view roundup/mailgw.py @ 8513:d7d91e25a1c2

chore(build): bump anchore/scan-action from 7.2.3 to 7.3.0 pull #80
author John Rouillard <rouilj@ieee.org>
date Tue, 27 Jan 2026 21:41:37 -0500
parents 14c7c07b32d8
children f80c566f5726
line wrap: on
line source

# -*- coding: utf-8 -*-
#
# Copyright (c) 2001 Bizar Software Pty Ltd (http://www.bizarsoftware.com.au/)
# This module is free software, and you may redistribute it and/or modify
# under the same terms as Python, so long as this copyright message and
# disclaimer are retained in their original form.
#
# IN NO EVENT SHALL BIZAR SOFTWARE PTY LTD BE LIABLE TO ANY PARTY FOR
# DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING
# OUT OF THE USE OF THIS CODE, EVEN IF THE AUTHOR HAS BEEN ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
#
# BIZAR SOFTWARE PTY LTD SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING,
# BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE.  THE CODE PROVIDED HEREUNDER IS ON AN "AS IS"
# BASIS, AND THERE IS NO OBLIGATION WHATSOEVER TO PROVIDE MAINTENANCE,
# SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS.
#

"""An e-mail gateway for Roundup.

Incoming messages are examined for multiple parts:
 . In a multipart/mixed message or part, each subpart is extracted and
   examined. The text/plain subparts are assembled to form the textual
   body of the message, to be stored in the file associated with a "msg"
   class node. Any parts of other types are each stored in separate files
   and given "file" class nodes that are linked to the "msg" node.
 . In a multipart/alternative message or part, we look for a text/plain
   subpart and ignore the other parts.
 . A message/rfc822 is treated similar to multipart/mixed (except for
   special handling of the first text part) if unpack_rfc822 is set in
   the mailgw config section.

Addresses
---------
All of the addresses in the To: and Cc: headers of the incoming message are
looked up among the user nodes, and the corresponding users are placed in
the "recipients" property on the new "msg" node. The address in the From:
header similarly determines the "author" property of the new "msg"
node. The default handling for addresses that don't have corresponding
users is to create new users with no passwords and a username equal to the
address. (The web interface does not permit logins for users with no
passwords.) If we prefer to reject mail from outside sources, we can simply
register an auditor on the "user" class that prevents the creation of user
nodes with no passwords.

Actions
-------
The subject line of the incoming message is examined to determine
whether the message is an attempt to create a new item, discuss an
existing item, or execute some other command.

If the subject consists of one of the following (case insensitive),
the corresponding action is taken:

help
  Respond with an explanation of this interface.

If the subject contains the following, the corresponding action is
taken:

-- key <OneTimeKey>
  Complete an in-progress user registration.

If the email is not a command, it is either a new item or a message
associated with an existing item.  A designator enclosed in square
brackets is sought as the first thing on the subject line (after
skipping any "Fwd:" or "Re:" prefixes).

If an item designator (class name and id number) is found there, the newly
created "msg" node is added to the "messages" property for that item, and
any new "file" nodes are added to the "files" property for the item.

If just an item class name is found there, we attempt to create a new item
of that class with its "messages" property initialized to contain the new
"msg" node and its "files" property initialized to contain any new "file"
nodes.

Summary
-------
The "summary" property on message nodes is taken from the first non-quoting
section in the message body. The message body is divided into sections by
blank lines. Sections where the second and all subsequent lines begin with
a ">" or "|" character are considered "quoting sections". The first line of
the first non-quoting section becomes the summary of the message.

Triggers
--------
Both cases may trigger detectors (in the first case we are calling the
set() method to add the message to the item's spool; in the second case we
are calling the create() method to create a new node). If an auditor raises
an exception, the original message is bounced back to the sender with the
explanatory message given in the exception.
"""
from __future__ import print_function
__docformat__ = 'restructuredtext'

import base64
import email
import email.utils
import functools
import io
import logging
import os
import re
import sys
import time
import traceback

import mailbox
import socket
import getpass
import poplib
import imaplib
try:
    import requests
except ImportError:
    requests = None
from email.generator import Generator

import roundup.anypy.random_ as random_
import roundup.anypy.ssl_ as ssl_

from roundup import configuration, date,  exceptions, hyperdb, i18n, password
from roundup.anypy.email_ import decode_header, message_from_bytes, \
    message_from_binary_file
from roundup.anypy.my_input import my_input
from roundup.anypy.strings import StringIO, b2s, u2s
from roundup.hyperdb import iter_roles
from roundup.i18n import _
from roundup.logcontext import gen_trace_id, store_trace_reason
from roundup.mailer import Mailer
from roundup.dehtml import dehtml

try:
    import gpg, gpg.core, gpg.constants, gpg.constants.sigsum   # noqa: E401
except ImportError:
    gpg = None

from roundup.exceptions import RoundupException

SENDMAILDEBUG = os.environ.get('SENDMAILDEBUG', '')


class MailGWError(ValueError):
    pass


class MailUsageError(ValueError):
    pass


class MailUsageHelp(RoundupException):
    """ We need to send the help message to the user. """
    pass


class Unauthorized(RoundupException):
    """ Access denied """
    pass


class IgnoreMessage(RoundupException):
    """ A general class of message that we should ignore. """
    pass


class IgnoreBulk(IgnoreMessage):
    """ This is email from a mailing list or from a vacation program. """
    pass


class IgnoreLoop(IgnoreMessage):
    """ We've seen this message before... """
    pass


def initialiseSecurity(security):
    ''' Create some Permissions and Roles on the security object

        This function is directly invoked by security.Security.__init__()
        as a part of the Security object instantiation.
    '''
    p = security.addPermission(name="Email Access",
                               description="User may use the email interface")
    security.addPermissionToRole('Admin', p)


def gpgh_key_getall(key, attr):
    ''' return list of given attribute for all uids in
        a key
    '''
    for u in key.uids:
        yield getattr(u, attr)


def check_pgp_sigs(sigs, gpgctx, author, may_be_unsigned=False):
    ''' Theoretically a PGP message can have several signatures. GPGME
        returns status on all signatures in a list. Walk that list
        looking for the author's signature. Note that even if incoming
        signatures are not required, the processing fails if there is an
        invalid signature.
    '''
    for sig in sigs:
        key = gpgctx.get_key(sig.fpr, False)
        # we really only care about the signature of the user who
        # submitted the email
        if key and (author in gpgh_key_getall(key, 'email')):
            if sig.summary & gpg.constants.sigsum.VALID:
                return True
            else:
                # try to narrow down the actual problem to give a more useful
                # message in our bounce
                if sig.summary & gpg.constants.sigsum.KEY_MISSING:
                    raise MailUsageError(
                        _("Message signed with unknown key: %s") % sig.fpr)
                elif sig.summary & gpg.constants.sigsum.KEY_EXPIRED:
                    raise MailUsageError(
                        _("Message signed with an expired key: %s") % sig.fpr)
                elif sig.summary & gpg.constants.sigsum.KEY_REVOKED:
                    raise MailUsageError(
                        _("Message signed with a revoked key: %s") % sig.fpr)
                else:
                    raise MailUsageError(
                        _("Invalid PGP signature detected."))

