658 lines
18 KiB
C++
658 lines
18 KiB
C++
//
|
|
// Copyright (C) 2001-2003 Graeme Walker <graeme_walker@users.sourceforge.net>
|
|
//
|
|
// This program is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU General Public License
|
|
// as published by the Free Software Foundation; either
|
|
// version 2 of the License, or (at your option) any later
|
|
// version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program; if not, write to the Free Software
|
|
// Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
//
|
|
// ===
|
|
//
|
|
// gserverprotocol.cpp
|
|
//
|
|
|
|
#include "gdef.h"
|
|
#include "gsmtp.h"
|
|
#include "gserverprotocol.h"
|
|
#include "gbase64.h"
|
|
#include "gdate.h"
|
|
#include "gtime.h"
|
|
#include "gdatetime.h"
|
|
#include "gstr.h"
|
|
#include "glog.h"
|
|
#include "gassert.h"
|
|
#include <string>
|
|
|
|
GSmtp::ServerProtocol::ServerProtocol( Sender & sender , Verifier & verifier , ProtocolMessage & pmessage ,
|
|
const Secrets & secrets , const std::string & thishost , GNet::Address peer_address ) :
|
|
m_sender(sender) ,
|
|
m_pmessage(pmessage) ,
|
|
m_verifier(verifier) ,
|
|
m_fsm(sStart,sEnd,s_Same,s_Any) ,
|
|
m_thishost(thishost) ,
|
|
m_peer_address(peer_address) ,
|
|
m_authenticated(false) ,
|
|
m_sasl(secrets)
|
|
{
|
|
m_pmessage.doneSignal().connect( G::slot(*this,&ServerProtocol::processDone) ) ;
|
|
m_pmessage.preparedSignal().connect( G::slot(*this,&ServerProtocol::prepareDone) ) ;
|
|
|
|
// (dont send anything to the peer from this ctor -- the Sender
|
|
// object is not fuly constructed)
|
|
|
|
m_fsm.addTransition( eQuit , s_Any , sEnd , &GSmtp::ServerProtocol::doQuit ) ;
|
|
m_fsm.addTransition( eUnknown , s_Any , s_Same , &GSmtp::ServerProtocol::doUnknown ) ;
|
|
m_fsm.addTransition( eRset , s_Any , sIdle , &GSmtp::ServerProtocol::doRset ) ;
|
|
m_fsm.addTransition( eNoop , s_Any , s_Same , &GSmtp::ServerProtocol::doNoop ) ;
|
|
m_fsm.addTransition( eVrfy , s_Any , s_Same , &GSmtp::ServerProtocol::doVrfy ) ;
|
|
m_fsm.addTransition( eEhlo , s_Any , sIdle , &GSmtp::ServerProtocol::doEhlo , s_Same ) ;
|
|
m_fsm.addTransition( eHelo , s_Any , sIdle , &GSmtp::ServerProtocol::doHelo , s_Same ) ;
|
|
m_fsm.addTransition( eMail , sIdle , sPrepare , &GSmtp::ServerProtocol::doMailPrepare , sIdle ) ;
|
|
m_fsm.addTransition( ePrepared, sPrepare, sGotMail , &GSmtp::ServerProtocol::doMail , sIdle ) ;
|
|
m_fsm.addTransition( eRcpt , sGotMail, sGotRcpt , &GSmtp::ServerProtocol::doRcpt , sGotMail ) ;
|
|
m_fsm.addTransition( eRcpt , sGotRcpt, sGotRcpt , &GSmtp::ServerProtocol::doRcpt ) ;
|
|
m_fsm.addTransition( eData , sGotMail, sIdle , &GSmtp::ServerProtocol::doNoRecipients ) ;
|
|
m_fsm.addTransition( eData , sGotRcpt, sData , &GSmtp::ServerProtocol::doData ) ;
