2006-08-15 23:06:50 +04:00
|
|
|
# mail.py - mail sending bits for mercurial
|
|
|
|
#
|
|
|
|
# Copyright 2006 Matt Mackall <mpm@selenic.com>
|
|
|
|
#
|
2009-04-26 03:08:54 +04:00
|
|
|
# This software may be used and distributed according to the terms of the
|
2010-01-20 07:20:08 +03:00
|
|
|
# GNU General Public License version 2 or any later version.
|
2006-08-15 23:06:50 +04:00
|
|
|
|
2016-10-20 16:20:31 +03:00
|
|
|
from __future__ import absolute_import
|
2015-08-09 05:32:19 +03:00
|
|
|
|
2013-09-20 18:16:02 +04:00
|
|
|
import email
|
2016-10-05 14:45:22 +03:00
|
|
|
import email.charset
|
2016-10-07 18:30:11 +03:00
|
|
|
import email.header
|
2015-08-09 05:32:19 +03:00
|
|
|
import os
|
|
|
|
import quopri
|
|
|
|
import smtplib
|
|
|
|
import socket
|
|
|
|
import time
|
|
|
|
|
|
|
|
from .i18n import _
|
|
|
|
from . import (
|
|
|
|
encoding,
|
2015-10-08 22:55:45 +03:00
|
|
|
error,
|
2015-08-09 05:32:19 +03:00
|
|
|
sslutil,
|
|
|
|
util,
|
|
|
|
)
|
2006-08-15 23:06:50 +04:00
|
|
|
|
smtp: add the class to verify the certificate of the SMTP server for STARTTLS
Original "smtplib.SMTP" has no route to pass "ca_certs" and
"cert_reqs" arguments to underlying SSL socket creation. This causes
that "getpeercert()" on SSL socket returns empty dict, so the peer
certificate for STARTTLS can't be verified.
This patch introduces the "STARTTLS" class derived from "smtplib.SMTP"
to pass "ca_certs" and "cert_reqs" arguments to underlying SSL socket
creation.
Almost all code of "starttls()" in this class is imported from
"smtplib.SMTP" of Python 2.7.3, but it differs from original code in
points below:
- "self.ehlo_or_helo_if_needed()" invocation is omitted, because:
- "ehlo_or_helo_if_needed()" is available with Python 2.6 or later, and
- "ehlo()" is explicitly invoked in "mercurial.mail._smtp()"
- "if not _have_ssl:" check is omitted, because:
- "_have_ssl" is available with Python 2.6 or later, and
- same checking is done in "mercurial.sslutil.ssl_wrap_socket()"
- "ssl.wrap_socket()" is replaced by "sslutil.ssl_wrap_socket()" for
compatibility between Python versions
- use "sock.recv()" also as "sock.read()", if "sock" doesn't have
"read()" method
with Python 2.5.x or earlier, "sslutil.ssl_wrap_socket()" returns
"httplib.FakeSocket"-ed object, and it doesn't have "read()"
method, which is invoked via "smtplib.SSLFakeFile".
2013-03-25 21:27:23 +04:00
|
|
|
class STARTTLS(smtplib.SMTP):
|
|
|
|
'''Derived class to verify the peer certificate for STARTTLS.
|
|
|
|
|
|
|
|
This class allows to pass any keyword arguments to SSL socket creation.
|
|
|
|
'''
|
2016-05-26 05:56:20 +03:00
|
|
|
def __init__(self, ui, host=None, **kwargs):
|
smtp: add the class to verify the certificate of the SMTP server for STARTTLS
Original "smtplib.SMTP" has no route to pass "ca_certs" and
"cert_reqs" arguments to underlying SSL socket creation. This causes
that "getpeercert()" on SSL socket returns empty dict, so the peer
certificate for STARTTLS can't be verified.
This patch introduces the "STARTTLS" class derived from "smtplib.SMTP"
to pass "ca_certs" and "cert_reqs" arguments to underlying SSL socket
creation.
Almost all code of "starttls()" in this class is imported from
"smtplib.SMTP" of Python 2.7.3, but it differs from original code in
points below:
- "self.ehlo_or_helo_if_needed()" invocation is omitted, because:
- "ehlo_or_helo_if_needed()" is available with Python 2.6 or later, and
- "ehlo()" is explicitly invoked in "mercurial.mail._smtp()"
- "if not _have_ssl:" check is omitted, because:
- "_have_ssl" is available with Python 2.6 or later, and
- same checking is done in "mercurial.sslutil.ssl_wrap_socket()"
- "ssl.wrap_socket()" is replaced by "sslutil.ssl_wrap_socket()" for
compatibility between Python versions
- use "sock.recv()" also as "sock.read()", if "sock" doesn't have
"read()" method
with Python 2.5.x or earlier, "sslutil.ssl_wrap_socket()" returns
"httplib.FakeSocket"-ed object, and it doesn't have "read()"
method, which is invoked via "smtplib.SSLFakeFile".
2013-03-25 21:27:23 +04:00
|
|
|
smtplib.SMTP.__init__(self, **kwargs)
|
2016-05-26 05:43:22 +03:00
|
|
|
self._ui = ui
|
2016-04-15 20:43:47 +03:00
|
|
|
self._host = host
|
smtp: add the class to verify the certificate of the SMTP server for STARTTLS
Original "smtplib.SMTP" has no route to pass "ca_certs" and
"cert_reqs" arguments to underlying SSL socket creation. This causes
that "getpeercert()" on SSL socket returns empty dict, so the peer
certificate for STARTTLS can't be verified.
This patch introduces the "STARTTLS" class derived from "smtplib.SMTP"
to pass "ca_certs" and "cert_reqs" arguments to underlying SSL socket
creation.
Almost all code of "starttls()" in this class is imported from
"smtplib.SMTP" of Python 2.7.3, but it differs from original code in
points below:
- "self.ehlo_or_helo_if_needed()" invocation is omitted, because:
- "ehlo_or_helo_if_needed()" is available with Python 2.6 or later, and
- "ehlo()" is explicitly invoked in "mercurial.mail._smtp()"
- "if not _have_ssl:" check is omitted, because:
- "_have_ssl" is available with Python 2.6 or later, and
- same checking is done in "mercurial.sslutil.ssl_wrap_socket()"
- "ssl.wrap_socket()" is replaced by "sslutil.ssl_wrap_socket()" for
compatibility between Python versions
- use "sock.recv()" also as "sock.read()", if "sock" doesn't have
"read()" method
with Python 2.5.x or earlier, "sslutil.ssl_wrap_socket()" returns
"httplib.FakeSocket"-ed object, and it doesn't have "read()"
method, which is invoked via "smtplib.SSLFakeFile".