    # we couldn't find a key belonging to the author of the email
    if sigs:
        raise MailUsageError(_("Message signed with unknown key: %s") %
                             sig.fpr)
    elif not may_be_unsigned:
        raise MailUsageError(_("Unsigned Message"))


class RoundupMessage(email.message.Message):
    def _decode_header(self, hdr):
        parts = []
        for part, encoding in decode_header(hdr):
            # decode_header might return either bytes or unicode,
            # see https://bugs.python.org/issue21492
            # If part is bytes, try to decode it with the specified
            # encoding if it's provided, otherwise try utf-8 and
            # fallback on iso-8859-1 if that fails.
            if isinstance(part, bytes):
                if encoding:
                    part = part.decode(encoding)
                else:
                    try:
                        part = part.decode('utf-8')
                    except UnicodeDecodeError:
                        part = part.decode('iso-8859-1')
            # RFC 2047 specifies that between encoded parts spaces are
            # swallowed while at the borders from encoded to non-encoded
            # or vice-versa we must preserve a space. Multiple adjacent
            # non-encoded parts should not occur. This is now
            # implemented in our patched decode_header method in anypy
            parts.append(part)

        return ''.join([u2s(p) for p in parts])

    def flatten(self):
        fp = StringIO()
        generator = Generator(fp, mangle_from_=False)
        generator.flatten(self)
        return fp.getvalue()

    def get_header(self, header, default=None):
        value = self.get(header, default)

        if value:
            return self._decode_header(value.replace('\n', ''))

        return value

    def get_address_list(self, header):
        addresses = []

        for name, addr in email.utils.getaddresses(self.get_all(header, [])):
            addresses.append((self._decode_header(name), addr))

        return addresses

    def get_body(self):
        """Get the decoded message body."""
        content = self.get_payload(decode=True)

        if content is not None:
            charset = self.get_content_charset()
            if charset or self.get_content_maintype() == 'text':
                content = u2s(content.decode(
                    charset or 'iso8859-1', 'replace'))

        return content

    # General multipart handling:
    #   Take the first text/plain part, anything else is considered an
    #   attachment.
    # multipart/mixed:
    #   Multiple "unrelated" parts.
    # multipart/Alternative (rfc 1521):
    #   Like multipart/mixed, except that we'd only want one of the
    #   alternatives. Generally a top-level part from MUAs sending HTML
    #   mail - there will be a text/plain version.
    # multipart/signed (rfc 1847):
    #   The control information is carried in the second of the two
    #   required body parts.
    #   ACTION: Default, so if content is text/plain we get it.
    # multipart/encrypted (rfc 1847):
    #   The control information is carried in the first of the two
    #   required body parts.
    #   ACTION: Not handleable as the content is encrypted.
    # multipart/related (rfc 1872, 2112, 2387):
    #   The Multipart/Related content-type addresses the MIME
    #   representation of compound objects, usually HTML mail with embedded
    #   images. Usually appears as an alternative.
    #   ACTION: Default, if we must.
    # multipart/report (rfc 1892):
    #   e.g. mail system delivery status reports.
    #   ACTION: Default. Could be ignored or used for Delivery Notification
    #   flagging.
    # multipart/form-data:
    #   For web forms only.
    # message/rfc822:
    #   Only if configured in [mailgw] unpack_rfc822
    def extract_content(self, parent_type=None, ignore_alternatives=False,
                        unpack_rfc822=False, html2text=None):
        """
        Extract the body and the attachments recursively.

        If the content is hidden inside a multipart/alternative part, we use
        the *last* text/plain part of the *first* multipart/alternative in
        the whole message.

        If ignore_alteratives is True then only the alternative parts in the
        same multipart/alternative part as where the content is found are
        ignored.
        """
        content_type = self.get_content_type()
        content = None
        attachments = []
        html_part = False

        if content_type == 'text/plain':
            content = self.get_body()
        elif content_type == 'text/html' and html2text:
            # if user allows html conversion run this.
            content = html2text(self.get_body())
            attachments.append(self.as_attachment())
            html_part = True
        elif content_type == 'message/rfc822' and not unpack_rfc822:
            attachments.append(self.as_attachment())
        elif self.is_multipart():
            content_found = False
            ig = ignore_alternatives
            html_part_found = False
            for part in self.get_payload():
                new_content, new_attach, html_part = part.extract_content(
                    content_type, not content and ig, unpack_rfc822,
                    html2text)

                # If we haven't found a text/plain part yet, take this one,
                # otherwise make it an attachment.
                if not content:
                    content = new_content
                    cpart = part
                    if html_part:
                        html_part_found = True
                elif new_content:
                    if html_part:
                        # attachment should be added elsewhere.
                        pass
                    elif (content_found or
                          content_type != 'multipart/alternative'):
                        attachments.append(part.text_as_attachment())
                    elif html_part_found:
                        # text/plain part found after html
                        # text/html already stored as attachment,
                        # so just use the text as the content.
                        content = new_content
                        cpart = part
                    else:
                        # if we have found a text/plain in the current
                        # multipart/alternative and find another one, we
                        # use the first as an attachment (if configured)
                        # and use the second one because rfc 2046, sec.
                        # 5.1.4. specifies that later parts are better
                        # (thanks to Philipp Gortan for pointing this
                        # out)
                        attachments.append(cpart.text_as_attachment())
                        content = new_content
                        cpart = part

                attachments.extend(new_attach)
            if ig and content_type == 'multipart/alternative' and content:
                attachments = []
            html_part = False
        elif (parent_type == 'multipart/signed' and
                content_type == 'application/pgp-signature'):
            # Don't save signatures for signed messages as attachments
            pass
        else:
            attachments.append(self.as_attachment())

        return content, attachments, html_part

    def text_as_attachment(self):
        """Return first text/plain part as Message"""
        if not self.is_multipart():
            return self.as_attachment()
        for part in self.get_payload():
            if part.is_multipart():
                p = part.text_as_attachment()
                if p:
                    return p
            elif part.get_content_type() == 'text/plain':
                return part.as_attachment()
        return None

    def get_filename(self):
        """ Note: The get_filename of the Message class returns just the
            encoded header as transmitted via email. We make an attempt
            here to decode the information returned and return the real
            filename here.
        """
        # This should really use super() but doesn't work with python2
        # because it seems that email.message.Message isn't a new-style
        # class in python2
        fn = email.message.Message.get_filename(self)
        if not fn:
            return fn
        h = []
        for x, t in decode_header(fn):
            h.append(x.decode(t) if t else x)
        return ''.join(h)

    def as_attachment(self):
        """Return this message as an attachment."""
        filename = self.get_filename()
        content_type = self.get_content_type()
        content = self.get_body()

        if content is None and self.get_content_type() == 'message/rfc822':
            # handle message/rfc822 specially - the name should be
            # the subject of the actual e-mail embedded here
            # we add a '.eml' extension like other email software does it
            subject = self.get_payload(0).get('subject')
            if subject:
                filename = '{0}.eml'.format(subject)

            content = self.get_payload(0).flatten()

        return (filename, content_type, content)

    def pgp_signed(self):
        """
        RFC 3156 requires OpenPGP MIME mail to have the protocol parameter
        """
        return (self.get_content_type() == 'multipart/signed' and
                self.get_param('protocol') == 'application/pgp-signature')

    def pgp_encrypted(self):
        """
        RFC 3156 requires OpenPGP MIME mail to have the protocol parameter
        """
        return (self.get_content_type() == 'multipart/encrypted' and
                self.get_param('protocol') == 'application/pgp-encrypted')

    def decrypt(self, author, may_be_unsigned=False):
        '''
        Decrypt an OpenPGP MIME message

        This message must be signed as well as encrypted using the "combined"
        method if incoming signatures are configured.  The decrypted contents
        are returned as a new message.
        '''
        (hdr, msg) = self.get_payload()
        # According to the RFC 3156 encrypted mail must have exactly two parts.
        # The first part contains the control information. Let's verify that
        # the message meets the RFC before we try to decrypt it.
        if (hdr.get_payload().strip() != 'Version: 1' or
                hdr.get_content_type() != 'application/pgp-encrypted'):
            raise MailUsageError(_("Unknown multipart/encrypted version."))

        context = gpg.core.Context()
        ciphertext = gpg.core.Data(msg.get_payload())
        plaintext = gpg.core.Data()

        result = context.op_decrypt_verify(ciphertext, plaintext)

        if result:
            raise MailUsageError(_("Unable to decrypt your message."))

        # we've decrypted it but that just means they used our public
        # key to send it to us. now check the signatures to see if it
        # was signed by someone we trust
        result = context.op_verify_result()
        check_pgp_sigs(result.signatures, context, author,
                       may_be_unsigned=may_be_unsigned)

        plaintext.seek(0, 0)
        # gpg.core.Data implements a seek method with a different signature
        # than roundup can handle. So we'll put the data in a container that
        # the Message class can work with.
        return message_from_bytes(plaintext.read(), RoundupMessage)

    def verify_signature(self, author):
        """
        Verify the signature of an OpenPGP MIME message

        This only handles detached signatures. Old style PGP mail (i.e.
        '-----BEGIN PGP SIGNED MESSAGE----') is archaic and not supported :)
        """
        # we don't check the micalg parameter...gpgme seems to
        # figure things out on its own
        (msg, sig) = self.get_payload()

        if sig.get_content_type() != 'application/pgp-signature':
            raise MailUsageError(_("No PGP signature found in message."))