|
|
|
|
if( m_sasl.active() )
|
|
{
|
|
m_fsm.addTransition( eAuth , sStart , sAuth , &GSmtp::ServerProtocol::doAuth , sIdle ) ;
|
|
m_fsm.addTransition( eAuth , sIdle , sAuth , &GSmtp::ServerProtocol::doAuth , sIdle ) ;
|
|
m_fsm.addTransition( eAuthData, sAuth , sAuth , &GSmtp::ServerProtocol::doAuthData , sIdle ) ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::init( const std::string & ident )
|
|
{
|
|
sendGreeting( m_thishost , ident ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendGreeting( const std::string & thishost , const std::string & ident )
|
|
{
|
|
std::ostringstream ss ;
|
|
ss << "220 " << thishost << " -- " << ident << " -- Service ready" ;
|
|
send( ss.str() ) ;
|
|
}
|
|
|
|
bool GSmtp::ServerProtocol::apply( const std::string & line )
|
|
{
|
|
bool log_content = false ;
|
|
if( m_fsm.state() == sData )
|
|
{
|
|
if( isEndOfText(line) )
|
|
{
|
|
if( !log_content )
|
|
G_LOG( "GSmtp::ServerProtocol: rx<<: [message content not logged]" ) ;
|
|
G_LOG( "GSmtp::ServerProtocol: rx<<: \"" << G::Str::toPrintableAscii(line) << "\"" ) ;
|
|
m_fsm.reset( sProcessing ) ;
|
|
m_pmessage.process( m_sasl.id() , m_peer_address.displayString(false) ) ; // -> processDone()
|
|
}
|
|
else
|
|
{
|
|
if( log_content )
|
|
G_LOG( "GSmtp::ServerProtocol: rx<<: \"" << G::Str::toPrintableAscii(line) << "\"" ) ;
|
|
m_pmessage.addText( isEscaped(line) ? line.substr(1U) : line ) ;
|
|
}
|
|
return false ;
|
|
}
|
|
else
|
|
{
|
|
Event event ;
|
|
if( m_fsm.state() == sAuth )
|
|
{
|
|
event = eAuthData ;
|
|
G_LOG( "GSmtp::ServerProtocol: rx<<: [authentication response not logged]" ) ;
|
|
G_DEBUG( "GSmtp::ServerProtocol: rx<<: {" << Base64::decode(line) << "}" ) ;
|
|
}
|
|
else
|
|
{
|
|
G_LOG( "GSmtp::ServerProtocol: rx<<: \"" << G::Str::toPrintableAscii(line) << "\"" ) ;
|
|
event = commandEvent( commandWord(line) ) ;
|
|
}
|
|
|
|
State new_state = m_fsm.apply( *this , event , commandLine(line) ) ;
|
|
const bool protocol_error = new_state == s_Any ;
|
|
if( protocol_error )
|
|
sendOutOfSequence( line ) ;
|
|
return new_state == sEnd ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::processDone( bool success , unsigned long , std::string reason )
|
|
{
|
|
G_DEBUG( "GSmtp::ServerProtocol::processDone: " << success << ", \"" << reason << "\"" ) ;
|
|
G_ASSERT( m_fsm.state() == sProcessing ) ; // (a RSET will call m_pmessage.clear() to cancel the callback)
|
|
if( m_fsm.state() == sProcessing ) // just in case
|
|
{
|
|
m_fsm.reset( sIdle ) ;
|
|
sendCompletionReply( success , reason ) ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doQuit( const std::string & , bool & )
|
|
{
|
|
// (could call sendClosing() here, but if it fails it does "delete this".