2013-03-25 21:27:23 +04:00
|
|
|
|
|
|
|
def starttls(self, keyfile=None, certfile=None):
|
|
|
|
if not self.has_extn("starttls"):
|
|
|
|
msg = "STARTTLS extension not supported by server"
|
|
|
|
raise smtplib.SMTPException(msg)
|
|
|
|
(resp, reply) = self.docmd("STARTTLS")
|
|
|
|
if resp == 220:
|
2015-06-05 15:25:28 +03:00
|
|
|
self.sock = sslutil.wrapsocket(self.sock, keyfile, certfile,
|
2016-05-26 05:43:22 +03:00
|
|
|
ui=self._ui,
|
2016-05-26 05:56:20 +03:00
|
|
|
serverhostname=self._host)
|
smtp: add the class to verify the certificate of the SMTP server for STARTTLS
Original "smtplib.SMTP" has no route to pass "ca_certs" and
"cert_reqs" arguments to underlying SSL socket creation. This causes
that "getpeercert()" on SSL socket returns empty dict, so the peer
certificate for STARTTLS can't be verified.
This patch introduces the "STARTTLS" class derived from "smtplib.SMTP"
to pass "ca_certs" and "cert_reqs" arguments to underlying SSL socket
creation.
Almost all code of "starttls()" in this class is imported from
"smtplib.SMTP" of Python 2.7.3, but it differs from original code in
points below:
- "self.ehlo_or_helo_if_needed()" invocation is omitted, because:
- "ehlo_or_helo_if_needed()" is available with Python 2.6 or later, and
- "ehlo()" is explicitly invoked in "mercurial.mail._smtp()"
- "if not _have_ssl:" check is omitted, because:
- "_have_ssl" is available with Python 2.6 or later, and
- same checking is done in "mercurial.sslutil.ssl_wrap_socket()"
- "ssl.wrap_socket()" is replaced by "sslutil.ssl_wrap_socket()" for
compatibility between Python versions
- use "sock.recv()" also as "sock.read()", if "sock" doesn't have
"read()" method
with Python 2.5.x or earlier, "sslutil.ssl_wrap_socket()" returns
"httplib.FakeSocket"-ed object, and it doesn't have "read()"
method, which is invoked via "smtplib.SSLFakeFile".
2013-03-25 21:27:23 +04:00
|
|
|
self.file = smtplib.SSLFakeFile(self.sock)
|
|
|
|
self.helo_resp = None
|
|
|
|
self.ehlo_resp = None
|
|
|
|
self.esmtp_features = {}
|
|
|
|
self.does_esmtp = 0
|
|
|
|
return (resp, reply)
|
|
|
|
|
2015-10-15 05:21:05 +03:00
|
|
|
class SMTPS(smtplib.SMTP):
|
|
|
|
'''Derived class to verify the peer certificate for SMTPS.
|
2013-03-25 21:27:43 +04:00
|
|
|
|
2015-10-15 05:21:05 +03:00
|
|
|
This class allows to pass any keyword arguments to SSL socket creation.
|
|
|
|
'''
|
2016-05-26 05:56:20 +03:00
|
|
|
def __init__(self, ui, keyfile=None, certfile=None, host=None,
|
2016-04-15 20:43:47 +03:00
|
|
|
**kwargs):
|
2015-10-15 05:21:05 +03:00
|
|
|
self.keyfile = keyfile
|
|
|
|
self.certfile = certfile
|
|
|
|
smtplib.SMTP.__init__(self, **kwargs)
|
2016-04-15 20:43:47 +03:00
|
|
|
self._host = host
|
2015-10-15 05:21:05 +03:00
|
|
|
self.default_port = smtplib.SMTP_SSL_PORT
|
2016-05-26 05:43:22 +03:00
|
|
|
self._ui = ui
|
2013-03-25 21:27:43 +04:00
|
|
|
|
2015-10-15 05:21:05 +03:00
|
|
|
def _get_socket(self, host, port, timeout):
|
|
|
|
if self.debuglevel > 0:
|
2016-10-20 16:20:31 +03:00
|
|
|
self._ui.debug('connect: %r\n' % (host, port))
|
2015-10-15 05:21:05 +03:00
|
|
|
new_socket = socket.create_connection((host, port), timeout)
|
|
|
|
new_socket = sslutil.wrapsocket(new_socket,
|
|
|
|
self.keyfile, self.certfile,
|
2016-05-26 05:43:22 +03:00
|
|
|
ui=self._ui,
|
2016-05-26 05:56:20 +03:00
|
|
|
serverhostname=self._host)
|
2015-10-15 05:21:05 +03:00
|
|
|
self.file = smtplib.SSLFakeFile(new_socket)
|
|
|
|
return new_socket
|
2013-03-25 21:27:43 +04:00
|
|
|
|
2006-08-15 23:06:50 +04:00
|
|
|
def _smtp(ui):
|
2008-01-31 23:44:19 +03:00
|
|
|
'''build an smtp connection and return a function to send mail'''
|
2006-08-15 23:06:50 +04:00
|
|
|
local_hostname = ui.config('smtp', 'local_hostname')
|
codemod: register core configitems using a script
This is done by a script [2] using RedBaron [1], a tool designed for doing
code refactoring. All "default" values are decided by the script and are
strongly consistent with the existing code.
There are 2 changes done manually to fix tests:
[warn] mercurial/exchange.py: experimental.bundle2-output-capture: default needs manual removal
[warn] mercurial/localrepo.py: experimental.hook-track-tags: default needs manual removal
Since RedBaron is not confident about how to indent things [2].
[1]: https://github.com/PyCQA/redbaron
[2]: https://github.com/PyCQA/redbaron/issues/100
[3]:
#!/usr/bin/env python
# codemod_configitems.py - codemod tool to fill configitems
#
# Copyright 2017 Facebook, Inc.
#
# This software may be used and distributed according to the terms of the
# GNU General Public License version 2 or any later version.
from __future__ import absolute_import, print_function
import os
import sys
import redbaron
def readpath(path):
with open(path) as f:
return f.read()
def writepath(path, content):
with open(path, 'w') as f:
f.write(content)
_configmethods = {'config', 'configbool', 'configint', 'configbytes',
'configlist', 'configdate'}
def extractstring(rnode):
"""get the string from a RedBaron string or call_argument node"""
while rnode.type != 'string':
rnode = rnode.value
return rnode.value[1:-1] # unquote, "'str'" -> "str"
def uiconfigitems(red):
"""match *.ui.config* pattern, yield (node, method, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
obj = node[-3].value
method = node[-2].value
args = node[-1]
section = args[0].value
name = args[1].value
if (obj in ('ui', 'self') and method in _configmethods
and section.type == 'string' and name.type == 'string'):
entry = (node, method, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def coreconfigitems(red):
"""match coreconfigitem(...) pattern, yield (node, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
args = node[1]
section = args[0].value
name = args[1].value
if (node[0].value == 'coreconfigitem' and section.type == 'string'
and name.type == 'string'):
entry = (node, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def registercoreconfig(cfgred, section, name, defaultrepr):
"""insert coreconfigitem to cfgred AST
section and name are plain string, defaultrepr is a string
"""
# find a place to insert the "coreconfigitem" item
entries = list(coreconfigitems(cfgred))
for node, args, nodesection, nodename in reversed(entries):
if (nodesection, nodename) < (section, name):
# insert after this entry
node.insert_after(
'coreconfigitem(%r, %r,\n'
' default=%s,\n'
')' % (section, name, defaultrepr))
return
def main(argv):
if not argv:
print('Usage: codemod_configitems.py FILES\n'
'For example, FILES could be "{hgext,mercurial}/*/**.py"')
dirname = os.path.dirname
reporoot = dirname(dirname(dirname(os.path.abspath(__file__))))
# register configitems to this destination
cfgpath = os.path.join(reporoot, 'mercurial', 'configitems.py')
cfgred = redbaron.RedBaron(readpath(cfgpath))
# state about what to do
registered = set((s, n) for n, a, s, n in coreconfigitems(cfgred))
toregister = {} # {(section, name): defaultrepr}
coreconfigs = set() # {(section, name)}, whether it's used in core
# first loop: scan all files before taking any action
for i, path in enumerate(argv):
print('(%d/%d) scanning %s' % (i + 1, len(argv), path))
iscore = ('mercurial' in path) and ('hgext' not in path)
red = redbaron.RedBaron(readpath(path))
