (possibly modified) value for JSON-encoding.
|
||||
// toJS indicate if the data is coming into JS. If so, timestamps are turned into JS Dates. Otherwise, JS Dates are turned into strings.
|
||||
// allowUnknownKeys configures whether unknown keys in structs are allowed.
|
||||
// types are the named types of the API.
|
||||
export const verifyArg = (path: string, v: any, typewords: string[], toJS: boolean, allowUnknownKeys: boolean, types: TypenameMap, opts: ClientOptions): any => {
|
||||
return new verifier(types, toJS, allowUnknownKeys, opts).verify(path, v, typewords)
|
||||
}
|
||||
|
||||
export const parse = (name: string, v: any): any => verifyArg(name, v, [name], true, false, types, defaultOptions)
|
||||
|
||||
class verifier {
|
||||
constructor(private types: TypenameMap, private toJS: boolean, private allowUnknownKeys: boolean, private opts: ClientOptions) {
|
||||
}
|
||||
|
||||
verify(path: string, v: any, typewords: string[]): any {
|
||||
typewords = typewords.slice(0)
|
||||
const ww = typewords.shift()
|
||||
|
||||
const error = (msg: string) => {
|
||||
if (path != '') {
|
||||
msg = path + ': ' + msg
|
||||
}
|
||||
throw new Error(msg)
|
||||
}
|
||||
|
||||
if (typeof ww !== 'string') {
|
||||
error('bad typewords')
|
||||
return // should not be necessary, typescript doesn't see error always throws an exception?
|
||||
}
|
||||
const w: string = ww
|
||||
|
||||
const ensure = (ok: boolean, expect: string): any => {
|
||||
if (!ok) {
|
||||
error('got ' + JSON.stringify(v) + ', expected ' + expect)
|
||||
}
|
||||
return v
|
||||
}
|
||||
|
||||
switch (w) {
|
||||
case 'nullable':
|
||||
if (v === null || v === undefined && this.opts.nullableOptional) {
|
||||
return v
|
||||
}
|
||||
return this.verify(path, v, typewords)
|
||||
case '[]':
|
||||
if (v === null && this.opts.slicesNullable || v === undefined && this.opts.slicesNullable && this.opts.nullableOptional) {
|
||||
return v
|
||||
}
|
||||
ensure(Array.isArray(v), "array")
|
||||
return v.map((e: any, i: number) => this.verify(path + '[' + i + ']', e, typewords))
|
||||
case '{}':
|
||||
if (v === null && this.opts.mapsNullable || v === undefined && this.opts.mapsNullable && this.opts.nullableOptional) {
|
||||
return v
|
||||
}
|
||||
ensure(v !== null || typeof v === 'object', "object")
|
||||
const r: any = {}
|
||||
for (const k in v) {
|
||||
r[k] = this.verify(path + '.' + k, v[k], typewords)
|
||||
}
|
||||
return r
|
||||
}
|
||||
|
||||
ensure(typewords.length == 0, "empty typewords")
|
||||
const t = typeof v
|
||||
switch (w) {
|
||||
case 'any':
|
||||
return v
|
||||
case 'bool':
|
||||
ensure(t === 'boolean', 'bool')
|
||||
return v
|
||||
case 'int8':
|
||||
case 'uint8':
|
||||
case 'int16':
|
||||
case 'uint16':
|
||||
case 'int32':
|
||||
case 'uint32':
|
||||
case 'int64':
|
||||
case 'uint64':
|
||||
ensure(t === 'number' && Number.isInteger(v), 'integer')
|
||||
return v
|
||||
case 'float32':
|
||||
case 'float64':
|
||||
ensure(t === 'number', 'float')
|
||||
return v
|
||||
case 'int64s':
|
||||
case 'uint64s':
|
||||
ensure(t === 'number' && Number.isInteger(v) || t === 'string', 'integer fitting in float without precision loss, or string')
|
||||
return '' + v
|
||||
case 'string':
|
||||
ensure(t === 'string', 'string')
|
||||
return v
|
||||
case 'timestamp':
|
||||
if (this.toJS) {
|
||||
ensure(t === 'string', 'string, with timestamp')
|
||||
const d = new Date(v)
|
||||
if (d instanceof Date && !isNaN(d.getTime())) {
|
||||
return d
|
||||
}
|
||||
error('invalid date ' + v)
|
||||
} else {
|
||||
ensure(t === 'object' && v !== null, 'non-null object')
|
||||
ensure(v.__proto__ === Date.prototype, 'Date')
|
||||
return v.toISOString()
|
||||
}
|
||||
}
|
||||
|
||||
// We're left with named types.