|
|
m_sender.protocolDone() ;
|
|
// do nothing more -- this object may have been deleted in protocolDone()
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doNoop( const std::string & , bool & )
|
|
{
|
|
sendOk() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doVrfy( const std::string & line , bool & )
|
|
{
|
|
std::string mbox = parseMailbox( line ) ;
|
|
Verifier::Status rc = verify( mbox , "" ) ;
|
|
bool local = rc.is_local ;
|
|
if( local && rc.full_name.length() )
|
|
sendVerified( rc.full_name ) ;
|
|
else if( local )
|
|
sendNotVerified( mbox ) ;
|
|
else
|
|
sendWillAccept( mbox ) ;
|
|
}
|
|
|
|
GSmtp::Verifier::Status GSmtp::ServerProtocol::verify( const std::string & to , const std::string & from ) const
|
|
{
|
|
std::string mechanism = m_sasl.active() ? m_sasl.mechanism() : std::string() ;
|
|
std::string id = m_sasl.active() ? m_sasl.id() : std::string() ;
|
|
if( m_sasl.active() && !m_authenticated )
|
|
mechanism = "NONE" ;
|
|
return m_verifier.verify( to , from , m_peer_address , mechanism , id ) ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::parseMailbox( const std::string & line ) const
|
|
{
|
|
std::string user ;
|
|
size_t pos = line.find_first_of( " \t" ) ;
|
|
if( pos != std::string::npos )
|
|
user = line.substr(pos) ;
|
|
|
|
G::Str::trim( user , " \t" ) ;
|
|
return user ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doEhlo( const std::string & line , bool & predicate )
|
|
{
|
|
std::string peer_name = parsePeerName( line ) ;
|
|
if( peer_name.empty() )
|
|
{
|
|
predicate = false ;
|
|
sendMissingParameter() ;
|
|
}
|
|
else
|
|
{
|
|
m_peer_name = peer_name ;
|
|
m_pmessage.clear() ;
|
|
sendEhloReply( m_thishost ) ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doHelo( const std::string & line , bool & predicate )
|
|
{
|
|
std::string peer_name = parsePeerName( line ) ;
|
|
if( peer_name.empty() )
|
|
{
|
|
predicate = false ;
|
|
sendMissingParameter() ;
|
|
}
|
|
else
|
|
{
|
|
m_peer_name = peer_name ;
|
|
m_pmessage.clear() ;
|
|
sendHeloReply( m_thishost ) ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doAuth( const std::string & line , bool & predicate )
|
|
{
|
|
G::StringArray word_array ;
|
|
G::Str::splitIntoTokens( line , word_array , " \t" ) ;
|
|
|
|
std::string mechanism = word_array.size() > 1U ? word_array[1U] : std::string() ;
|
|
G::Str::toUpper( mechanism ) ;
|
|
std::string initial_response = word_array.size() > 2U ? word_array[2U] : std::string() ;
|
|
bool got_initial_response = word_array.size() > 2U ;
|
|
|
|
G_DEBUG( "ServerProtocol::doAuth: [" << mechanism << "], [" << initial_response << "]" ) ;
|
|
|
|
if( m_authenticated )
|
|
{
|
|
G_WARNING( "GSmtp::ServerProtocol: too many AUTHs" ) ;
|
|
predicate = false ; // => idle
|
|
sendOutOfSequence(line) ; // see RFC2554 "Restrictions"
|
|
}
|
|
else if( ! m_sasl.init(mechanism) )
|
|
{
|
|
G_WARNING( "GSmtp::ServerProtocol: request for unsupported AUTH mechanism: " << mechanism ) ;
|
|
predicate = false ; // => idle
|
|
send( "504 Unsupported authentication mechanism" ) ;
|
|
}
|
|
else if( got_initial_response && ! Base64::valid(initial_response) )
|
|
{
|
|
G_WARNING( "GSmtp::ServerProtocol: invalid base64 encoding of AUTH parameter" ) ;
|
|
predicate = false ; // => idle
|
|
send( "501 Invalid argument" ) ;
|
|
}
|
|
else if( got_initial_response && m_sasl.mustChallenge() )
|
|
{
|
|
predicate = false ; // => idle
|
|
sendAuthDone( false ) ;
|
|
}
|
|
else if( got_initial_response )
|
|
{
|
|
std::string s = initial_response == "=" ? std::string() : Base64::decode(initial_response) ;
|
|
bool done = false ;
|
|
std::string next_challenge = m_sasl.apply( s , done ) ;
