Merge pull request #536 from eikek/mail-xoauth

Mail xoauth
This commit is contained in:
mergify[bot] 2021-01-04 11:02:01 +00:00 committed by GitHub
commit f8735cbcdb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 97 additions and 15 deletions

View File

@ -123,7 +123,8 @@ object OMail {
imapUser: Option[String], imapUser: Option[String],
imapPassword: Option[Password], imapPassword: Option[Password],
imapSsl: SSLType, imapSsl: SSLType,
imapCertCheck: Boolean imapCertCheck: Boolean,
imapOAuth2: Boolean
) { ) {
def toRecord(accId: AccountId) = def toRecord(accId: AccountId) =
@ -135,7 +136,8 @@ object OMail {
imapUser, imapUser,
imapPassword, imapPassword,
imapSsl, imapSsl,
imapCertCheck imapCertCheck,
imapOAuth2
) )
} }

View File

@ -3873,6 +3873,7 @@ components:
- from - from
- sslType - sslType
- ignoreCertificates - ignoreCertificates
- useOAuth
properties: properties:
name: name:
type: string type: string
@ -3891,6 +3892,11 @@ components:
type: string type: string
ignoreCertificates: ignoreCertificates:
type: boolean type: boolean
useOAuth:
type: boolean
description: |
Use the password as an OAuth2 access token with the
authentication scheme XOAUTH2.
CalEventCheckResult: CalEventCheckResult:
description: | description: |
The result of checking a calendar event string. The result of checking a calendar event string.

View File

@ -166,7 +166,8 @@ object MailSettingsRoutes {
ru.imapUser, ru.imapUser,
ru.imapPassword, ru.imapPassword,
ru.imapSsl.name, ru.imapSsl.name,
!ru.imapCertCheck !ru.imapCertCheck,
ru.imapOAuth2
) )
def makeSmtpSettings(ems: EmailSettings): Either[String, OMail.SmtpSettings] = { def makeSmtpSettings(ems: EmailSettings): Either[String, OMail.SmtpSettings] = {
@ -203,6 +204,7 @@ object MailSettingsRoutes {
ims.imapUser, ims.imapUser,
ims.imapPassword, ims.imapPassword,
sslt, sslt,
!ims.ignoreCertificates !ims.ignoreCertificates,
ims.useOAuth
) )
} }

View File

@ -0,0 +1,7 @@
ALTER TABLE "userimap"
ADD COLUMN "imap_oauth2" boolean NULL;
UPDATE "userimap" SET "imap_oauth2" = false;
ALTER TABLE "userimap"
ALTER COLUMN "imap_oauth2" SET NOT NULL;

View File

@ -0,0 +1,7 @@
ALTER TABLE `userimap`
ADD COLUMN (`imap_oauth2` boolean);
UPDATE `userimap` SET `imap_oauth2` = false;
ALTER TABLE `userimap`
MODIFY `imap_oauth2` boolean NOT NULL;

View File

@ -0,0 +1,7 @@
ALTER TABLE "userimap"
ADD COLUMN "imap_oauth2" boolean NULL;
UPDATE "userimap" SET "imap_oauth2" = false;
ALTER TABLE "userimap"
ALTER COLUMN "imap_oauth2" SET NOT NULL;

View File

@ -22,6 +22,7 @@ case class RUserImap(
imapPassword: Option[Password], imapPassword: Option[Password],
imapSsl: SSLType, imapSsl: SSLType,
imapCertCheck: Boolean, imapCertCheck: Boolean,
imapOAuth2: Boolean,
created: Timestamp created: Timestamp
) { ) {
@ -32,6 +33,7 @@ case class RUserImap(
imapUser.getOrElse(""), imapUser.getOrElse(""),
imapPassword.map(_.pass).getOrElse(""), imapPassword.map(_.pass).getOrElse(""),
imapSsl, imapSsl,
imapOAuth2,
!imapCertCheck !imapCertCheck
) )
} }
@ -47,7 +49,8 @@ object RUserImap {
imapUser: Option[String], imapUser: Option[String],
imapPassword: Option[Password], imapPassword: Option[Password],
imapSsl: SSLType, imapSsl: SSLType,
imapCertCheck: Boolean imapCertCheck: Boolean,
imapOAuth2: Boolean
): F[RUserImap] = ): F[RUserImap] =
for { for {
now <- Timestamp.current[F] now <- Timestamp.current[F]
@ -62,6 +65,7 @@ object RUserImap {
imapPassword, imapPassword,
imapSsl, imapSsl,
imapCertCheck, imapCertCheck,
imapOAuth2,
now now
) )
@ -73,7 +77,8 @@ object RUserImap {
imapUser: Option[String], imapUser: Option[String],
imapPassword: Option[Password], imapPassword: Option[Password],
imapSsl: SSLType, imapSsl: SSLType,
imapCertCheck: Boolean imapCertCheck: Boolean,
imapOAuth2: Boolean
): OptionT[ConnectionIO, RUserImap] = ): OptionT[ConnectionIO, RUserImap] =
for { for {
now <- OptionT.liftF(Timestamp.current[ConnectionIO]) now <- OptionT.liftF(Timestamp.current[ConnectionIO])
@ -89,6 +94,7 @@ object RUserImap {
imapPassword, imapPassword,
imapSsl, imapSsl,
imapCertCheck, imapCertCheck,
imapOAuth2,
now now
) )
@ -104,6 +110,7 @@ object RUserImap {
val imapPass = Column[Password]("imap_password", this) val imapPass = Column[Password]("imap_password", this)
val imapSsl = Column[SSLType]("imap_ssl", this) val imapSsl = Column[SSLType]("imap_ssl", this)
val imapCertCheck = Column[Boolean]("imap_certcheck", this) val imapCertCheck = Column[Boolean]("imap_certcheck", this)
val imapOAuth2 = Column[Boolean]("imap_oauth2", this)
val created = Column[Timestamp]("created", this) val created = Column[Timestamp]("created", this)
val all = NonEmptyList.of[Column[_]]( val all = NonEmptyList.of[Column[_]](
@ -116,6 +123,7 @@ object RUserImap {
imapPass, imapPass,
imapSsl, imapSsl,
imapCertCheck, imapCertCheck,
imapOAuth2,
created created
) )
} }
@ -129,7 +137,7 @@ object RUserImap {
.insert( .insert(
t, t,
t.all, t.all,
sql"${v.id},${v.uid},${v.name},${v.imapHost},${v.imapPort},${v.imapUser},${v.imapPassword},${v.imapSsl},${v.imapCertCheck},${v.created}" sql"${v.id},${v.uid},${v.name},${v.imapHost},${v.imapPort},${v.imapUser},${v.imapPassword},${v.imapSsl},${v.imapCertCheck},${v.imapOAuth2},${v.created}"
) )
} }
@ -145,7 +153,8 @@ object RUserImap {
t.imapUser.setTo(v.imapUser), t.imapUser.setTo(v.imapUser),
t.imapPass.setTo(v.imapPassword), t.imapPass.setTo(v.imapPassword),
t.imapSsl.setTo(v.imapSsl), t.imapSsl.setTo(v.imapSsl),
t.imapCertCheck.setTo(v.imapCertCheck) t.imapCertCheck.setTo(v.imapCertCheck),
t.imapOAuth2.setTo(v.imapOAuth2)
) )
) )
} }