# find all repo.ui.config* and ui.config* calls, and collect their
# section, name and default value information.
for node, method, args, section, name in uiconfigitems(red):
if section == 'web':
# [web] section has some weirdness, ignore them for now
continue
defaultrepr = None
key = (section, name)
if len(args) == 2:
if key in registered:
continue
if method == 'configlist':
defaultrepr = 'list'
elif method == 'configbool':
defaultrepr = 'False'
else:
defaultrepr = 'None'
elif len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
# try to understand the "default" value
dnode = args[2].value
if dnode.type == 'name':
if dnode.value in {'None', 'True', 'False'}:
defaultrepr = dnode.value
elif dnode.type == 'string':
defaultrepr = repr(dnode.value[1:-1])
elif dnode.type in ('int', 'float'):
defaultrepr = dnode.value
# inconsistent default
if key in toregister and toregister[key] != defaultrepr:
defaultrepr = None
# interesting to rewrite
if key not in registered:
if defaultrepr is None:
print('[note] %s: %s.%s: unsupported default'
% (path, section, name))
registered.add(key) # skip checking it again
else:
toregister[key] = defaultrepr
if iscore:
coreconfigs.add(key)
# second loop: rewrite files given "toregister" result
for path in argv:
# reconstruct redbaron - trade CPU for memory
red = redbaron.RedBaron(readpath(path))
changed = False
for node, method, args, section, name in uiconfigitems(red):
key = (section, name)
defaultrepr = toregister.get(key)
if defaultrepr is None or key not in coreconfigs:
continue
if len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
try:
del args[2]
changed = True
except Exception:
# redbaron fails to do the rewrite due to indentation
# see https://github.com/PyCQA/redbaron/issues/100
print('[warn] %s: %s.%s: default needs manual removal'
% (path, section, name))
if key not in registered:
print('registering %s.%s' % (section, name))
registercoreconfig(cfgred, section, name, defaultrepr)
registered.add(key)
if changed:
print('updating %s' % path)
writepath(path, red.dumps())
if toregister:
print('updating configitems.py')
writepath(cfgpath, cfgred.dumps())
if __name__ == "__main__":
sys.exit(main(sys.argv[1:]))
2017-07-15 00:22:40 +03:00
|
|
|
tls = ui.config('smtp', 'tls')
|
2010-12-20 11:56:54 +03:00
|
|
|
# backward compatible: when tls = true, we use starttls.
|
|
|
|
starttls = tls == 'starttls' or util.parsebool(tls)
|
|
|
|
smtps = tls == 'smtps'
|
2011-07-26 01:02:15 +04:00
|
|
|
if (starttls or smtps) and not util.safehasattr(socket, 'ssl'):
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(_("can't use TLS: Python SSL support not installed"))
|
smtp: verify the certificate of the SMTP server for STARTTLS/SMTPS
Before this patch, the certificate of the SMTP server for STARTTLS or
SMTPS isn't verified.
This may cause man-in-the-middle security problem (stealing
authentication information), even though SMTP channel itself is
encrypted by SSL.
When "[smtp] tls" is configured as "smtps" or "starttls", this patch:
- uses classes introduced by preceding patches instead of "SMTP" or
"SMTP_SSL" of smtplib, and
- verifies the certificate of the SMTP server, if "[smtp]
verifycert" is configured as other than False
"[smtp] verifycert" can be configured in 3 levels:
- "strict":
This verifies peer certificate, and aborts if:
- peer certification is not valid, or
- no configuration in "[hostfingerprints]" and "[web] cacerts"
This is default value of "[smtp] verifycert" for security.
- "loose":
This verifies peer certificate, and aborts if peer certification is
not valid.
This just shows warning message ("certificate not verified"), if
there is no configuration in "[hostfingerprints]" and "[web]
cacerts".
This is as same as verification for HTTPS connection.
- False(no verification):
Peer certificate is not verified.
This is as same as the behavior before this patch series.
"hg email --insecure" uses "loose" level, and ignores "[web] cacerts"
as same as push/pull/etc... with --insecure.
Ignoring "[web] cacerts" configuration for "hg email --insecure" is
already done in "dispatch._dispatch()" by looking "insecure" up in the
table of command options.
2013-03-25 21:28:10 +04:00
|
|
|
mailhost = ui.config('smtp', 'host')
|
|
|
|
if not mailhost:
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(_('smtp.host not configured - cannot send mail'))
|
2010-12-20 11:56:54 +03:00
|
|
|
if smtps:
|
|
|
|
ui.note(_('(using smtps)\n'))
|
2016-05-26 05:56:20 +03:00
|
|
|
s = SMTPS(ui, local_hostname=local_hostname, host=mailhost)
|
smtp: verify the certificate of the SMTP server for STARTTLS/SMTPS
Before this patch, the certificate of the SMTP server for STARTTLS or
SMTPS isn't verified.
This may cause man-in-the-middle security problem (stealing
authentication information), even though SMTP channel itself is
encrypted by SSL.
When "[smtp] tls" is configured as "smtps" or "starttls", this patch:
- uses classes introduced by preceding patches instead of "SMTP" or
"SMTP_SSL" of smtplib, and
- verifies the certificate of the SMTP server, if "[smtp]
verifycert" is configured as other than False
"[smtp] verifycert" can be configured in 3 levels:
- "strict":
This verifies peer certificate, and aborts if:
- peer certification is not valid, or
- no configuration in "[hostfingerprints]" and "[web] cacerts"
This is default value of "[smtp] verifycert" for security.
- "loose":
This verifies peer certificate, and aborts if peer certification is
not valid.
This just shows warning message ("certificate not verified"), if
there is no configuration in "[hostfingerprints]" and "[web]
cacerts".
This is as same as verification for HTTPS connection.
- False(no verification):
Peer certificate is not verified.
This is as same as the behavior before this patch series.
"hg email --insecure" uses "loose" level, and ignores "[web] cacerts"
as same as push/pull/etc... with --insecure.
Ignoring "[web] cacerts" configuration for "hg email --insecure" is
already done in "dispatch._dispatch()" by looking "insecure" up in the
table of command options.
