def PrepareMail(config, mailobj, sender=None, rcpts=None): if not sender or not rcpts: tree = mailobj.get_message_tree() sender = sender or tree['headers_lc']['from'] if not rcpts: rcpts = ExtractEmails(tree['headers_lc'].get('to', '')) rcpts += ExtractEmails(tree['headers_lc'].get('cc', '')) rcpts += ExtractEmails(tree['headers_lc'].get('bcc', '')) if not rcpts: raise NoRecipientError() rcpts += [sender] # Cleanup... sender = ExtractEmails(sender)[0] sender_keyid = None if config.prefs.openpgp_header: try: gnupg = GnuPG() seckeys = dict([(x["email"], y["fingerprint"]) for y in gnupg.list_secret_keys().values() for x in y["uids"]]) sender_keyid = seckeys[sender] except: pass rcpts, rr = [sender], rcpts for r in rr: for e in ExtractEmails(r): if e not in rcpts: rcpts.append(e) msg = copy.deepcopy(mailobj.get_msg()) # Remove headers we don't want to expose for bcc in ('bcc', 'Bcc', 'BCc', 'BCC'): if bcc in msg: del msg[bcc] if 'date' not in msg: msg['Date'] = email.utils.formatdate() if sender_keyid and config.prefs.openpgp_header: msg["OpenPGP"] = "id=%s; preference=%s" % (sender_keyid, config.prefs.openpgp_header) # Sign and encrypt signatureopt = bool(int(tree['headers_lc'].get('do_sign', 0))) encryptopt = bool(int(tree['headers_lc'].get('do_encrypt', 0))) gnupg = GnuPG() if signatureopt: signingstring = MessageAsString(msg) signature = gnupg.sign(signingstring, fromkey=sender, armor=True) # FIXME: Create attachment, attach signature. if signature[0] == 0: # sigblock = MIMEMultipart(_subtype="signed", # protocol="application/pgp-signature") # sigblock.attach(msg) msg.set_type("multipart/signed") msg.set_param("micalg", "pgp-sha1") # need to find this! msg.set_param("protocol", "application/pgp-signature") sigblock = MIMEText(str(signature[1]), _charset=None) sigblock.set_type("application/pgp-signature") sigblock.set_param("name", "signature.asc") sigblock.add_header("Content-Description", "OpenPGP digital signature") sigblock.add_header("Content-Disposition", "attachment; filename=\"signature.asc\"") msg.attach(sigblock) else: # Raise stink about signing having failed. pass #print signature #if encryptopt: # encrypt_to = tree['headers_lc'].get('encrypt_to') # newmsg = gnupg.encrypt(msg.as_string(), encrypt_to) # # TODO: Replace unencrypted message # When a mail has been signed or encrypted, it should be saved as such. del(msg["do_sign"]) del(msg["do_encrypt"]) del(msg["encrypt_to"]) return (sender, set(rcpts), msg)
def command(self): session = self.session # Create local mailboxes session.config.open_local_mailbox(session) # Create standard tags and filters created = [] for t in self.TAGS: if not session.config.get_tag_id(t): AddTag(session, arg=[t]).run() created.append(t) session.config.get_tag(t).update(self.TAGS[t]) if 'New' in created: Filter(session, arg=['new', '+Inbox', '+New', 'New Mail filter']).run() # Import all the basic plugins for plugin in PLUGINS: if plugin not in session.config.sys.plugins: session.config.sys.plugins.append(plugin) try: # If spambayes is not installed, this will fail import mailpile.plugins.autotag_sb if 'autotag_sb' not in session.config.sys.plugins: session.config.sys.plugins.append('autotag_sb') except ImportError: session.ui.warning(_('Please install spambayes ' 'for super awesome spam filtering')) session.config.save() session.config.load(session) vcard_importers = session.config.prefs.vcard.importers if not vcard_importers.gravatar: vcard_importers.gravatar.append({'active': True}) gpg_home = os.path.expanduser('~/.gnupg') if os.path.exists(gpg_home) and not vcard_importers.gpg: vcard_importers.gpg.append({'active': True, 'gpg_home': gpg_home}) # Assumption: If you already have secret keys, you want to # use the associated addresses for your e-mail. # If you don't already have secret keys, you should have # one made for you, if GnuPG is available. # If GnuPG is not available, you should be warned. gnupg = GnuPG() if gnupg.is_available(): keys = gnupg.list_secret_keys() if len(keys) == 0: # FIXME: Start background process generating a key once a user # has supplied a name and e-mail address. pass else: for key, details in keys.iteritems(): for uid in details["uids"]: if "email" not in uid or uid["email"] == "": continue if uid["email"] in [x["email"] for x in session.config.profiles]: # Don't set up the same e-mail address twice. continue # FIXME: Add route discovery mechanism. profile = { "email": uid["email"], "name": uid["name"], } session.config.profiles.append(profile) else: # FIXME: Alert the user to the fact that PGP was not discovered pass if ('autotag_sb' in session.config.sys.plugins and len(session.config.prefs.autotag) == 0): session.config.prefs.autotag.append({ 'match_tag': 'spam', 'unsure_tag': 'maybespam', 'tagger': 'spambayes', 'trainer': 'spambayes' }) session.config.prefs.autotag[0].exclude_tags[0] = 'ham' session.config.save() return True