        # according to rfc 3156 the data "MUST first be converted
        # to its content-type specific canonical form. For
        # text/plain this means conversion to an appropriate
        # character set and conversion of line endings to the
        # canonical <CR><LF> sequence."
        # TODO: what about character set conversion?
        canonical_msg = re.sub('(?<!\r)\n', '\r\n', msg.flatten())
        msg_data = gpg.core.Data(canonical_msg)
        sig_data = gpg.core.Data(sig.get_payload())

        context = gpg.core.Context()
        context.op_verify(sig_data, msg_data, None)

        # check all signatures for validity
        result = context.op_verify_result()
        check_pgp_sigs(result.signatures, context, author)


class parsedMessage:

    def __init__(self, mailgw, message):
        self.mailgw = mailgw
        self.config = mailgw.instance.config
        self.db = mailgw.db
        self.message = message
        self.subject = message.get_header('subject', '')
        self.has_prefix = False
        self.matches = dict.fromkeys(['refwd', 'quote', 'classname',
                                      'nodeid', 'title', 'args', 'argswhole'])
        self.keep_real_from = self.config['EMAIL_KEEP_REAL_FROM']
        if self.keep_real_from:
            self.from_list = message.get_address_list('from')
        else:
            self.from_list = (message.get_address_list('resent-from') or
                              message.get_address_list('from'))
        self.pfxmode = self.config['MAILGW_SUBJECT_PREFIX_PARSING']
        self.sfxmode = self.config['MAILGW_SUBJECT_SUFFIX_PARSING']
        # these are filled in by subsequent parsing steps
        self.classname = None
        self.properties = None
        self.cl = None
        self.nodeid = None
        self.author = None
        self.recipients = None
        self.msg_props = {}
        self.props = None
        self.content = None
        self.attachments = None
        self.crypt = False

    def handle_ignore(self):
        ''' Check to see if message can be safely ignored:
            detect loops and
            Precedence: Bulk, or Microsoft Outlook autoreplies
            Auto-Submitted not equal to no, so auto-generated,
            auto-replied and auto-notified are dropped. rstrip
            auto-submitted value because trailing comment/whitespace
            is allowed per RFC3834. Note that we only handle whitespace.
            Lowercase the value as references say No and no as possible
            values.
        '''
        if self.message.get_header('x-roundup-loop', ''):
            raise IgnoreLoop
        if (
                self.message.get_header('precedence', '') == 'bulk' or
                self.message.get_header('auto-submitted',
                                        'no').rstrip().lower() != 'no' or
                self.subject.lower().find("autoreply") > 0):
            raise IgnoreBulk

    def handle_help(self):
        ''' Check to see if the message contains a usage/help request
        '''
        if self.subject.strip().lower() == 'help':
            raise MailUsageHelp

    def check_subject(self):
        ''' Check to see if the message contains a valid subject line
        '''
        if not self.subject:
            raise MailUsageError(_("""
Emails to Roundup trackers must include a Subject: line!
"""))

    def parse_subject(self):
        ''' Matches subjects like:
        Re: "[issue1234] title of issue [status=resolved]"

        Each part of the subject is matched, stored, then removed from the
        start of the subject string as needed. The stored values are then
        returned
        '''

        tmpsubject = self.subject

        sd_open, sd_close = self.config['MAILGW_SUBJECT_SUFFIX_DELIMITERS']
        delim_open = re.escape(sd_open)
        if delim_open in '[(': delim_open = '\\' + delim_open     # noqa: E701
        delim_close = re.escape(sd_close)
        if delim_close in '[(': delim_close = '\\' + delim_close  # noqa: E701

        # Look for Re: et. al. Used later on for MAILGW_SUBJECT_CONTENT_MATCH
        re_re = r"(?P<refwd>%s)\s*" % self.config["MAILGW_REFWD_RE"].pattern
        m = re.match(re_re, tmpsubject,
                     re.IGNORECASE | re.VERBOSE | re.UNICODE)
        if m:
            m = m.groupdict()
            if m['refwd']:
                self.matches.update(m)
                tmpsubject = tmpsubject[len(m['refwd']):]  # Consume Re:

        # Look for Leading "
        m = re.match(r'(?P<quote>\s*")', tmpsubject,
                     re.IGNORECASE)
        if m:
            self.matches.update(m.groupdict())
            # Consume quote
            tmpsubject = tmpsubject[len(self.matches['quote']):]

        # Check if the subject includes a prefix
        self.has_prefix = re.search(r'^%s\s*(\w+)\s*%s' % (delim_open,
                                                           delim_close),
                                    tmpsubject.strip())

        # Match the classname if specified
        class_re = r'%s\s*(?P<classname>(%s))\s*(?P<nodeid>\d+)?\s*%s' %  \
                   (delim_open, "|".join(self.db.getclasses()),
                    delim_close)
        # Note: re.search, not re.match as there might be garbage
        # (mailing list prefix, etc.) before the class identifier
        m = re.search(class_re, tmpsubject, re.IGNORECASE)
        if m:
            self.matches.update(m.groupdict())
            # Skip to the end of the class identifier, including any
            # garbage before it.

            tmpsubject = tmpsubject[m.end():]

        # Match any arguments specified *from the end*
        # Optionally match and strip quote at the end that dumb mailers
        # may put there, e.g.
        #      Re: "[issue1] bla blah [<args>]"
        q = ''
        if self.matches['quote']:
            q = '"?'
        args_re = r'(?P<argswhole>%s(?P<args>[^%s]*)%s)%s$' % (
            delim_open, delim_close, delim_close, q)
        m = re.search(args_re, tmpsubject.strip(), re.IGNORECASE | re.VERBOSE)
        if m:
            self.matches.update(m.groupdict())
            tmpsubject = tmpsubject[:m.start()]
        else:
            self.matches['argswhole'] = self.matches['args'] = None

        # The title of the subject is the remaining tmpsubject.
        self.matches['title'] = tmpsubject.strip()

        # strip off the quotes that dumb emailers put around the subject, like
        #      Re: "[issue1] bla blah"
        # but only if we didn't match arguments at the end (which would
        # already have consumed the quote after the subject)
        if self.matches['quote'] and not self.matches['argswhole'] \
           and self.matches['title'].endswith('"'):
            self.matches['title'] = self.matches['title'][:-1]

    def rego_confirm(self):
        ''' Check for registration OTK and confirm the registration if found
        '''

        if self.config['EMAIL_REGISTRATION_CONFIRMATION']:
            otk_re = re.compile('-- key (?P<otk>[a-zA-Z0-9]{32})')
            otk = otk_re.search(self.matches['title'] or '')
            if otk:
                self.db.confirm_registration(otk.group('otk'))
                subject = 'Your registration to %s is complete' % \
                          self.config['TRACKER_NAME']
                sendto = [self.from_list[0][1]]
                self.mailgw.mailer.standard_message(sendto, subject, '')
                return 1
        return 0

    def get_classname(self):
        ''' Determine the classname of the node being created/edited
        '''
        subject = self.subject

        # get the classname
        if self.pfxmode == 'none':
            classname = None
        else:
            classname = self.matches['classname']

        if not classname and self.has_prefix and self.pfxmode == 'strict':
            raise MailUsageError(_("""
The message you sent to roundup did not contain a properly formed subject
line. The subject must contain a class name or designator to indicate the
'topic' of the message. For example:
    Subject: [issue] This is a new issue
      - this will create a new issue in the tracker with the title 'This is
        a new issue'.
    Subject: [issue1234] This is a followup to issue 1234
      - this will append the message's contents to the existing issue 1234
        in the tracker.

Subject was: '%(subject)s'
""") % locals())

        # try to get the class specified - if "loose" or "none" then fall
        # back on the default
        attempts = []
        if classname:
            attempts.append(classname)

        attempts.append(self.mailgw.default_class)

        # first valid class name wins
        self.cl = None
        for trycl in attempts:
            try:
                self.cl = self.db.getclass(trycl)
                classname = self.classname = trycl
                break
            except KeyError:
                pass

        if not self.cl:
            validname = ', '.join(self.db.getclasses())
            if classname:
                raise MailUsageError(_("""
The class name you identified in the subject line ("%(classname)s") does
not exist in the database.

Valid class names are: %(validname)s
Subject was: "%(subject)s"
""") % locals())
            else:
                raise MailUsageError(_("""
You did not identify a class name in the subject line and there is no
default set for this tracker. The subject must contain a class name or
designator to indicate the 'topic' of the message. For example:
    Subject: [issue] This is a new issue
      - this will create a new issue in the tracker with the title 'This is
        a new issue'.
    Subject: [issue1234] This is a followup to issue 1234
      - this will append the message's contents to the existing issue 1234
        in the tracker.