|
|
if( done )
|
|
{
|
|
predicate = false ; // => idle
|
|
m_authenticated = m_sasl.authenticated() ;
|
|
sendAuthDone( m_sasl.authenticated() ) ;
|
|
}
|
|
else
|
|
{
|
|
sendChallenge( next_challenge ) ;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
sendChallenge( m_sasl.initialChallenge() ) ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendAuthDone( bool ok )
|
|
{
|
|
if( ok )
|
|
send( "235 Authentication sucessful" ) ;
|
|
else
|
|
send( "535 Authentication failed" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doAuthData( const std::string & line , bool & predicate )
|
|
{
|
|
if( line == "*" )
|
|
{
|
|
predicate = false ; // => idle
|
|
send( "501 authentication cancelled" ) ;
|
|
}
|
|
else if( ! Base64::valid(line) )
|
|
{
|
|
G_WARNING( "GSmtp::ServerProtocol: invalid base64 encoding of authentication response" ) ;
|
|
predicate = false ; // => idle
|
|
sendAuthDone( false ) ;
|
|
}
|
|
else
|
|
{
|
|
bool done = false ;
|
|
std::string next_challenge = m_sasl.apply( Base64::decode(line) , done ) ;
|
|
if( done )
|
|
{
|
|
predicate = false ; // => idle
|
|
m_authenticated = m_sasl.authenticated() ;
|
|
sendAuthDone( m_sasl.authenticated() ) ;
|
|
}
|
|
else
|
|
{
|
|
sendChallenge( next_challenge ) ;
|
|
}
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendChallenge( const std::string & s )
|
|
{
|
|
send( std::string("334 ") + Base64::encode(s,std::string()) ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doMailPrepare( const std::string & line , bool & predicate )
|
|
{
|
|
if( m_sasl.active() && !m_sasl.trusted(m_peer_address) && !m_authenticated )
|
|
{
|
|
predicate = false ;
|
|
sendAuthRequired() ;
|
|
}
|
|
else
|
|
{
|
|
m_pmessage.clear() ;
|
|
std::string from = parseFrom( line ) ;
|
|
bool ok = m_pmessage.setFrom( from ) ;
|
|
predicate = ok ;
|
|
if( ok )
|
|
{
|
|
bool async_prepare = m_pmessage.prepare() ;
|
|
if( ! async_prepare )
|
|
m_fsm.apply( *this , ePrepared , "" ) ; // re-entrancy ok
|
|
}
|
|
else
|
|
{
|
|
sendBadFrom( from ) ;
|
|
}
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::prepareDone( bool success , bool temporary_fault , std::string reason )
|
|
{
|
|
G_DEBUG( "GSmtp::ServerProtocol::prepareDone: " << success << ", "
|
|
<< temporary_fault << ", \"" << reason << "\"" ) ;
|
|
|
|
// as a kludge mark temporary failures by prepending a space
|
|
if( !success && temporary_fault )
|
|
reason = std::string(" ")+reason ;
|
|
|
|
m_fsm.apply( *this , ePrepared , reason ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doMail( const std::string & line , bool & predicate )
|
|
{
|
|
// here 'line' comes from prepareDone(), or empty if no preparation stage
|
|
G_DEBUG( "GSmtp::ServerProtocol::doMail: \"" << line << "\"" ) ;
|
|
if( line.empty() )
|
|
{
|
|
sendMailReply() ;
|
|
}
|
|
else
|
|
{
|
|
predicate = false ;
|
|
bool temporary = line.at(0U) == ' ' ;
|
|
sendMailError( line.substr(temporary?1U:0U) , temporary ) ;
|
|
}
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doRcpt( const std::string & line , bool & predicate )
|
|
{
|
|
std::string to = parseTo( line ) ;
|
|
Verifier::Status status = verify( to , m_pmessage.from() ) ;
|
|
bool ok = m_pmessage.addTo( to , status ) ;
|
|
predicate = ok ;
|
|
if( ok )
|
|
sendRcptReply() ;
|
|
else
|
|
sendBadTo( G::Str::toPrintableAscii(status.reason) ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doUnknown( const std::string & line , bool & )
|
|
{
|
|
sendUnrecognised( line ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doRset( const std::string & , bool & )
|
|
{
|
|
m_pmessage.clear() ;
|
|
// (could also reset authentication here)
|
|