|
||||
const nt = this.types[w]
|
||||
if (!nt) {
|
||||
error('unknown type ' + w)
|
||||
}
|
||||
if (v === null) {
|
||||
error('bad value ' + v + ' for named type ' + w)
|
||||
}
|
||||
|
||||
if (structTypes[nt.Name]) {
|
||||
const t = nt as Struct
|
||||
if (typeof v !== 'object') {
|
||||
error('bad value ' + v + ' for struct ' + w)
|
||||
}
|
||||
|
||||
const r: any = {}
|
||||
for (const f of t.Fields) {
|
||||
r[f.Name] = this.verify(path + '.' + f.Name, v[f.Name], f.Typewords)
|
||||
}
|
||||
// If going to JSON also verify no unknown fields are present.
|
||||
if (!this.allowUnknownKeys) {
|
||||
const known: { [key: string]: boolean } = {}
|
||||
for (const f of t.Fields) {
|
||||
known[f.Name] = true
|
||||
}
|
||||
Object.keys(v).forEach((k) => {
|
||||
if (!known[k]) {
|
||||
error('unknown key ' + k + ' for struct ' + w)
|
||||
}
|
||||
})
|
||||
}
|
||||
return r
|
||||
} else if (stringsTypes[nt.Name]) {
|
||||
const t = nt as Strings
|
||||
if (typeof v !== 'string') {
|
||||
error('mistyped value ' + v + ' for named strings ' + t.Name)
|
||||
}
|
||||
if (!t.Values || t.Values.length === 0) {
|
||||
return v
|
||||
}
|
||||
for (const sv of t.Values) {
|
||||
if (sv.Value === v) {
|
||||
return v
|
||||
}
|
||||
}
|
||||
error('unknkown value ' + v + ' for named strings ' + t.Name)
|
||||
} else if (intsTypes[nt.Name]) {
|
||||
const t = nt as Ints
|
||||
if (typeof v !== 'number' || !Number.isInteger(v)) {
|
||||
error('mistyped value ' + v + ' for named ints ' + t.Name)
|
||||
}
|
||||
if (!t.Values || t.Values.length === 0) {
|
||||
return v
|
||||
}
|
||||
for (const sv of t.Values) {
|
||||
if (sv.Value === v) {
|
||||
return v
|
||||
}
|
||||
}
|
||||
error('unknkown value ' + v + ' for named ints ' + t.Name)
|
||||
} else {
|
||||
throw new Error('unexpected named type ' + nt)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
export interface ClientOptions {
|
||||
aborter?: {abort?: () => void}
|
||||
timeoutMsec?: number
|
||||
skipParamCheck?: boolean
|
||||
skipReturnCheck?: boolean
|
||||
slicesNullable?: boolean
|
||||
mapsNullable?: boolean
|
||||
nullableOptional?: boolean
|
||||
}
|
||||
|
||||
const _sherpaCall = async (baseURL: string, options: ClientOptions, paramTypes: string[][], returnTypes: string[][], name: string, params: any[]): Promise<any> => {
|
||||
if (!options.skipParamCheck) {
|
||||
if (params.length !== paramTypes.length) {
|
||||
return Promise.reject({ message: 'wrong number of parameters in sherpa call, saw ' + params.length + ' != expected ' + paramTypes.length })
|
||||
}
|
||||
params = params.map((v: any, index: number) => verifyArg('params[' + index + ']', v, paramTypes[index], false, false, types, options))
|
||||
}
|
||||
const simulate = async (json: string) => {
|
||||
const config = JSON.parse(json || 'null') || {}
|
||||
const waitMinMsec = config.waitMinMsec || 0
|
||||
const waitMaxMsec = config.waitMaxMsec || 0
|
||||
const wait = Math.random() * (waitMaxMsec - waitMinMsec)
|
||||
const failRate = config.failRate || 0
|
||||
return new Promise<void>((resolve, reject) => {
|
||||
if (options.aborter) {
|
||||
options.aborter.abort = () => {
|
||||
reject({ message: 'call to ' + name + ' aborted by user', code: 'sherpa:aborted' })
|
||||
reject = resolve = () => { }
|
||||
}
|
||||
}
|
||||
setTimeout(() => {
|
||||
const r = Math.random()
|
||||
if (r < failRate) {
|
||||
reject({ message: 'injected failure on ' + name, code: 'server:injected' })
|
||||
} else {
|
||||
resolve()
|
||||
}
|
||||
reject = resolve = () => { }
|
||||
}, waitMinMsec + wait)
|
||||
})
|
||||
}
|
||||
// Only simulate when there is a debug string. Otherwise it would always interfere
|
||||
// with setting options.aborter.