Subject was: '%(subject)s'
""") % locals())
        # get the class properties
        self.properties = self.cl.getprops()

    def get_nodeid(self):
        ''' Determine the nodeid from the message and return it if found
        '''
        title = self.matches['title']
        subject = self.subject

        if self.pfxmode == 'none':
            nodeid = None
        else:
            nodeid = self.matches['nodeid']

        # try in-reply-to to match the message if there's no nodeid
        # If there are multiple matches for the in-reply-to, fall back
        # to title/subject match.
        inreplyto = self.message.get_header('in-reply-to') or ''
        if nodeid is None and inreplyto:
            parent_message = self.db.getclass('msg').stringFind(
                messageid=inreplyto)
            if parent_message:
                nodeid = self.cl.filter(None,
                                        {'messages': parent_message})
                if len(nodeid) == 1:
                    nodeid = nodeid[0]
                elif nodeid:   # len(nodeid) > 1
                    # This message is responding to a message
                    # we know about. But there is more than 1 issue
                    # associated with it.
                    # Before bouncing it or creating a new issue,
                    # force it to be treated as a reply even if the Subject
                    # is missing 'Re:'
                    # Note that multiple issues may be matched by
                    #   Subject as well. The code chooses the most
                    #   recently updated.  Hopefully Subjects have
                    #   less of a chance of collision. Possible future
                    #   idea filter ids that match subject by id's
                    #   that match in-reply-to and choose newest
                    #   match. Not sure if this would work better in
                    #   production, so not implementing now.
                    nodeid = None
                    # trigger Subject match
                    self.matches['refwd'] = True

        # but we do need either a title or a nodeid...
        if nodeid is None and not title:
            raise MailUsageError(_("""
I cannot match your message to a node in the database - you need to either
supply a full designator (with number, eg "[issue123]") or keep the
previous subject title intact so I can match that.

Subject was: "%(subject)s"
""") % locals())

        # If there's no nodeid, check to see if this is a followup and
        # maybe someone's responded to the initial mail that created an
        # entry. Try to find the matching nodes with the same title, and
        # use the _last_ one matched (since that'll _usually_ be the most
        # recent...). The subject_content_match config may specify an
        # additional restriction based on the matched node's creation or
        # activity.
        tmatch_mode = self.config['MAILGW_SUBJECT_CONTENT_MATCH']
        if tmatch_mode != 'never' and nodeid is None and self.matches['refwd']:
            title_match_ids = self.cl.stringFind(title=title)
            limit = None
            if (tmatch_mode.startswith('creation') or
                    tmatch_mode.startswith('activity')):
                limit, interval = tmatch_mode.split(' ', 1)
                threshold = date.Date('.') - date.Interval(interval)
            for id in title_match_ids:
                if limit:
                    if threshold < self.cl.get(id, limit):
                        nodeid = id
                else:
                    nodeid = id

        # if a nodeid was specified, make sure it's valid
        if nodeid is not None and not self.cl.hasnode(nodeid):
            if self.pfxmode == 'strict':
                raise MailUsageError(_("""
The node specified by the designator in the subject of your message
("%(nodeid)s") does not exist.

Subject was: "%(subject)s"
""") % locals())
            else:
                nodeid = None
        self.nodeid = nodeid

    def get_author_id(self):
        ''' Attempt to get the author id from the existing registered users,
            otherwise attempt to register a new user and return their id
        '''
        # Don't create users if anonymous isn't allowed to register
        create = 1
        anonid = self.db.user.lookup('anonymous')
        if not (self.db.security.hasPermission('Register', anonid, 'user')
                and self.db.security.hasPermission('Email Access', anonid)):
            create = 0

        # ok, now figure out who the author is - create a new user if the
        # "create" flag is true
        author = uidFromAddress(self.db, self.from_list[0], create=create)

        # if we're not recognised, and we don't get added as a user, then we
        # must be anonymous
        if not author:
            author = anonid

        # make sure the author has permission to use the email interface
        if not self.db.security.hasPermission('Email Access', author):
            if author == anonid:
                # we're anonymous and we need to be a registered user
                from_address = self.from_list[0][1]
                registration_info = ""
                if self.db.security.hasPermission('Web Access', author) and \
                   self.db.security.hasPermission('Register', anonid, 'user'):
                    tracker_web = self.config.TRACKER_WEB
                    registration_info = """ Please register at:

%(tracker_web)suser?@template=register

...before sending mail to the tracker.""" % locals()

                raise Unauthorized(_("""
You are not a registered user.%(registration_info)s

Unknown address: %(from_address)s
""") % locals())
            else:
                # we're registered and we're _still_ not allowed access
                raise Unauthorized(_(
                    'You are not permitted to access this tracker.'))
        self.author = author

    def check_permissions(self):
        ''' Check if the author has permission to edit or create this
            class of node
        '''
        if self.nodeid:
            if not self.db.security.hasPermission('Edit', self.author,
                                                  self.classname,
                                                  itemid=self.nodeid):
                raise Unauthorized(_(
                    'You are not permitted to edit %(classname)s.'
                    ) % self.__dict__)
        else:
            if not self.db.security.hasPermission('Create', self.author,
                                                  self.classname):
                raise Unauthorized(_(
                    'You are not permitted to create %(classname)s.'
                    ) % self.__dict__)

    def commit_and_reopen_as_author(self):
        ''' the author may have been created - make sure the change is
            committed before we reopen the database
            then re-open the database as the author
        '''
        self.db.commit()

        # set the database user as the author
        username = self.db.user.get(self.author, 'username')
        self.db.setCurrentUser(username)

        # re-get the class with the new database connection
        self.cl = self.db.getclass(self.classname)

    def get_recipients(self):
        ''' Get the list of recipients who were included in message and
            register them as users if possible
        '''
        # Don't create users if anonymous isn't allowed to register
        create = 1
        anonid = self.db.user.lookup('anonymous')
        if not (self.db.security.hasPermission('Register', anonid, 'user')
                and self.db.security.hasPermission('Email Access', anonid)):
            create = 0

        # get the user class arguments from the commandline
        user_props = self.mailgw.get_class_arguments('user')

        # now update the recipients list
        recipients = []
        tracker_email = self.config['TRACKER_EMAIL'].lower()
        msg_to = self.message.get_address_list('to')
        msg_cc = self.message.get_address_list('cc')
        for recipient in msg_to + msg_cc:
            r = recipient[1].strip().lower()
            if r == tracker_email or not r:
                continue

            # look up the recipient - create if necessary (and we're
            # allowed to)
            recipient = uidFromAddress(self.db, recipient, create,
                                       **user_props)

            # if all's well, add the recipient to the list
            if recipient:
                recipients.append(recipient)
        self.recipients = recipients

    def get_props(self):
        ''' Generate all the props for the new/updated node and return them
        '''
        subject = self.subject

        # get the commandline arguments for issues
        issue_props = self.mailgw.get_class_arguments('issue', self.classname)

        #
        # handle the subject argument list
        #
        # figure what the properties of this Class are
        props = {}
        args = self.matches['args']
        argswhole = self.matches['argswhole']
        title = self.matches['title']

        # Reform the title
        if self.matches['nodeid'] and self.nodeid is None:
            title = subject

        if args:
            if self.sfxmode == 'none':
                title += ' ' + argswhole
            else:
                errors, props = setPropArrayFromString(self, self.cl, args,
                                                       self.nodeid)
                # handle any errors parsing the argument list
                if errors:
                    if self.sfxmode == 'strict':
                        errors = '\n- '.join(map(str, errors))
                        raise MailUsageError(_("""
There were problems handling your subject line argument list:
- %(errors)s

Subject was: "%(subject)s"
""") % locals())
                    else:
                        title += ' ' + argswhole

        # set the issue title to the subject
        title = title.strip()
        if (title and 'title' in self.properties and
                'title' not in issue_props):
            issue_props['title'] = title
        if (self.nodeid and 'title' in self.properties and not
                self.config['MAILGW_SUBJECT_UPDATES_TITLE']):
            issue_props['title'] = self.cl.get(self.nodeid, 'title')