2013-03-25 21:28:10 +04:00
|
|
|
elif starttls:
|
2016-05-26 05:56:20 +03:00
|
|
|
s = STARTTLS(ui, local_hostname=local_hostname, host=mailhost)
|
2010-12-20 11:56:54 +03:00
|
|
|
else:
|
|
|
|
s = smtplib.SMTP(local_hostname=local_hostname)
|
2013-04-18 20:26:23 +04:00
|
|
|
if smtps:
|
|
|
|
defaultport = 465
|
|
|
|
else:
|
|
|
|
defaultport = 25
|
|
|
|
mailport = util.getport(ui.config('smtp', 'port', defaultport))
|
2015-10-15 05:29:03 +03:00
|
|
|
ui.note(_('sending mail: smtp host %s, port %d\n') %
|
2006-08-20 09:21:59 +04:00
|
|
|
(mailhost, mailport))
|
2006-08-15 23:06:50 +04:00
|
|
|
s.connect(host=mailhost, port=mailport)
|
2010-12-20 11:56:54 +03:00
|
|
|
if starttls:
|
|
|
|
ui.note(_('(using starttls)\n'))
|
2006-08-15 23:06:50 +04:00
|
|
|
s.ehlo()
|
|
|
|
s.starttls()
|
|
|
|
s.ehlo()
|
2016-06-04 21:13:28 +03:00
|
|
|
if starttls or smtps:
|
smtp: verify the certificate of the SMTP server for STARTTLS/SMTPS
Before this patch, the certificate of the SMTP server for STARTTLS or
SMTPS isn't verified.
This may cause man-in-the-middle security problem (stealing
authentication information), even though SMTP channel itself is
encrypted by SSL.
When "[smtp] tls" is configured as "smtps" or "starttls", this patch:
- uses classes introduced by preceding patches instead of "SMTP" or
"SMTP_SSL" of smtplib, and
- verifies the certificate of the SMTP server, if "[smtp]
verifycert" is configured as other than False
"[smtp] verifycert" can be configured in 3 levels:
- "strict":
This verifies peer certificate, and aborts if:
- peer certification is not valid, or
- no configuration in "[hostfingerprints]" and "[web] cacerts"
This is default value of "[smtp] verifycert" for security.
- "loose":
This verifies peer certificate, and aborts if peer certification is
not valid.
This just shows warning message ("certificate not verified"), if
there is no configuration in "[hostfingerprints]" and "[web]
cacerts".
This is as same as verification for HTTPS connection.
- False(no verification):
Peer certificate is not verified.
This is as same as the behavior before this patch series.
"hg email --insecure" uses "loose" level, and ignores "[web] cacerts"
as same as push/pull/etc... with --insecure.
Ignoring "[web] cacerts" configuration for "hg email --insecure" is
already done in "dispatch._dispatch()" by looking "insecure" up in the
table of command options.
2013-03-25 21:28:10 +04:00
|
|
|
ui.note(_('(verifying remote certificate)\n'))
|
2016-06-04 21:13:28 +03:00
|
|
|
sslutil.validatesocket(s.sock)
|
2006-08-15 23:06:50 +04:00
|
|
|
username = ui.config('smtp', 'username')
|
|
|
|
password = ui.config('smtp', 'password')
|
2007-12-19 19:56:19 +03:00
|
|
|
if username and not password:
|
|
|
|
password = ui.getpass()
|
2006-08-15 23:06:50 +04:00
|
|
|
if username and password:
|
|
|
|
ui.note(_('(authenticating to mail server as %s)\n') %
|
|
|
|
(username))
|
2009-07-27 04:27:24 +04:00
|
|
|
try:
|
|
|
|
s.login(username, password)
|
2015-06-24 08:20:08 +03:00
|
|
|
except smtplib.SMTPException as inst:
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(inst)
|
2006-08-15 23:06:50 +04:00
|
|
|
|
2008-01-31 23:44:19 +03:00
|
|
|
def send(sender, recipients, msg):
|
|
|
|
try:
|
|
|
|
return s.sendmail(sender, recipients, msg)
|
2015-06-24 08:20:08 +03:00
|
|
|
except smtplib.SMTPRecipientsRefused as inst:
|
2008-01-31 23:44:19 +03:00
|
|
|
recipients = [r[1] for r in inst.recipients.values()]
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort('\n' + '\n'.join(recipients))
|
2015-06-24 08:20:08 +03:00
|
|
|
except smtplib.SMTPException as inst:
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(inst)
|
2008-01-26 03:04:32 +03:00
|
|
|
|
2008-01-31 23:44:19 +03:00
|
|
|
return send
|
2008-01-26 03:04:32 +03:00
|
|
|
|
2008-01-31 23:44:19 +03:00
|
|
|
def _sendmail(ui, sender, recipients, msg):
|
|
|
|
'''send mail using sendmail.'''
|
codemod: register core configitems using a script
This is done by a script [2] using RedBaron [1], a tool designed for doing
code refactoring. All "default" values are decided by the script and are
strongly consistent with the existing code.
There are 2 changes done manually to fix tests:
[warn] mercurial/exchange.py: experimental.bundle2-output-capture: default needs manual removal
[warn] mercurial/localrepo.py: experimental.hook-track-tags: default needs manual removal
Since RedBaron is not confident about how to indent things [2].
[1]: https://github.com/PyCQA/redbaron
[2]: https://github.com/PyCQA/redbaron/issues/100
[3]:
#!/usr/bin/env python
# codemod_configitems.py - codemod tool to fill configitems
#
# Copyright 2017 Facebook, Inc.
#
# This software may be used and distributed according to the terms of the
# GNU General Public License version 2 or any later version.
from __future__ import absolute_import, print_function
import os
import sys
import redbaron
def readpath(path):
with open(path) as f:
return f.read()
def writepath(path, content):
with open(path, 'w') as f:
f.write(content)
_configmethods = {'config', 'configbool', 'configint', 'configbytes',
'configlist', 'configdate'}
def extractstring(rnode):
"""get the string from a RedBaron string or call_argument node"""
while rnode.type != 'string':
rnode = rnode.value
return rnode.value[1:-1] # unquote, "'str'" -> "str"
def uiconfigitems(red):
"""match *.ui.config* pattern, yield (node, method, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
obj = node[-3].value
method = node[-2].value
args = node[-1]
section = args[0].value
name = args[1].value
if (obj in ('ui', 'self') and method in _configmethods
and section.type == 'string' and name.type == 'string'):
entry = (node, method, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def coreconfigitems(red):
"""match coreconfigitem(...) pattern, yield (node, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
args = node[1]
section = args[0].value
name = args[1].value
if (node[0].value == 'coreconfigitem' and section.type == 'string'
and name.type == 'string'):
entry = (node, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def registercoreconfig(cfgred, section, name, defaultrepr):
"""insert coreconfigitem to cfgred AST
section and name are plain string, defaultrepr is a string
"""
# find a place to insert the "coreconfigitem" item
entries = list(coreconfigitems(cfgred))
for node, args, nodesection, nodename in reversed(entries):
if (nodesection, nodename) < (section, name):
# insert after this entry
node.insert_after(
'coreconfigitem(%r, %r,\n'
' default=%s,\n'
')' % (section, name, defaultrepr))
return
def main(argv):
if not argv:
print('Usage: codemod_configitems.py FILES\n'
'For example, FILES could be "{hgext,mercurial}/*/**.py"')
dirname = os.path.dirname
reporoot = dirname(dirname(dirname(os.path.abspath(__file__))))
# register configitems to this destination
cfgpath = os.path.join(reporoot, 'mercurial', 'configitems.py')
cfgred = redbaron.RedBaron(readpath(cfgpath))
# state about what to do
registered = set((s, n) for n, a, s, n in coreconfigitems(cfgred))
toregister = {} # {(section, name): defaultrepr}
coreconfigs = set() # {(section, name)}, whether it's used in core
# first loop: scan all files before taking any action
for i, path in enumerate(argv):
print('(%d/%d) scanning %s' % (i + 1, len(argv), path))
iscore = ('mercurial' in path) and ('hgext' not in path)
red = redbaron.RedBaron(readpath(path))