sendRsetReply() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doNoRecipients( const std::string & , bool & )
|
|
{
|
|
sendNoRecipients() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::doData( const std::string & , bool & )
|
|
{
|
|
m_pmessage.addReceived( receivedLine() ) ;
|
|
sendDataReply() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendOutOfSequence( const std::string & )
|
|
{
|
|
send( "503 command out of sequence -- use RSET to resynchronise" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendMissingParameter()
|
|
{
|
|
send( "501 parameter required" ) ;
|
|
}
|
|
|
|
bool GSmtp::ServerProtocol::isEndOfText( const std::string & line ) const
|
|
{
|
|
return line.length() == 1U && line.at(0U) == '.' ;
|
|
}
|
|
|
|
bool GSmtp::ServerProtocol::isEscaped( const std::string & line ) const
|
|
{
|
|
return line.length() > 1U && line.at(0U) == '.' ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::commandWord( const std::string & line_in ) const
|
|
{
|
|
std::string line( line_in ) ;
|
|
G::Str::trimLeft( line , " \t" ) ;
|
|
|
|
size_t pos = line.find_first_of( " \t" ) ;
|
|
std::string command = line.substr( 0U , pos ) ;
|
|
|
|
G::Str::toUpper( command ) ;
|
|
return command ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::commandLine( const std::string & line_in ) const
|
|
{
|
|
std::string line( line_in ) ;
|
|
G::Str::trimLeft( line , " \t" ) ;
|
|
return line ;
|
|
}
|
|
|
|
GSmtp::ServerProtocol::Event GSmtp::ServerProtocol::commandEvent( const std::string & command ) const
|
|
{
|
|
if( command == "QUIT" ) return eQuit ;
|
|
if( command == "HELO" ) return eHelo ;
|
|
if( command == "EHLO" ) return eEhlo ;
|
|
if( command == "RSET" ) return eRset ;
|
|
if( command == "DATA" ) return eData ;
|
|
if( command == "RCPT" ) return eRcpt ;
|
|
if( command == "MAIL" ) return eMail ;
|
|
if( command == "VRFY" ) return eVrfy ;
|
|
if( command == "NOOP" ) return eNoop ;
|
|
if( command == "HELP" ) return eHelp ;
|
|
if( m_sasl.active() && command == "AUTH" ) return eAuth ;
|
|
return eUnknown ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendClosing()
|
|
{
|
|
send( "221 closing connection" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendVerified( const std::string & user )
|
|
{
|
|
send( std::string("250 ") + user ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendNotVerified( const std::string & user )
|
|
{
|
|
send( std::string("550 no such mailbox: ") + user ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendWillAccept( const std::string & user )
|
|
{
|
|
send( std::string("252 cannot verify but will accept: ") + user ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendUnrecognised( const std::string & line )
|
|
{
|
|
send( "500 command unrecognized: \"" + line + std::string("\"") ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendAuthRequired()
|
|
{
|
|
send( "530 authentication required" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendNoRecipients()
|
|
{
|
|
send( "554 no valid recipients" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendDataReply()
|
|
{
|
|
send( "354 start mail input -- end with <CRLF>.<CRLF>" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendRsetReply()
|
|
{
|
|
send( "250 state reset" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendMailReply()
|
|
{
|
|
sendOk() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendMailError( const std::string & reason , bool temporary )
|
|
{
|
|
std::string number( temporary ? "452" : "550" ) ;
|
|
send( number + " " + reason ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendCompletionReply( bool ok , const std::string & reason )