        # merge the command line props defined in issue_props into
        # the props dictionary because function(**props, **issue_props)
        # is a syntax error.
        for prop in issue_props.keys():
            if prop not in props:
                props[prop] = issue_props[prop]

        self.props = props

    def get_pgp_message(self):
        ''' If they've enabled PGP processing then verify the signature
            or decrypt the message
        '''
        def pgp_role():
            """ if PGP_ROLES is specified the user must have a Role in the list
                or we will skip PGP processing
            """
            if self.config.PGP_ROLES:
                return self.db.user.has_role(
                    self.author,
                    *iter_roles(self.config.PGP_ROLES))
            else:
                return True

        if self.config.PGP_ENABLE:
            if pgp_role() and self.config.PGP_ENCRYPT:
                self.crypt = True
            assert gpg, 'gpg is not installed'
            # signed/encrypted mail must come from the primary address
            author_address = self.db.user.get(self.author, 'address')
            if self.config.PGP_HOMEDIR:
                os.environ['GNUPGHOME'] = self.config.PGP_HOMEDIR
            if self.config.PGP_REQUIRE_INCOMING in ('encrypted', 'both') \
               and pgp_role() and not self.message.pgp_encrypted():
                raise MailUsageError(_(
                    "This tracker has been configured to require all email "
                    "be PGP encrypted."))
            if self.message.pgp_signed():
                self.message.verify_signature(author_address)
                # signature has been verified
                self.db.tx_Source = "email-sig-openpgp"

            elif self.message.pgp_encrypted():
                # Replace message with the contents of the decrypted
                # message for content extraction
                # Note: the bounce-handling code now makes sure that
                # either the encrypted mail received is sent back or
                # that the error message is encrypted if needed.
                encr_only = self.config.PGP_REQUIRE_INCOMING == 'encrypted'
                encr_only = encr_only or not pgp_role()
                self.crypt = True
                try:
                    # see if the message has a valid signature
                    message = self.message.decrypt(author_address,
                                                   may_be_unsigned=False)
                    # only set if MailUsageError is not raised
                    # indicating that we have a valid signature
                    self.db.tx_Source = "email-sig-openpgp"
                except MailUsageError:
                    # if there is no signature or an error in the message
                    # we get here. Try decrypting it again if we don't
                    # need signatures.
                    if encr_only:
                        message = self.message.decrypt(
                            author_address,
                            may_be_unsigned=encr_only)
                    else:
                        # something failed with the message decryption/sig
                        # chain. Pass the error up.
                        raise
                # store the decrypted message
                self.message = message
            elif pgp_role():
                raise MailUsageError(_("""
This tracker has been configured to require all email be PGP signed or
encrypted."""))

    def get_content_and_attachments(self):
        ''' get the attachments and first text part from the message
        '''
        html2text = dehtml(self.config['MAILGW_CONVERT_HTMLTOTEXT']).html2text

        ig = self.config.MAILGW_IGNORE_ALTERNATIVES
        self.message.instance = self.mailgw.instance
        self.content, self.attachments, html_part = \
            self.message.extract_content(
                ignore_alternatives=ig,
                unpack_rfc822=self.config.MAILGW_UNPACK_RFC822,
                html2text=html2text)

    def create_files(self):
        ''' Create a file for each attachment in the message
        '''
        if 'files' not in self.properties:
            return
        files = []
        file_props = self.mailgw.get_class_arguments('file')

        if self.attachments:
            for (name, mime_type, data) in self.attachments:
                if not self.db.security.hasPermission('Create', self.author,
                                                      'file'):
                    raise Unauthorized(_(
                        'You are not permitted to create files.'))
                if not name:
                    name = "unnamed"
                try:
                    fileid = self.db.file.create(type=mime_type, name=name,
                                                 content=data, **file_props)
                except exceptions.Reject:
                    pass
                else:
                    files.append(fileid)
            # allowed to attach the files to an existing node?
            if self.nodeid and \
               not self.db.security.hasPermission('Edit',
                                                  self.author,
                                                  self.classname,
                                                  'files'):
                raise Unauthorized(_(
                    'You are not permitted to add files to %(classname)s.'
                    ) % self.__dict__)

            self.msg_props['files'] = files
            if self.nodeid:
                # extend the existing files list
                fileprop = self.cl.get(self.nodeid, 'files')
                fileprop.extend(files)
                files = fileprop

            self.props['files'] = files

    def create_msg(self):
        ''' Create msg containing all the relevant information from the message
        '''
        if 'messages' not in self.properties:
            return
        msg_props = self.mailgw.get_class_arguments('msg')
        self.msg_props.update(msg_props)

        # Get the message ids
        inreplyto = self.message.get_header('in-reply-to') or ''
        messageid = self.message.get_header('message-id')
        # generate a messageid if there isn't one
        if not messageid:
            messageid = "<%s.%s.%s%s@%s>" % (
                time.time(),
                b2s(base64.b32encode(random_.token_bytes(10))),
                self.classname, self.nodeid, self.config['MAIL_DOMAIN'])

        if self.content is None:
            raise MailUsageError(_("""
Roundup requires the submission to be plain text. The message parser could
not find a text/plain part to use.
"""))
        # parse the body of the message, stripping out bits as appropriate
        summary, content = parseContent(self.content, config=self.config,
                                        is_new_issue=not bool(self.nodeid))
        content = content.strip()

        if content:
            if not self.db.security.hasPermission('Create',
                                                  self.author, 'msg'):
                raise Unauthorized(_(
                    'You are not permitted to create messages.'))

            try:
                message_id = self.db.msg.create(
                    author=self.author,
                    recipients=self.recipients, date=date.Date('.'),
                    summary=summary, content=content,
                    messageid=messageid, inreplyto=inreplyto, **self.msg_props)
            except exceptions.Reject as error:  # noqa error is used
                raise MailUsageError(_("""
Mail message was rejected by a detector.
%(error)s
""") % locals())
            # allowed to attach the message to the existing node?
            if self.nodeid and \
               not self.db.security.hasPermission('Edit',
                                                  self.author,
                                                  self.classname,
                                                  'messages'):
                raise Unauthorized(_(
                    'You are not permitted to add messages to %(classname)s.'
                    ) % self.__dict__)

            if self.nodeid:
                # add the message to the node's list
                messages = self.cl.get(self.nodeid, 'messages')
                messages.append(message_id)
                self.props['messages'] = messages
            else:
                # pre-load the messages list
                self.props['messages'] = [message_id]

    def create_node(self):
        ''' Create/update a node using self.props
        '''
        classname = self.classname
        try:
            if self.nodeid:
                # Check permissions for each property
                for prop in self.props.keys():
                    if not self.db.security.hasPermission('Edit', self.author,
                                                          classname, prop):
                        raise Unauthorized(_(
                            'You are not permitted to edit '
                            'property %(prop)s of class %(classname)s.') %
                                           locals())
                self.cl.set(self.nodeid, **self.props)
            else:
                # Check permissions for each property
                for prop in self.props.keys():
                    if not self.db.security.hasPermission('Create',
                                                          self.author,
                                                          classname,
                                                          prop):
                        raise Unauthorized(_(
                            'You are not permitted to set '
                            'property %(prop)s of class %(classname)s.') %
                                           locals())
                self.nodeid = self.cl.create(**self.props)
        except (TypeError, IndexError,                        # noqa: F841
                ValueError, exceptions.Reject) as message:
            self.mailgw.logger.exception(
                     "Rejecting email due to node creation error:")
            raise MailUsageError(_("""
There was a problem with the message you sent:
   %(message)s
""") % locals())

        return self.nodeid

        # XXX Don't enable. This doesn't work yet.
#  "[^A-z.]tracker\+(?P<classname>[^\d\s]+)(?P<nodeid>\d+)\@some.dom.ain[^A-z.]"
        # handle delivery to addresses like:tracker+issue25@some.dom.ain
        # use the embedded issue number as our issue
#            issue_re = config['MAILGW_ISSUE_ADDRESS_RE']
#            if issue_re:
#                for header in ['to', 'cc', 'bcc']:
#                    addresses = message.get_header(header, '')
#                if addresses:
#                  # FIXME, this only finds the first match in the addresses.
#                    issue = re.search(issue_re, addresses, 'i')
#                    if issue:
#                        classname = issue.group('classname')
#                        nodeid = issue.group('nodeid')
#                        break