# find all repo.ui.config* and ui.config* calls, and collect their
# section, name and default value information.
for node, method, args, section, name in uiconfigitems(red):
if section == 'web':
# [web] section has some weirdness, ignore them for now
continue
defaultrepr = None
key = (section, name)
if len(args) == 2:
if key in registered:
continue
if method == 'configlist':
defaultrepr = 'list'
elif method == 'configbool':
defaultrepr = 'False'
else:
defaultrepr = 'None'
elif len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
# try to understand the "default" value
dnode = args[2].value
if dnode.type == 'name':
if dnode.value in {'None', 'True', 'False'}:
defaultrepr = dnode.value
elif dnode.type == 'string':
defaultrepr = repr(dnode.value[1:-1])
elif dnode.type in ('int', 'float'):
defaultrepr = dnode.value
# inconsistent default
if key in toregister and toregister[key] != defaultrepr:
defaultrepr = None
# interesting to rewrite
if key not in registered:
if defaultrepr is None:
print('[note] %s: %s.%s: unsupported default'
% (path, section, name))
registered.add(key) # skip checking it again
else:
toregister[key] = defaultrepr
if iscore:
coreconfigs.add(key)
# second loop: rewrite files given "toregister" result
for path in argv:
# reconstruct redbaron - trade CPU for memory
red = redbaron.RedBaron(readpath(path))
changed = False
for node, method, args, section, name in uiconfigitems(red):
key = (section, name)
defaultrepr = toregister.get(key)
if defaultrepr is None or key not in coreconfigs:
continue
if len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
try:
del args[2]
changed = True
except Exception:
# redbaron fails to do the rewrite due to indentation
# see https://github.com/PyCQA/redbaron/issues/100
print('[warn] %s: %s.%s: default needs manual removal'
% (path, section, name))
if key not in registered:
print('registering %s.%s' % (section, name))
registercoreconfig(cfgred, section, name, defaultrepr)
registered.add(key)
if changed:
print('updating %s' % path)
writepath(path, red.dumps())
if toregister:
print('updating configitems.py')
writepath(cfgpath, cfgred.dumps())
if __name__ == "__main__":
sys.exit(main(sys.argv[1:]))
2017-07-15 00:22:40 +03:00
|
|
|
program = ui.config('email', 'method')
|
2008-01-31 23:44:19 +03:00
|
|
|
cmdline = '%s -f %s %s' % (program, util.email(sender),
|
|
|
|
' '.join(map(util.email, recipients)))
|
2008-01-31 23:44:19 +03:00
|
|
|
ui.note(_('sending mail: %s\n') % cmdline)
|
2008-04-14 16:34:38 +04:00
|
|
|
fp = util.popen(cmdline, 'w')
|
2008-01-31 23:44:19 +03:00
|
|
|
fp.write(msg)
|
|
|
|
ret = fp.close()
|
|
|
|
if ret:
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort('%s %s' % (
|
2008-01-31 23:44:19 +03:00
|
|
|
os.path.basename(program.split(None, 1)[0]),
|
2011-05-06 17:31:09 +04:00
|
|
|
util.explainexit(ret)[0]))
|
2006-08-15 23:06:50 +04:00
|
|
|
|
2011-11-23 05:11:24 +04:00
|
|
|
def _mbox(mbox, sender, recipients, msg):
|
|
|
|
'''write mails to mbox'''
|
|
|
|
fp = open(mbox, 'ab+')
|
|
|
|
# Should be time.asctime(), but Windows prints 2-characters day
|
|
|
|
# of month instead of one. Make them print the same thing.
|
|
|
|
date = time.strftime('%a %b %d %H:%M:%S %Y', time.localtime())
|
|
|
|
fp.write('From %s %s\n' % (sender, date))
|
|
|
|
fp.write(msg)
|
|
|
|
fp.write('\n\n')
|
|
|
|
fp.close()
|
|
|
|
|
|
|
|
def connect(ui, mbox=None):
|
2008-01-31 23:44:19 +03:00
|
|
|
'''make a mail connection. return a function to send mail.
|
2006-08-15 23:06:50 +04:00
|
|
|
call as sendmail(sender, list-of-recipients, msg).'''
|
2011-11-23 05:11:24 +04:00
|
|
|
if mbox:
|
|
|
|
open(mbox, 'wb').close()
|
|
|
|
return lambda s, r, m: _mbox(mbox, s, r, m)
|
codemod: register core configitems using a script
This is done by a script [2] using RedBaron [1], a tool designed for doing
code refactoring. All "default" values are decided by the script and are
strongly consistent with the existing code.
There are 2 changes done manually to fix tests:
[warn] mercurial/exchange.py: experimental.bundle2-output-capture: default needs manual removal
[warn] mercurial/localrepo.py: experimental.hook-track-tags: default needs manual removal
Since RedBaron is not confident about how to indent things [2].
