diff options
author | R Chowdhury <necaris@gmail.com> | 2020-05-26 07:29:58 -0400 |
---|---|---|
committer | Reto Brunner <reto@labrat.space> | 2020-08-13 07:44:43 +0200 |
commit | f4dc7e1f746582d42462ec56347dd354756203b0 (patch) | |
tree | d4535b0aeecd9d323f12fcf1e3040babdbc79da1 /commands/compose | |
parent | f1a0fd20d6d30fb1203ffa3cb9f4004476acfdb3 (diff) | |
download | aerc-f4dc7e1f746582d42462ec56347dd354756203b0.tar.gz |
Add `oauthbearer` support for SMTP
This piggybacks on the existing IMAP support, and uses the same
configuration format (my local testing example has the IMAP and SMTP
lines almost copy-pasted from one another).
It's a little clumsy in that a new token is negotiated for every
`Send()` command, but it's a start...
Diffstat (limited to 'commands/compose')
-rw-r--r-- | commands/compose/send.go | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/commands/compose/send.go b/commands/compose/send.go index 40ac4ca0..dd7ece92 100644 --- a/commands/compose/send.go +++ b/commands/compose/send.go @@ -16,9 +16,11 @@ import ( "github.com/miolini/datacounter" "github.com/pkg/errors" + "git.sr.ht/~sircmpwn/aerc/lib" "git.sr.ht/~sircmpwn/aerc/models" "git.sr.ht/~sircmpwn/aerc/widgets" "git.sr.ht/~sircmpwn/aerc/worker/types" + "golang.org/x/oauth2" ) type Send struct{} @@ -97,6 +99,35 @@ func (Send) Execute(aerc *widgets.Aerc, args []string) error { case "plain": password, _ := uri.User.Password() saslClient = sasl.NewPlainClient("", uri.User.Username(), password) + case "oauthbearer": + q := uri.Query() + + oauth2 := &oauth2.Config{} + if q.Get("token_endpoint") != "" { + oauth2.ClientID = q.Get("client_id") + oauth2.ClientSecret = q.Get("client_secret") + oauth2.Scopes = []string{q.Get("scope")} + oauth2.Endpoint.TokenURL = q.Get("token_endpoint") + } + + password, _ := uri.User.Password() + bearer := lib.OAuthBearer{ + OAuth2: oauth2, + Enabled: true, + } + if bearer.OAuth2.Endpoint.TokenURL == "" { + return fmt.Errorf("No 'TokenURL' configured for this account") + } + token, err := bearer.ExchangeRefreshToken(password) + if err != nil { + return err + } + password = token.AccessToken + + saslClient = sasl.NewOAuthBearerClient(&sasl.OAuthBearerOptions{ + Username: uri.User.Username(), + Token: password, + }) default: return fmt.Errorf("Unsupported auth mechanism %s", auth) } |