    # Default sequence of methods to be called on message. Use this for
    # easier override of the default message processing
    # list consists of tuples (method, return_if_true), the parsing
    # returns if the return_if_true flag is set for a method *and* the
    # method returns something that evaluates to True.
    method_list = [
        # Filter out messages to ignore
        ("handle_ignore", False),
        # Check for usage/help requests
        ("handle_help", False),
        # Check if the subject line is valid
        ("check_subject", False),
        # get importants parts from subject
        ("parse_subject", False),
        # check for registration OTK
        ("rego_confirm", True),
        # get the classname
        ("get_classname", False),
        # get the optional nodeid:
        ("get_nodeid", False),
        # Determine who the author is:
        ("get_author_id", False),
        # allowed to edit or create this class?
        ("check_permissions", False),
        # author may have been created:
        # commit author to database and re-open as author
        ("commit_and_reopen_as_author", False),
        # Get the recipients list
        ("get_recipients", False),
        # get the new/updated node props
        ("get_props", False),
        # Handle PGP signed or encrypted messages
        ("get_pgp_message", False),
        # extract content and attachments from message body:
        ("get_content_and_attachments", False),
        # put attachments into files linked to the issue:
        ("create_files", False),
        # create the message if there's a message body (content):
        ("create_msg", False),
    ]

    def parse(self):
        for methodname, flag in self.method_list:
            method = getattr(self, methodname)
            ret = method()
            if flag and ret:
                return
        # perform the node change / create:
        return self.create_node()


class MailGW:

    # To override the message parsing, derive your own class from
    # parsedMessage and assign to parsed_message_class in a derived
    # class of MailGW
    parsed_message_class = parsedMessage

    def __init__(self, instance, arguments):
        self.instance = instance
        self.arguments = arguments
        self.default_class = self.arguments.default_class.strip()
        if not self.default_class:
            self.default_class = instance.config['MAILGW_DEFAULT_CLASS']
        self.props_by_class = {}
        self.parse_set_value()

        self.mailer = Mailer(instance.config)
        self.logger = logging.getLogger('roundup.mailgw')

        # should we trap exceptions (normal usage) or pass them through
        # (for testing)
        self.trapExceptions = 1

    def parse_set_value(self):
        """ Parse properties given with '-S' or --set-value option on
            command line
        """
        errors = []
        for v in self.arguments.set_value:
            try:
                n, r = v.split('=', 1)
            except ValueError:
                errors.append('"%s" is not of the form "property=value"' % v)
                break
            try:
                classname, rv = n.split('.', 1)
                r = '='.join((rv, r))
            except ValueError:
                classname = 'msg'
                r = v
            if classname not in self.props_by_class:
                # We can only check later if this is a valid class
                self.props_by_class[classname] = []
            self.props_by_class[classname].append(r)
        if errors:
            mailadmin = self.instance.config['ADMIN_EMAIL']
            raise MailUsageError(_("""
The mail gateway is not properly set up. Please contact
%(mailadmin)s and have them fix the incorrect properties:
  %(errors)s
""") % locals())

    def do_pipe(self):
        """ Read a message from standard input and pass it to the mail handler.

            Read into an internal structure that we can seek on (in case
            there's an error).

            XXX: we may want to read this into a temporary file instead...
        """
        s = io.BytesIO()
        if sys.version_info[0] > 2:
            stdin = sys.stdin.buffer
        else:
            stdin = sys.stdin
        s.write(stdin.read())
        s.seek(0)
        self.main(s)
        return 0

    def do_mailbox(self, filename):
        """ Read a series of messages from the specified unix mailbox file and
            pass each to the mail handler.
        """
        class mboxRoundupMessage(mailbox.mboxMessage, RoundupMessage):
            pass

        # The mailbox class constructs email.message.Message objects
        # using various email.message_from_* methods, without allowing
        # control over the _class argument passed to them to specify a
        # subclass to be used.  We need RoundupMessage to be used for
        # subparts of multipart messages, so patch those methods to
        # pass _class.
        try:
            patch_methods = ('message_from_bytes', 'message_from_string',
                             'message_from_file', 'message_from_binary_file')
            orig_methods = {}
            for method in patch_methods:
                if hasattr(email, method):
                    orig = getattr(email, method)
                    orig_methods[method] = orig
                    setattr(email, method,
                            functools.partial(orig, _class=RoundupMessage))
            try:
                mbox = mailbox.mbox(filename, factory=mboxRoundupMessage,
                                    create=False)
                mbox.lock()
            except (mailbox.NoSuchMailboxError,
                    mailbox.ExternalClashError) as e:
                if isinstance(e, mailbox.ExternalClashError):
                    mbox.close()
                traceback.print_exc()
                return 1

            try:
                for key in mbox.keys():
                    self.handle_Message(mbox.get(key))
                    mbox.remove(key)
            finally:
                mbox.unlock()
                mbox.close()
        finally:
            for method in orig_methods:
                setattr(email, method, orig)

        return 0

    def get_oauth_tokens(self, oauth_path):
        if not oauth_path:
            oauth_path = self.instance.config['TRACKER_HOME']
            oauth_path = os.path.join(oauth_path, 'oauth')
        self.oauth_path = oauth_path
        with open(os.path.join(oauth_path, 'access_token'), 'r') as f:
            self.access_token = f.read().strip()
        with open(os.path.join(oauth_path, 'refresh_token'), 'r') as f:
            self.refresh_token = f.read().strip()

    def write_token(self, tokenname):
        n = os.path.join(self.oauth_path, tokenname)
        tmp = n + '.tmp'
        old = n + '.old'
        with open(tmp, 'w') as f:
            f.write(getattr(self, tokenname))
        try:
            os.remove(old)
        except OSError:
            pass
        os.rename(n, old)
        os.rename(tmp, n)

    def renew_oauth_tokens(self):
        """ Get new token(s) via refresh token
        """
        with open(os.path.join(self.oauth_path, 'client_secret'), 'r') as f:
            client_secret = f.read().strip()
        with open(os.path.join(self.oauth_path, 'client_id'), 'r') as f:
            client_id = f.read().strip()
        data = dict(
            client_id=client_id,
            client_secret=client_secret,
            refresh_token=self.refresh_token,
            grant_type='refresh_token'
        )
        session = requests.session()
        r = session.post(self.token_endpoint, data=data)
        if not 200 <= r.status_code <= 299:
            raise RuntimeError('Invalid get result: %s: %s\n %s'
                               % (r.status_code, r.reason, r.text))
        d = r.json()
        if d['refresh_token'] != self.refresh_token:
            self.refresh_token = d['refresh_token']
            self.write_token('refresh_token')
        if d['access_token'] != self.access_token:
            self.access_token = d['access_token']
            self.write_token('access_token')

    def do_imap(self, server, user='', password='', mailbox='', **kw):
        ''' Do an IMAP connection
        '''
        try:
            if not user:
                user = my_input('User: ')
            if not password and not kw.get('oauth'):
                password = getpass.getpass()
        except (KeyboardInterrupt, EOFError):
            # Ctrl C or D maybe also Ctrl Z under Windows.
            print("\nAborted by user.")
            return 1
        # open a connection to the server and retrieve all messages
        try:
            if kw.get('ssl'):
                self.logger.debug('Trying server %r with ssl' % server)
                server = imaplib.IMAP4_SSL(server)
            else:
                self.logger.debug('Trying server %r without ssl' % server)
                server = imaplib.IMAP4(server)
        except (imaplib.IMAP4.error, socket.error, ssl_.SSLError):
            self.logger.exception('IMAP server error')
            return 1

        if kw.get('oauth'):
            if requests is None:
                self.logger.error('For OAUTH, the requests library '
                                  'must be installed')
                return 1
            self.get_oauth_tokens(kw.get('oauth_path'))
            # The following are mandatory for oauth and are passed by
            # the command-line handler:
            self.token_endpoint = kw['token_endpoint']
            for k in range(2):
                t = self.access_token
                s = 'user=%s\1auth=Bearer %s\1\1' % (user, t)
                # Try twice, access token may be too old
                try:
                    server.authenticate('XOAUTH2', lambda x: s)
                    break
                except imaplib.IMAP4.error:
                    if k:
                        self.logger.exception('OAUTH authentication failed')
                        return 1
                try:
                    self.renew_oauth_tokens()
                except RuntimeError:
                    self.logger.exception('OAUTH token renew failed')
                    return 1
        else:
            try:
                if kw.get('cram'):
                    server.login_cram_md5(user, password)
                else:
                    server.login(user, password)
            except imaplib.IMAP4.error as e:
                self.logger.exception('IMAP login failure: %s' % e)
                return 1

        try:
            if not mailbox:
                (typ, data) = server.select()
            else:
                (typ, data) = server.select(mailbox=mailbox)
            if typ != 'OK':
                self.logger.error('Failed to get mailbox %r: %s' % (mailbox,
                                                                    data))
                return 1
            try:
                numMessages = int(data[0])
            except ValueError:
                self.logger.error('Invalid message count from mailbox %r' %
                                  data[0])
                return 1
            for i in range(1, numMessages+1):
                (typ, data) = server.fetch(str(i), '(RFC822)')