[1]: https://github.com/PyCQA/redbaron
[2]: https://github.com/PyCQA/redbaron/issues/100
[3]:
#!/usr/bin/env python
# codemod_configitems.py - codemod tool to fill configitems
#
# Copyright 2017 Facebook, Inc.
#
# This software may be used and distributed according to the terms of the
# GNU General Public License version 2 or any later version.
from __future__ import absolute_import, print_function
import os
import sys
import redbaron
def readpath(path):
with open(path) as f:
return f.read()
def writepath(path, content):
with open(path, 'w') as f:
f.write(content)
_configmethods = {'config', 'configbool', 'configint', 'configbytes',
'configlist', 'configdate'}
def extractstring(rnode):
"""get the string from a RedBaron string or call_argument node"""
while rnode.type != 'string':
rnode = rnode.value
return rnode.value[1:-1] # unquote, "'str'" -> "str"
def uiconfigitems(red):
"""match *.ui.config* pattern, yield (node, method, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
obj = node[-3].value
method = node[-2].value
args = node[-1]
section = args[0].value
name = args[1].value
if (obj in ('ui', 'self') and method in _configmethods
and section.type == 'string' and name.type == 'string'):
entry = (node, method, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def coreconfigitems(red):
"""match coreconfigitem(...) pattern, yield (node, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
args = node[1]
section = args[0].value
name = args[1].value
if (node[0].value == 'coreconfigitem' and section.type == 'string'
and name.type == 'string'):
entry = (node, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def registercoreconfig(cfgred, section, name, defaultrepr):
"""insert coreconfigitem to cfgred AST
section and name are plain string, defaultrepr is a string
"""
# find a place to insert the "coreconfigitem" item
entries = list(coreconfigitems(cfgred))
for node, args, nodesection, nodename in reversed(entries):
if (nodesection, nodename) < (section, name):
# insert after this entry
node.insert_after(
'coreconfigitem(%r, %r,\n'
' default=%s,\n'
')' % (section, name, defaultrepr))
return
def main(argv):
if not argv:
print('Usage: codemod_configitems.py FILES\n'
'For example, FILES could be "{hgext,mercurial}/*/**.py"')
dirname = os.path.dirname
reporoot = dirname(dirname(dirname(os.path.abspath(__file__))))
# register configitems to this destination
cfgpath = os.path.join(reporoot, 'mercurial', 'configitems.py')
cfgred = redbaron.RedBaron(readpath(cfgpath))
# state about what to do
registered = set((s, n) for n, a, s, n in coreconfigitems(cfgred))
toregister = {} # {(section, name): defaultrepr}
coreconfigs = set() # {(section, name)}, whether it's used in core
# first loop: scan all files before taking any action
for i, path in enumerate(argv):
print('(%d/%d) scanning %s' % (i + 1, len(argv), path))
iscore = ('mercurial' in path) and ('hgext' not in path)
red = redbaron.RedBaron(readpath(path))
# find all repo.ui.config* and ui.config* calls, and collect their
# section, name and default value information.
for node, method, args, section, name in uiconfigitems(red):
if section == 'web':
# [web] section has some weirdness, ignore them for now
continue
defaultrepr = None
key = (section, name)
if len(args) == 2:
if key in registered:
continue
if method == 'configlist':
defaultrepr = 'list'
elif method == 'configbool':
defaultrepr = 'False'
else:
defaultrepr = 'None'
elif len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
# try to understand the "default" value
dnode = args[2].value
if dnode.type == 'name':
if dnode.value in {'None', 'True', 'False'}:
defaultrepr = dnode.value
elif dnode.type == 'string':
defaultrepr = repr(dnode.value[1:-1])
elif dnode.type in ('int', 'float'):
defaultrepr = dnode.value
# inconsistent default
if key in toregister and toregister[key] != defaultrepr:
defaultrepr = None
# interesting to rewrite
if key not in registered:
if defaultrepr is None:
print('[note] %s: %s.%s: unsupported default'
% (path, section, name))
registered.add(key) # skip checking it again
else:
toregister[key] = defaultrepr
if iscore:
coreconfigs.add(key)
# second loop: rewrite files given "toregister" result
for path in argv:
# reconstruct redbaron - trade CPU for memory
red = redbaron.RedBaron(readpath(path))
changed = False
for node, method, args, section, name in uiconfigitems(red):
key = (section, name)
defaultrepr = toregister.get(key)
if defaultrepr is None or key not in coreconfigs:
continue
if len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
try:
del args[2]
changed = True
except Exception:
# redbaron fails to do the rewrite due to indentation
# see https://github.com/PyCQA/redbaron/issues/100
print('[warn] %s: %s.%s: default needs manual removal'
% (path, section, name))
if key not in registered:
print('registering %s.%s' % (section, name))
registercoreconfig(cfgred, section, name, defaultrepr)
registered.add(key)
if changed:
print('updating %s' % path)
writepath(path, red.dumps())
if toregister:
print('updating configitems.py')
writepath(cfgpath, cfgred.dumps())
if __name__ == "__main__":
sys.exit(main(sys.argv[1:]))
2017-07-15 00:22:40 +03:00
|
|
|
if ui.config('email', 'method') == 'smtp':
|
2008-01-26 03:04:32 +03:00
|
|
|
return _smtp(ui)
|
2008-01-31 23:44:19 +03:00
|
|
|
return lambda s, r, m: _sendmail(ui, s, r, m)
|
2006-08-15 23:06:50 +04:00
|
|
|
|
2011-11-23 05:36:33 +04:00
|
|
|
def sendmail(ui, sender, recipients, msg, mbox=None):
|
|
|
|
send = connect(ui, mbox=mbox)
|
2008-01-31 23:44:19 +03:00
|
|
|
return send(sender, recipients, msg)
|
2007-05-28 01:40:14 +04:00
|
|
|
|
|
|
|
def validateconfig(ui):
|
|
|
|
'''determine if we have enough config data to try sending email.'''
|
codemod: register core configitems using a script
This is done by a script [2] using RedBaron [1], a tool designed for doing
code refactoring. All "default" values are decided by the script and are
strongly consistent with the existing code.
There are 2 changes done manually to fix tests:
[warn] mercurial/exchange.py: experimental.bundle2-output-capture: default needs manual removal
[warn] mercurial/localrepo.py: experimental.hook-track-tags: default needs manual removal
Since RedBaron is not confident about how to indent things [2].
[1]: https://github.com/PyCQA/redbaron
[2]: https://github.com/PyCQA/redbaron/issues/100
[3]:
#!/usr/bin/env python
# codemod_configitems.py - codemod tool to fill configitems
#
# Copyright 2017 Facebook, Inc.
#
# This software may be used and distributed according to the terms of the
# GNU General Public License version 2 or any later version.
from __future__ import absolute_import, print_function
import os
import sys
import redbaron
def readpath(path):
with open(path) as f:
return f.read()
def writepath(path, content):
with open(path, 'w') as f:
f.write(content)
_configmethods = {'config', 'configbool', 'configint', 'configbytes',
'configlist', 'configdate'}
def extractstring(rnode):
"""get the string from a RedBaron string or call_argument node"""
while rnode.type != 'string':
rnode = rnode.value
return rnode.value[1:-1] # unquote, "'str'" -> "str"
def uiconfigitems(red):
"""match *.ui.config* pattern, yield (node, method, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
obj = node[-3].value
method = node[-2].value
args = node[-1]
section = args[0].value
name = args[1].value
if (obj in ('ui', 'self') and method in _configmethods
and section.type == 'string' and name.type == 'string'):
entry = (node, method, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def coreconfigitems(red):
"""match coreconfigitem(...) pattern, yield (node, args, section, name)"""
for node in red.find_all('atomtrailers'):
entry = None
try:
args = node[1]
section = args[0].value
name = args[1].value
if (node[0].value == 'coreconfigitem' and section.type == 'string'
and name.type == 'string'):
entry = (node, args, extractstring(section),
extractstring(name))
except Exception:
pass
else:
if entry:
yield entry
def registercoreconfig(cfgred, section, name, defaultrepr):
"""insert coreconfigitem to cfgred AST
section and name are plain string, defaultrepr is a string
"""
# find a place to insert the "coreconfigitem" item
entries = list(coreconfigitems(cfgred))
for node, args, nodesection, nodename in reversed(entries):
if (nodesection, nodename) < (section, name):
# insert after this entry
node.insert_after(
'coreconfigitem(%r, %r,\n'
' default=%s,\n'
')' % (section, name, defaultrepr))
return
def main(argv):
if not argv:
print('Usage: codemod_configitems.py FILES\n'
'For example, FILES could be "{hgext,mercurial}/*/**.py"')
dirname = os.path.dirname
reporoot = dirname(dirname(dirname(os.path.abspath(__file__))))
# register configitems to this destination
cfgpath = os.path.join(reporoot, 'mercurial', 'configitems.py')
cfgred = redbaron.RedBaron(readpath(cfgpath))
# state about what to do
registered = set((s, n) for n, a, s, n in coreconfigitems(cfgred))
toregister = {} # {(section, name): defaultrepr}
coreconfigs = set() # {(section, name)}, whether it's used in core
# first loop: scan all files before taking any action
for i, path in enumerate(argv):
print('(%d/%d) scanning %s' % (i + 1, len(argv), path))
iscore = ('mercurial' in path) and ('hgext' not in path)
red = redbaron.RedBaron(readpath(path))
# find all repo.ui.config* and ui.config* calls, and collect their
# section, name and default value information.
for node, method, args, section, name in uiconfigitems(red):
if section == 'web':
# [web] section has some weirdness, ignore them for now
continue
defaultrepr = None
key = (section, name)
if len(args) == 2:
if key in registered:
continue
if method == 'configlist':
defaultrepr = 'list'
elif method == 'configbool':
defaultrepr = 'False'
else:
defaultrepr = 'None'
elif len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
# try to understand the "default" value
dnode = args[2].value
if dnode.type == 'name':
if dnode.value in {'None', 'True', 'False'}:
defaultrepr = dnode.value
elif dnode.type == 'string':
defaultrepr = repr(dnode.value[1:-1])
elif dnode.type in ('int', 'float'):
defaultrepr = dnode.value
# inconsistent default
if key in toregister and toregister[key] != defaultrepr:
defaultrepr = None
# interesting to rewrite
if key not in registered:
if defaultrepr is None:
print('[note] %s: %s.%s: unsupported default'
% (path, section, name))
registered.add(key) # skip checking it again
else:
toregister[key] = defaultrepr
if iscore:
coreconfigs.add(key)
# second loop: rewrite files given "toregister" result
for path in argv:
# reconstruct redbaron - trade CPU for memory
red = redbaron.RedBaron(readpath(path))
changed = False
for node, method, args, section, name in uiconfigitems(red):
key = (section, name)
defaultrepr = toregister.get(key)
if defaultrepr is None or key not in coreconfigs:
continue
if len(args) >= 3 and (args[2].target is None or
args[2].target.value == 'default'):
try:
del args[2]
changed = True
except Exception:
# redbaron fails to do the rewrite due to indentation
# see https://github.com/PyCQA/redbaron/issues/100
print('[warn] %s: %s.%s: default needs manual removal'
% (path, section, name))
if key not in registered:
print('registering %s.%s' % (section, name))
registercoreconfig(cfgred, section, name, defaultrepr)
registered.add(key)
if changed:
print('updating %s' % path)
writepath(path, red.dumps())
if toregister:
print('updating configitems.py')
writepath(cfgpath, cfgred.dumps())
if __name__ == "__main__":
sys.exit(main(sys.argv[1:]))
2017-07-15 00:22:40 +03:00
|
|
|
method = ui.config('email', 'method')
|
2007-05-28 01:40:14 +04:00
|
|
|
if method == 'smtp':
|
|
|
|
if not ui.config('smtp', 'host'):
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(_('smtp specified as email transport, '
|
2007-05-28 01:40:14 +04:00
|
|
|
'but no smtp host configured'))
|
|
|
|
else:
|
2011-05-08 22:35:46 +04:00
|
|
|
if not util.findexe(method):
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(_('%r specified as email transport, '
|
2007-05-28 01:40:14 +04:00
|
|
|
'but not in PATH') % method)
|
2008-07-12 22:11:59 +04:00
|
|
|
|
2016-10-05 14:45:22 +03:00
|
|
|
def codec2iana(cs):
|
|
|
|
''''''
|
|
|
|
cs = email.charset.Charset(cs).input_charset.lower()
|
|
|
|
|
|
|
|
# "latin1" normalizes to "iso8859-1", standard calls for "iso-8859-1"
|
|
|
|
if cs.startswith("iso") and not cs.startswith("iso-"):
|
|
|
|
return "iso-" + cs[3:]
|
|
|
|
return cs
|
|
|
|
|
2008-10-20 19:40:29 +04:00
|
|
|
def mimetextpatch(s, subtype='plain', display=False):
|
2011-11-23 05:44:11 +04:00
|
|
|
'''Return MIME message suitable for a patch.
|
2016-10-05 14:45:22 +03:00
|
|
|
Charset will be detected by first trying to decode as us-ascii, then utf-8,
|
|
|
|
and finally the global encodings. If all those fail, fall back to
|
|
|
|
ISO-8859-1, an encoding with that allows all byte sequences.
|
2011-11-23 05:44:11 +04:00
|
|
|
Transfer encodings will be used if necessary.'''
|
2009-05-08 20:30:44 +04:00
|
|
|
|
2016-10-05 14:45:22 +03:00
|
|
|
cs = ['us-ascii', 'utf-8', encoding.encoding, encoding.fallbackencoding]
|
|
|
|
if display:
|
|
|
|
return mimetextqp(s, subtype, 'us-ascii')
|
|
|
|
for charset in cs:
|
2009-05-08 20:30:44 +04:00
|
|
|
try:
|
2016-10-05 14:45:22 +03:00
|
|
|
s.decode(charset)
|
|
|
|
return mimetextqp(s, subtype, codec2iana(charset))
|
2009-05-08 20:30:44 +04:00
|
|
|
except UnicodeDecodeError:
|
2016-10-05 14:45:22 +03:00
|
|
|
pass
|
|
|
|
|
|
|
|
return mimetextqp(s, subtype, "iso-8859-1")
|
2011-11-23 05:44:11 +04:00
|
|
|
|
|
|
|
def mimetextqp(body, subtype, charset):
|
|
|
|
'''Return MIME message.
|
2012-08-16 00:38:42 +04:00
|
|
|
Quoted-printable transfer encoding will be used if necessary.