|
||||
let json: string = ''
|
||||
try {
|
||||
json = window.localStorage.getItem('sherpats-debug') || ''
|
||||
} catch (err) {}
|
||||
if (json) {
|
||||
await simulate(json)
|
||||
}
|
||||
|
||||
// Immediately create promise, so options.aborter is changed before returning.
|
||||
const promise = new Promise((resolve, reject) => {
|
||||
let resolve1 = (v: { code: string, message: string }) => {
|
||||
resolve(v)
|
||||
resolve1 = () => { }
|
||||
reject1 = () => { }
|
||||
}
|
||||
let reject1 = (v: { code: string, message: string }) => {
|
||||
reject(v)
|
||||
resolve1 = () => { }
|
||||
reject1 = () => { }
|
||||
}
|
||||
|
||||
const url = baseURL + name
|
||||
const req = new window.XMLHttpRequest()
|
||||
if (options.aborter) {
|
||||
options.aborter.abort = () => {
|
||||
req.abort()
|
||||
reject1({ code: 'sherpa:aborted', message: 'request aborted' })
|
||||
}
|
||||
}
|
||||
req.open('POST', url, true)
|
||||
if (options.timeoutMsec) {
|
||||
req.timeout = options.timeoutMsec
|
||||
}
|
||||
req.onload = () => {
|
||||
if (req.status !== 200) {
|
||||
if (req.status === 404) {
|
||||
reject1({ code: 'sherpa:badFunction', message: 'function does not exist' })
|
||||
} else {
|
||||
reject1({ code: 'sherpa:http', message: 'error calling function, HTTP status: ' + req.status })
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
let resp: any
|
||||
try {
|
||||
resp = JSON.parse(req.responseText)
|
||||
} catch (err) {
|
||||
reject1({ code: 'sherpa:badResponse', message: 'bad JSON from server' })
|
||||
return
|
||||
}
|
||||
if (resp && resp.error) {
|
||||
const err = resp.error
|
||||
reject1({ code: err.code, message: err.message })
|
||||
return
|
||||
} else if (!resp || !resp.hasOwnProperty('result')) {
|
||||
reject1({ code: 'sherpa:badResponse', message: "invalid sherpa response object, missing 'result'" })
|
||||
return
|
||||
}
|
||||
|
||||
if (options.skipReturnCheck) {
|
||||
resolve1(resp.result)
|
||||
return
|
||||
}
|
||||
let result = resp.result
|
||||
try {
|
||||
if (returnTypes.length === 0) {
|
||||
if (result) {
|
||||
throw new Error('function ' + name + ' returned a value while prototype says it returns "void"')
|
||||
}
|
||||
} else if (returnTypes.length === 1) {
|
||||
result = verifyArg('result', result, returnTypes[0], true, true, types, options)
|
||||
} else {
|
||||
if (result.length != returnTypes.length) {
|
||||
throw new Error('wrong number of values returned by ' + name + ', saw ' + result.length + ' != expected ' + returnTypes.length)
|
||||
}
|
||||
result = result.map((v: any, index: number) => verifyArg('result[' + index + ']', v, returnTypes[index], true, true, types, options))
|
||||
}
|
||||
} catch (err) {
|
||||
let errmsg = 'bad types'
|
||||
if (err instanceof Error) {
|
||||
errmsg = err.message
|
||||
}
|
||||
reject1({ code: 'sherpa:badTypes', message: errmsg })
|
||||
}
|
||||
resolve1(result)
|
||||
}
|
||||
req.onerror = () => {
|
||||
reject1({ code: 'sherpa:connection', message: 'connection failed' })
|
||||
}
|
||||
req.ontimeout = () => {
|
||||
reject1({ code: 'sherpa:timeout', message: 'request timeout' })
|
||||
}
|
||||
req.setRequestHeader('Content-Type', 'application/json')
|
||||
try {
|
||||
req.send(JSON.stringify({ params: params }))
|
||||
} catch (err) {
|
||||
reject1({ code: 'sherpa:badData', message: 'cannot marshal to JSON' })
|
||||
}
|
||||
})
|
||||
return await promise
|
||||
}
|
||||
|
||||
}
|
Reference in New Issue
Block a user