                # mark the message as deleted.
                server.store(str(i), '+FLAGS', r'(\Deleted)')

                # process the message, data[0][1] is of type 'bytes' for
                # python3 and a string for python2.
                s = data[0][1]
                self.handle_Message(message_from_bytes(s, RoundupMessage))
            server.close()
        finally:
            try:
                server.expunge()
            except (imaplib.IMAP4.error, socket.error, ssl_.SSLError):
                pass
            server.logout()

        return 0

    def do_apop(self, server, user='', password='', ssl=False):
        ''' Do authentication POP
        '''
        self._do_pop(server, user, password, True, ssl)

    def do_pop(self, server, user='', password='', ssl=False):
        ''' Do plain POP
        '''
        self._do_pop(server, user, password, False, ssl)

    def _do_pop(self, server, user, password, apop, ssl):
        '''Read a series of messages from the specified POP server.
        '''
        # Monkey-patch poplib to have a large line-limit
        # Seems that in python2.7 poplib applies a line-length limit not
        # just to the lines that take care of the pop3 protocol but also
        # to all email content
        # See, e.g.,
        # https://readlist.com/lists/python.org/python-list/69/346982.html
        # https://stackoverflow.com/questions/30976106/python-poplib-error-proto-line-too-+long?utm_medium=organic&utm_source=google_rich_qa&utm_campaign=google_rich_qa
        if 0 < getattr(poplib, '_MAXLINE', -1) < 100*1024:
            poplib._MAXLINE = 100*1024
        try:
            if not user:
                user = my_input('User: ')
            if not password:
                password = getpass.getpass()
        except (KeyboardInterrupt, EOFError):
            # Ctrl C or D maybe also Ctrl Z under Windows.
            print("\nAborted by user.")
            return 1

        # open a connection to the server and retrieve all messages
        try:
            if ssl:
                klass = poplib.POP3_SSL
            else:
                klass = poplib.POP3
            server = klass(server)
        except (socket.error, ssl_.SSLError):
            self.logger.exception('POP server error')
            return 1
        if apop:
            server.apop(user, password)
        else:
            server.user(user)
            server.pass_(password)
        numMessages = len(server.list()[1])
        for i in range(1, numMessages+1):
            # retr: returns
            # [ pop response e.g. '+OK 459 octets',
            #   [ array of message lines ],
            #   number of octets ]
            lines = server.retr(i)[1]
            self.handle_Message(
                message_from_bytes(b'\n'.join(lines), RoundupMessage))
            # delete the message
            server.dele(i)

        # quit the server to commit changes.
        server.quit()
        return 0

    def main(self, fp):
        ''' fp - the file from which to read the Message.
        '''
        return self.handle_Message(message_from_binary_file(fp,
                                                            RoundupMessage))

    @gen_trace_id()
    @store_trace_reason("mailgw")
    def handle_Message(self, message):
        """Handle an RFC822 Message

        Handle the Message object by calling handle_message() and then cope
        with any errors raised by handle_message.
        This method's job is to make that call and handle any
        errors in a sane manner. It should be replaced if you wish to
        handle errors in a different manner.
        """
        # in some rare cases, a particularly stuffed-up e-mail will make
        # its way into here... try to handle it gracefully

        self.parsed_message = None
        crypt = False
        sendto = message.get_address_list('resent-from')
        if not sendto or self.instance.config['EMAIL_KEEP_REAL_FROM']:
            sendto = message.get_address_list('from')
        if not sendto:
            # very bad-looking message - we don't even know who sent it
            msg = ['Badly formed message from mail gateway. Headers:']
            msg.extend([': '.join(args) for args in message.items()])
            msg = '\n'.join(map(str, msg))
            self.logger.error(msg)
            return

        msg = 'Handling message'
        if message.get_header('message-id'):
            msg += ' (Message-id=%r)' % message.get_header('message-id')
        self.logger.info(msg)

        # try normal message-handling
        if not self.trapExceptions:
            return self.handle_message(message)

        # no, we want to trap exceptions
        # Note: by default we return the message received not the
        # internal state of the parsedMessage -- except for
        # MailUsageError, Unauthorized and for unknown exceptions. For
        # the latter cases we make sure the error message is encrypted
        # if needed (if it either was received encrypted or pgp
        # processing is turned on for the user).
        try:
            return self.handle_message(message)
        except MailUsageHelp:
            # bounce the message back to the sender with the usage message
            self.logger.debug("MailUsageHelp raised, bouncing.")
            fulldoc = '\n'.join(__doc__.split('\n')[2:])
            m = ['']
            m.append('\n\nMail Gateway Help\n=================')
            m.append(fulldoc)
            self.mailer.bounce_message(message, [sendto[0][1]], m,
                                       subject="Mail Gateway Help")
        except MailUsageError as value:
            # bounce the message back to the sender with the usage message
            self.logger.debug("MailUsageError raised, bouncing.")
            fulldoc = '\n'.join(__doc__.split('\n')[2:])
            m = ['']
            m.append(str(value))
            m.append('\n\nMail Gateway Help\n=================')
            m.append(fulldoc)
            if self.parsed_message:
                message = self.parsed_message.message
                crypt = self.parsed_message.crypt
            self.mailer.bounce_message(message, [sendto[0][1]], m, crypt=crypt)
        except Unauthorized as value:
            # just inform the user that he is not authorized
            self.logger.debug("Unauthorized raised, bouncing.")
            m = ['']
            m.append(str(value))
            if self.parsed_message:
                message = self.parsed_message.message
                crypt = self.parsed_message.crypt
            self.mailer.bounce_message(message, [sendto[0][1]], m, crypt=crypt)
        except IgnoreMessage:
            # do not take any action
            # this exception is thrown when email should be ignored
            msg = 'IgnoreMessage raised'
            if message.get_header('message-id'):
                msg += ' (Message-id=%r)' % message.get_header('message-id')
            self.logger.info(msg)
            return
        except Exception:
            msg = 'Exception handling message'
            if message.get_header('message-id'):
                msg += ' (Message-id=%r)' % message.get_header('message-id')
            self.logger.exception(msg)

            # bounce the message back to the sender with the error message
            # let the admin know that something very bad is happening
            m = ['']
            m.append('An unexpected error occurred during the processing')
            m.append('of your message. The tracker administrator is being')
            m.append('notified.\n')
            if self.parsed_message:
                message = self.parsed_message.message
                crypt = self.parsed_message.crypt
            self.mailer.bounce_message(message, [sendto[0][1]], m, crypt=crypt)

            m.append('----------------')
            m.append(traceback.format_exc())
            self.mailer.bounce_message(message,
                                       [self.instance.config.ADMIN_EMAIL], m)

    def handle_message(self, message):
        ''' message - a Message instance

        Parse the message as per the module docstring.

        WARNING: any changes in this code need to be moved to all
        *Translate* test cases in test/test_mailgw.py. This method
        can't be tested directly because it opens the instance
        erasing the database mocked by the test harness.