|
2011-11-23 05:44:11 +04:00
|
|
|
'''
|
|
|
|
enc = None
|
|
|
|
for line in body.splitlines():
|
|
|
|
if len(line) > 950:
|
|
|
|
body = quopri.encodestring(body)
|
|
|
|
enc = "quoted-printable"
|
|
|
|
break
|
|
|
|
|
|
|
|
msg = email.MIMEText.MIMEText(body, subtype, charset)
|
2009-05-08 20:30:44 +04:00
|
|
|
if enc:
|
|
|
|
del msg['Content-Transfer-Encoding']
|
|
|
|
msg['Content-Transfer-Encoding'] = enc
|
|
|
|
return msg
|
2008-10-20 19:40:29 +04:00
|
|
|
|
2008-07-12 22:11:59 +04:00
|
|
|
def _charsets(ui):
|
|
|
|
'''Obtains charsets to send mail parts not containing patches.'''
|
|
|
|
charsets = [cs.lower() for cs in ui.configlist('email', 'charsets')]
|
2009-04-03 23:51:48 +04:00
|
|
|
fallbacks = [encoding.fallbackencoding.lower(),
|
|
|
|
encoding.encoding.lower(), 'utf-8']
|
2009-05-08 17:14:04 +04:00
|
|
|
for cs in fallbacks: # find unique charsets while keeping order
|
2008-07-12 22:11:59 +04:00
|
|
|
if cs not in charsets:
|
|
|
|
charsets.append(cs)
|
|
|
|
return [cs for cs in charsets if not cs.endswith('ascii')]
|
|
|
|
|
|
|
|
def _encode(ui, s, charsets):
|
|
|
|
'''Returns (converted) string, charset tuple.
|
|
|
|
Finds out best charset by cycling through sendcharsets in descending
|
2009-04-03 23:51:48 +04:00
|
|
|
order. Tries both encoding and fallbackencoding for input. Only as
|
2008-07-12 22:11:59 +04:00
|
|
|
last resort send as is in fake ascii.
|
|
|
|
Caveat: Do not use for mail parts containing patches!'''
|
|
|
|
try:
|
|
|
|
s.decode('ascii')
|
|
|
|
except UnicodeDecodeError:
|
|
|
|
sendcharsets = charsets or _charsets(ui)
|
2009-04-03 23:51:48 +04:00
|
|
|
for ics in (encoding.encoding, encoding.fallbackencoding):
|
2008-07-12 22:11:59 +04:00
|
|
|
try:
|
|
|
|
u = s.decode(ics)
|
|
|
|
except UnicodeDecodeError:
|
|
|
|
continue
|
|
|
|
for ocs in sendcharsets:
|
|
|
|
try:
|
|
|
|
return u.encode(ocs), ocs
|
|
|
|
except UnicodeEncodeError:
|
|
|
|
pass
|
|
|
|
except LookupError:
|
2008-10-21 12:29:57 +04:00
|
|
|
ui.warn(_('ignoring invalid sendcharset: %s\n') % ocs)
|
2008-07-12 22:11:59 +04:00
|
|
|
# if ascii, or all conversion attempts fail, send (broken) ascii
|
|
|
|
return s, 'us-ascii'
|
|
|
|
|
|
|
|
def headencode(ui, s, charsets=None, display=False):
|
|
|
|
'''Returns RFC-2047 compliant header from given string.'''
|
|
|
|
if not display:
|
|
|
|
# split into words?
|
|
|
|
s, cs = _encode(ui, s, charsets)
|
2016-10-07 18:30:11 +03:00
|
|
|
return str(email.header.Header(s, cs))
|
2008-07-12 22:11:59 +04:00
|
|
|
return s
|
|
|
|
|
2009-11-26 11:47:39 +03:00
|
|
|
def _addressencode(ui, name, addr, charsets=None):
|
2008-07-12 22:11:59 +04:00
|
|
|
name = headencode(ui, name, charsets)
|
|
|
|
try:
|
|
|
|
acc, dom = addr.split('@')
|
|
|
|
acc = acc.encode('ascii')
|
2009-11-05 12:49:28 +03:00
|
|
|
dom = dom.decode(encoding.encoding).encode('idna')
|
2008-07-12 22:11:59 +04:00
|
|
|
addr = '%s@%s' % (acc, dom)
|
|
|
|
except UnicodeDecodeError:
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(_('invalid email address: %s') % addr)
|
2008-07-12 22:11:59 +04:00
|
|
|
except ValueError:
|
|
|
|
try:
|
|
|
|
# too strict?
|
|
|
|
addr = addr.encode('ascii')
|
|
|
|
except UnicodeDecodeError:
|
2015-10-08 22:55:45 +03:00
|
|
|
raise error.Abort(_('invalid local address: %s') % addr)
|
2008-07-12 22:11:59 +04:00
|
|
|
return email.Utils.formataddr((name, addr))
|
|
|
|
|
2009-11-26 11:47:39 +03:00
|
|
|
def addressencode(ui, address, charsets=None, display=False):
|
|
|
|
'''Turns address into RFC-2047 compliant header.'''
|
|
|
|
if display or not address:
|
|
|
|
return address or ''
|
|
|
|
name, addr = email.Utils.parseaddr(address)
|
|
|
|
return _addressencode(ui, name, addr, charsets)
|
|
|
|
|
|
|
|
def addrlistencode(ui, addrs, charsets=None, display=False):
|
|
|
|
'''Turns a list of addresses into a list of RFC-2047 compliant headers.
|
|
|
|
A single element of input list may contain multiple addresses, but output
|
|
|
|
always has one address per item'''
|
|
|
|
if display:
|
|
|
|
return [a.strip() for a in addrs if a.strip()]
|
|
|
|
|
|
|
|
result = []
|
|
|
|
for name, addr in email.Utils.getaddresses(addrs):
|
|
|
|
if name or addr:
|
|
|
|
result.append(_addressencode(ui, name, addr, charsets))
|
|
|
|
return result
|
|
|
|
|
2008-07-12 22:11:59 +04:00
|
|
|
def mimeencode(ui, s, charsets=None, display=False):
|
|
|
|
'''creates mime text object, encodes it if needed, and sets
|
|
|
|
charset and transfer-encoding accordingly.'''
|
|
|
|
cs = 'us-ascii'
|
|
|
|
if not display:
|
|
|
|
s, cs = _encode(ui, s, charsets)
|
2011-11-23 05:44:11 +04:00
|
|
|
return mimetextqp(s, 'plain', cs)
|
2016-03-03 20:34:19 +03:00
|
|
|
|
|
|
|
def headdecode(s):
|
|
|
|
'''Decodes RFC-2047 header'''
|
|
|
|
uparts = []
|
2016-10-07 18:30:11 +03:00
|
|
|
for part, charset in email.header.decode_header(s):
|
2016-03-03 20:34:19 +03:00
|
|
|
if charset is not None:
|
|
|
|
try:
|
|
|
|
uparts.append(part.decode(charset))
|
|
|
|
continue
|
|
|
|
except UnicodeDecodeError:
|
|
|
|
pass
|
|
|
|
try:
|
|
|
|
uparts.append(part.decode('UTF-8'))
|
|
|
|
continue
|
|
|
|
except UnicodeDecodeError:
|
|
|
|
pass
|
|
|
|
uparts.append(part.decode('ISO-8859-1'))
|
2017-03-13 19:11:08 +03:00
|
|
|
return encoding.unitolocal(u' '.join(uparts))
|