|
|
{
|
|
if( ok )
|
|
sendOk() ;
|
|
else
|
|
send( std::string("452 message processing failed: ") + reason ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendRcptReply()
|
|
{
|
|
sendOk() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendBadFrom( const std::string & /*from*/ )
|
|
{
|
|
send( "553 mailbox name not allowed" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendBadTo( const std::string & text )
|
|
{
|
|
send( std::string("550 mailbox unavailable: ") + text ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendEhloReply( const std::string & domain )
|
|
{
|
|
std::ostringstream ss ;
|
|
ss << "250-" << domain << " says hello" << crlf() ;
|
|
if( m_sasl.active() )
|
|
ss << "250-AUTH " << m_sasl.mechanisms() << crlf() ;
|
|
ss << "250 8BITMIME" ;
|
|
send( ss.str() ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendHeloReply( const std::string & /*domain*/ )
|
|
{
|
|
sendOk() ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::sendOk()
|
|
{
|
|
send( "250 OK" ) ;
|
|
}
|
|
|
|
//static
|
|
std::string GSmtp::ServerProtocol::crlf()
|
|
{
|
|
return std::string( "\015\012" ) ;
|
|
}
|
|
|
|
void GSmtp::ServerProtocol::send( std::string line )
|
|
{
|
|
G_LOG( "GSmtp::ServerProtocol: tx>>: \"" << line << "\"" ) ;
|
|
line.append( crlf() ) ;
|
|
m_sender.protocolSend( line ) ;
|
|
}
|
|
|
|
GSmtp::ServerProtocol::~ServerProtocol()
|
|
{
|
|
m_pmessage.doneSignal().disconnect() ;
|
|
m_pmessage.preparedSignal().disconnect() ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::parseFrom( const std::string & line ) const
|
|
{
|
|
// eg. MAIL FROM:<me@localhost>
|
|
return parse( line ) ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::parseTo( const std::string & line ) const
|
|
{
|
|
// eg. RCPT TO:<@first.co.uk,@second.co.uk:you@final.co.uk>
|
|
// eg. RCPT TO:<Postmaster>
|
|
return parse( line ) ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::parse( const std::string & line ) const
|
|
{
|
|
size_t start = line.find( '<' ) ;
|
|
size_t end = line.find( '>' ) ;
|
|
if( start == std::string::npos || end == std::string::npos || end < start )
|
|
return std::string() ;
|
|
|
|
std::string s = line.substr( start + 1U , end - start - 1U ) ;
|
|
G::Str::trim( s , " \t" ) ;
|
|
|
|
// strip source route
|
|
if( s.length() > 0U && s.at(0U) == '@' )
|
|
{
|
|
size_t colon_pos = s.find( ':' ) ;
|
|
if( colon_pos == std::string::npos )
|
|
return std::string() ;
|
|
s = s.substr( colon_pos + 1U ) ;
|
|
}
|
|
|
|
return s ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::parsePeerName( const std::string & line ) const
|
|
{
|
|
size_t pos = line.find_first_of( " \t" ) ;
|
|
if( pos == std::string::npos )
|
|
return std::string() ;
|
|
|
|
std::string peer_name = line.substr( pos + 1U ) ;
|
|
G::Str::trim( peer_name , " \t" ) ;
|
|
return peer_name ;
|
|
}
|
|
|
|
std::string GSmtp::ServerProtocol::receivedLine() const
|
|
{
|
|
G::DateTime::EpochTime t = G::DateTime::now() ;
|
|
G::DateTime::BrokenDownTime tm = G::DateTime::local(t) ;
|
|
std::string zone = G::DateTime::offsetString(G::DateTime::offset(t)) ;
|
|
G::Date date( tm ) ;
|
|
G::Time time( tm ) ;
|
|
|
|
std::ostringstream ss ;
|
|
ss
|
|
<< "Received: "
|
|
<< "FROM " << m_peer_name << " "
|
|
<< "([" << m_peer_address.displayString(false) << "]) "
|
|
<< "BY " << m_thishost << " "
|
|
<< "WITH ESMTP "
|
|
<< "; "
|
|
<< date.weekdayName(true) << ", "
|
|
<< date.monthday() << " "
|
|
<< date.monthName(true) << " "
|
|
<< date.yyyy() << " "
|
|
<< time.hhmmss(":") << " "
|
|
<< zone ;
|
|
return ss.str() ;
|
|
}
|
|
|
|
// ===
|
|
|
|
GSmtp::ServerProtocol::Sender::~Sender()
|
|
{
|
|
}
|
|
|