        '''
        # get database handle for handling one email
        self.db = self.instance.open('admin')

        language = self.instance.config["MAILGW_LANGUAGE"] or self.instance.config["TRACKER_LANGUAGE"]
        self.db.i18n = i18n.get_translation(
            language,
            tracker_home=self.instance.config["TRACKER_HOME"])

        global _
        _ = self.db.i18n.gettext

        self.db.tx_Source = "email"

        try:
            return self._handle_message(message)
        finally:
            self.db.close()

    def _handle_message(self, message):
        ''' message - a Message instance

        Parse the message as per the module docstring.
        The following code expects an opened database and a try/finally
        that closes the database.
        '''
        self.parsed_message = self.parsed_message_class(self, message)
        nodeid = self.parsed_message.parse()

        # commit the changes to the DB
        self.db.commit()

        self.parsed_message = None
        return nodeid

    def get_class_arguments(self, class_type, classname=None):
        ''' class_type - a valid node class type:
                - 'user' refers to the author of a message
                - 'issue' refers to an issue-type class (to which the
                  message is appended) specified in parameter classname
                  Note that this need not be the real classname, we get
                  the real classname used as a parameter (from previous
                  message-parsing steps)
                - 'file' specifies a file-type class
                - 'msg' is the message-class
            classname - the name of the current issue-type class

        Parse the commandline arguments and retrieve the properties that
        are relevant to the class_type.
        '''
        allprops = {}

        classname = classname or class_type

        # check if the classname is valid
        try:
            cls = self.db.getclass(classname)
        except KeyError:
            mailadmin = self.instance.config['ADMIN_EMAIL']
            raise MailUsageError(_("""
The mail gateway is not properly set up. Please contact
%(mailadmin)s and have them fix the incorrect class specified as:
  %(classname)s
""") % locals())

        if classname not in self.props_by_class:
            return {}
        for propstring in self.props_by_class[classname]:
            errors, props = setPropArrayFromString(self, cls,
                                                   propstring.strip())

            if errors:
                mailadmin = self.instance.config['ADMIN_EMAIL']
                raise MailUsageError(_("""
The mail gateway is not properly set up. Please contact
%(mailadmin)s and have them fix the incorrect properties:
  %(errors)s
""") % locals())
            allprops.update(props)

        return allprops


def setPropArrayFromString(self, cl, propString, nodeid=None):
    ''' takes string of form prop=value,value;prop2=value
        and returns (error, prop[..])
    '''
    props = {}
    errors = []
    for prop in propString.split(';'):
        # extract the property name and value
        try:
            propname, value = prop.split('=')
        except ValueError:
            errors.append(_('not of form [arg=value,value,...;'
                            'arg=value,value,...]'))
            return (errors, props)
        # convert the value to a hyperdb-usable value
        propname = propname.strip()
        try:
            props[propname] = hyperdb.rawToHyperdb(self.db, cl, nodeid,
                                                   propname, value)
        except hyperdb.HyperdbValueError as message:
            errors.append(str(message))
    return errors, props


def extractUserFromList(userClass, users):
    '''Given a list of users, try to extract the first non-anonymous user
       and return that user, otherwise return None
    '''
    if len(users) > 1:
        for user in users:
            # make sure we don't match the anonymous or admin user
            if userClass.get(user, 'username') in ('admin', 'anonymous'):
                continue
            # first valid match will do
            return user
        # well, I guess we have no choice
        return user[0]
    elif users:
        return users[0]
    return None


def uidFromAddress(db, address, create=1, **user_props):
    ''' address is from the rfc822 module, and therefore is (name, addr)

        user is created if they don't exist in the db already
        user_props may supply additional user information
    '''
    (realname, address) = address

    # try a straight match of the address
    user = extractUserFromList(db.user, db.user.stringFind(address=address))
    if user is not None:
        return user

    # try the user alternate addresses if possible
    props = db.user.getprops()
    if 'alternate_addresses' in props:
        users = db.user.filter(None, {'alternate_addresses': address})
        # We want an exact match of the email, not just a substring
        # match. Otherwise e.g. support@example.com would match
        # discuss-support@example.com which is not what we want.
        found_users = []
        for u in users:
            alt = db.user.get(u, 'alternate_addresses').split('\n')
            for a in alt:
                if a.strip().lower() == address.lower():
                    found_users.append(u)
                    break
        user = extractUserFromList(db.user, found_users)
        if user is not None:
            return user

    # try to match the username to the address (for local
    # submissions where the address is empty)
    user = extractUserFromList(db.user, db.user.stringFind(username=address))

    # couldn't match address or username, so create a new user
    if create:
        # generate a username
        if '@' in address:
            username = address.split('@')[0]
        else:
            username = address
        trying = username
        n = 0
        while 1:
            try:
                # does this username exist already?
                db.user.lookup(trying)
            except KeyError:
                break
            n += 1
            trying = username + str(n)

        # create!
        try:
            return db.user.create(
                username=trying, address=address, realname=realname,
                roles=db.config.NEW_EMAIL_USER_ROLES,
                password=password.Password(password.generatePassword(),
                                           config=db.config),
                **user_props)
        except exceptions.Reject:
            return 0
    else:
        return 0


def parseContent(content, keep_citations=None, keep_body=None,
                 config=None, is_new_issue=False):
    """Parse mail message; return message summary and stripped content

    The message body is divided into sections by blank lines.
    Sections where the second and all subsequent lines begin with a ">"
    or "|" character are considered "quoting sections". The first line of
    the first non-quoting section becomes the summary of the message.

    Arguments:

        keep_citations: declared for backward compatibility.
            If omitted or None, use config["MAILGW_KEEP_QUOTED_TEXT"]

        keep_body: declared for backward compatibility.
            If omitted or None, use config["MAILGW_LEAVE_BODY_UNCHANGED"]

        config: tracker configuration object.
            If omitted or None, use default configuration.

    """
    if config is None:
        config = configuration.CoreConfig()
    if keep_citations is None:
        keep_citations = config["MAILGW_KEEP_QUOTED_TEXT"]
        if keep_citations == "new":
            # don't strip citations if we are a new issue
            if is_new_issue:
                keep_citations = True
            else:
                keep_citations = False
        elif keep_citations == "yes":
            keep_citations = True
        else:
            keep_citations = False

    if keep_body is None:
        keep_body = config["MAILGW_LEAVE_BODY_UNCHANGED"]
        if keep_body == "new":
            # don't strip citations if we are a new issue
            if is_new_issue:
                keep_body = True
            else:
                keep_body = False
        elif keep_body == "yes":
            keep_body = True
        else:
            keep_body = False

    eol = config["MAILGW_EOL_RE"]
    signature = config["MAILGW_SIGN_RE"]
    original_msg = config["MAILGW_ORIGMSG_RE"]

    # strip off leading carriage-returns / newlines
    i = 0
    for i in range(len(content)):
        if content[i] not in '\r\n':
            break
    if i > 0:
        sections = config["MAILGW_BLANKLINE_RE"].split(content[i:])
    else:
        sections = config["MAILGW_BLANKLINE_RE"].split(content)

    # extract out the summary from the message
    summary = ''
    kept_lines = []
    # find last non-empty section for signature matching
    last_nonempty = len(sections) - 1
    while last_nonempty and not sections[last_nonempty]:
        last_nonempty -= 1
    for ns, section in enumerate(sections):
        # section = section.strip()
        if not section:
            continue
        lines = eol.split(section)
        quote_1st = lines[0] and lines[0][0] in '>|'
        quote_2nd = len(lines) > 1 and lines[1] and lines[1][0] in '>|'
        if quote_1st or quote_2nd:
            # don't drop non-quoted first line of intermediate section:
            if ns and not quote_1st and lines[0] and not keep_citations:
                # we drop only first-lines ending in ':' (e.g. 'XXX wrote:')
                if not lines[0].endswith(':'):
                    kept_lines.append(lines[0])
            # see if there's a response somewhere inside this section (ie.
            # no blank line between quoted message and response)
            for _n, line in enumerate(lines[1:]):
                if line and line[0] not in '>|':
                    break
            else:
                # we keep quoted bits if specified in the config
                if keep_citations:
                    kept_lines.append(section)
                continue
            # keep this section - it has reponse stuff in it
            if not keep_citations:
                lines = lines[_n + 1:]
            section = '\n'.join(lines)

        is_last = ns == last_nonempty
        # and while we're at it, use the first non-quoted bit as
        # our summary
        if not summary:
            # if we don't have our summary yet use the first line of this
            # section
            summary = section
        # match signature only in last section
        elif is_last and signature.match(lines[0]) and 2 <= len(lines) <= 10:
            # lose any signature
            break
        elif original_msg.match(lines[0]):
            # ditch the stupid Outlook quoting of the entire original message
            break

        # and add the section to the output
        kept_lines.append(section)

    # figure the summary - find the first sentence-ending punctuation or the
    # first whole line, whichever is longest
    sentence = re.search(r'^([^!?\.]+[!?\.])', summary)
    if sentence:
        sentence = sentence.group(1)
    else:
        sentence = ''
    first = eol.split(summary)[0]
    summary = max(sentence, first)

    # Now reconstitute the message content minus the bits we don't care
    # about.
    if not keep_body:
        content = '\n\n'.join(kept_lines)

    return summary, content

# vim: set filetype=python sts=4 sw=4 et :

Roundup Issue Tracker: http://roundup-tracker.org/