def command(self): session = self.session # Create local mailboxes session.config.open_local_mailbox(session) # Create standard tags and filters created = [] for t in self.TAGS: if not session.config.get_tag_id(t): AddTag(session, arg=[t]).run() created.append(t) session.config.get_tag(t).update(self.TAGS[t]) if 'New' in created: Filter(session, arg=['new', '+Inbox', '+New', 'New Mail filter']).run() session.ui.notify(_('Created default tags')) # Import all the basic plugins for plugin in PLUGINS: if plugin not in session.config.sys.plugins: session.config.sys.plugins.append(plugin) try: # If spambayes is not installed, this will fail import mailpile.plugins.autotag_sb if 'autotag_sb' not in session.config.sys.plugins: session.config.sys.plugins.append('autotag_sb') session.ui.notify(_('Enabling spambayes autotagger')) except ImportError: session.ui.warning(_('Please install spambayes ' 'for super awesome spam filtering')) session.config.save() session.config.load(session) vcard_importers = session.config.prefs.vcard.importers if not vcard_importers.gravatar: vcard_importers.gravatar.append({'active': True}) session.ui.notify(_('Enabling gravatar image importer')) gpg_home = os.path.expanduser('~/.gnupg') if os.path.exists(gpg_home) and not vcard_importers.gpg: vcard_importers.gpg.append({'active': True, 'gpg_home': gpg_home}) session.ui.notify(_('Importing contacts from GPG keyring')) if ('autotag_sb' in session.config.sys.plugins and len(session.config.prefs.autotag) == 0): session.config.prefs.autotag.append({ 'match_tag': 'spam', 'unsure_tag': 'maybespam', 'tagger': 'spambayes', 'trainer': 'spambayes' }) session.config.prefs.autotag[0].exclude_tags[0] = 'ham' # Assumption: If you already have secret keys, you want to # use the associated addresses for your e-mail. # If you don't already have secret keys, you should have # one made for you, if GnuPG is available. # If GnuPG is not available, you should be warned. gnupg = GnuPG() if gnupg.is_available(): keys = gnupg.list_secret_keys() if len(keys) == 0: # FIXME: Start background process generating a key once a user # has supplied a name and e-mail address. pass else: for key, details in keys.iteritems(): for uid in details["uids"]: if "email" not in uid or uid["email"] == "": continue if uid["email"] in [x["email"] for x in session.config.profiles]: # Don't set up the same e-mail address twice. continue # FIXME: Add route discovery mechanism. profile = { "email": uid["email"], "name": uid["name"], } session.config.profiles.append(profile) if not session.config.prefs.gpg_recipient: session.config.prefs.gpg_recipient = key session.ui.notify(_('Encrypting config to %s') % key) else: session.ui.warning(_('Oh no, PGP/GPG support is unavailable!')) if (session.config.prefs.gpg_recipient and not (self._idx() and self._idx().INDEX) and not session.config.prefs.obfuscate_index): randcrap = sha512b64(open('/dev/urandom').read(1024), session.config.prefs.gpg_recipient, '%s' % time.time()) session.config.prefs.obfuscate_index = randcrap session.config.prefs.index_encrypted = True session.ui.notify(_('Obfuscating search index and enabling ' 'indexing of encrypted e-mail. ')) session.config.save() return True
def command(self): session = self.session # Create local mailboxes session.config.open_local_mailbox(session) # Create standard tags and filters created = [] for t in ('New', 'Inbox', 'Outbox', 'Spam', 'Drafts', 'Blank', 'Sent', 'Trash'): if not session.config.get_tag_id(t): AddTag(session, arg=[t]).run() created.append(t) session.config.get_tag('New').update({ 'type': 'unread', 'label': False, 'display': 'invisible' }) session.config.get_tag('Blank').update({ 'type': 'blank', 'flag_editable': True, 'display': 'invisible' }) session.config.get_tag('Drafts').update({ 'type': 'drafts', 'flag_editable': True, 'display': 'priority', 'display_order': 1, }) session.config.get_tag('Inbox').update({ 'display': 'priority', 'display_order': 2, }) session.config.get_tag('Outbox').update({ 'type': 'outbox', 'display': 'priority', 'display_order': 3, }) session.config.get_tag('Sent').update({ 'type': 'sent', 'display': 'priority', 'display_order': 4, }) session.config.get_tag('Spam').update({ 'type': 'spam', 'flag_hides': True, 'display': 'priority', 'display_order': 5, }) session.config.get_tag('Trash').update({ 'type': 'trash', 'flag_hides': True, 'display': 'priority', 'display_order': 6, }) if 'New' in created: Filter(session, arg=['new', '+Inbox', '+New', 'New Mail filter']).run() Filter(session, arg=['read', '-New', 'Read Mail filter']).run() for old in ('invisible_tags', 'writable_tags'): if old in session.config.sys: del session.config.sys[old] vcard_importers = session.config.prefs.vcard.importers if not vcard_importers.gravatar: vcard_importers.gravatar.append({'active': True}) gpg_home = os.path.expanduser('~/.gnupg') if os.path.exists(gpg_home) and not vcard_importers.gpg: vcard_importers.gpg.append({'active': True, 'gpg_home': gpg_home}) # Assumption: If you already have secret keys, you want to # use the associated addresses for your e-mail. # If you don't already have secret keys, you should have # one made for you, if GnuPG is available. # If GnuPG is not available, you should be warned. gnupg = GnuPG() if gnupg.is_available(): keys = gnupg.list_secret_keys() if len(keys) == 0: # FIXME: Start background process generating a key once a user # has supplied a name and e-mail address. pass else: for key, details in keys.iteritems(): for uid in details["uids"]: if "email" not in uid or uid["email"] == "": continue if uid["email"] in [x["email"] for x in session.config.profiles]: # Don't set up the same e-mail address twice. continue # FIXME: Add route discovery mechanism. profile = { "email": uid["email"], "name": uid["name"], } session.config.profiles.append(profile) else: # FIXME: Alert the user to the fact that PGP was not discovered pass session.config.save() return True