View File

@ -32,6 +32,7 @@ type alias Model =
, password : Maybe String , password : Maybe String
, sslType : Comp.Dropdown.Model SSLType , sslType : Comp.Dropdown.Model SSLType
, ignoreCertificates : Bool , ignoreCertificates : Bool
, useOAuthToken : Bool
} }
@ -58,6 +59,7 @@ emptyModel =
, selected = Just Data.SSLType.None , selected = Just Data.SSLType.None
} }
, ignoreCertificates = False , ignoreCertificates = False
, useOAuthToken = False
} }
@ -87,6 +89,7 @@ init ems =
|> Just |> Just
} }
, ignoreCertificates = ems.ignoreCertificates , ignoreCertificates = ems.ignoreCertificates
, useOAuthToken = ems.useOAuth
} }
@ -104,6 +107,7 @@ getSettings model =
|> Maybe.withDefault Data.SSLType.None |> Maybe.withDefault Data.SSLType.None
|> Data.SSLType.toString |> Data.SSLType.toString
, ignoreCertificates = model.ignoreCertificates , ignoreCertificates = model.ignoreCertificates
, useOAuth = model.useOAuthToken
} }
) )
@ -116,6 +120,7 @@ type Msg
| PassMsg Comp.PasswordInput.Msg | PassMsg Comp.PasswordInput.Msg
| SSLTypeMsg (Comp.Dropdown.Msg SSLType) | SSLTypeMsg (Comp.Dropdown.Msg SSLType)
| ToggleCheckCert | ToggleCheckCert
| ToggleUseOAuth
isValid : Model -> Bool isValid : Model -> Bool
@ -159,14 +164,17 @@ update msg model =
ToggleCheckCert -> ToggleCheckCert ->
( { model | ignoreCertificates = not model.ignoreCertificates }, Cmd.none ) ( { model | ignoreCertificates = not model.ignoreCertificates }, Cmd.none )
ToggleUseOAuth ->
( { model | useOAuthToken = not model.useOAuthToken }, Cmd.none )
view : UiSettings -> Model -> Html Msg view : UiSettings -> Model -> Html Msg
view settings model = view settings model =
div div
[ classList [ classList
[ ( "ui form", True ) [ ( "ui form", True )
, ( "error", not (isValid model) ) , ( "info error", not (isValid model) )
, ( "success", isValid model ) , ( "info success", isValid model )
] ]
] ]
[ div [ class "required field" ] [ div [ class "required field" ]
@ -227,6 +235,17 @@ view settings model =
, label [] [ text "Ignore certificate check" ] , label [] [ text "Ignore certificate check" ]
] ]
] ]
, div [ class "inline field" ]
[ div [ class "ui checkbox" ]
[ input
[ type_ "checkbox"
, checked model.useOAuthToken
, onCheck (\_ -> ToggleUseOAuth)
]
[]
, label [] [ text "Enable OAuth2 authentication using the password as access token" ]
]
]
] ]
, div [ class "two fields" ] , div [ class "two fields" ]
[ div [ class "field" ] [ div [ class "field" ]

View File

@ -102,14 +102,37 @@ enabled if you know why.*
Authenticating with GMail may be not so simple. GMail implements an Authenticating with GMail may be not so simple. GMail implements an
authentication scheme called *XOAUTH2* (at least for Imap). It will authentication scheme called *XOAUTH2* (at least for Imap). It will
not work with your normal password. This is to avoid giving an not work with your normal password. This is to avoid giving an
application full access to your gmail account. application full access to your gmail account and also to add your
password to the store of different apps.
The e-mail integration in docspell relies on the
[JavaMail](https://javaee.github.io/javamail) library which has ## via App specific passwords
GMail allows to define [application specific
passwords](https://myaccount.google.com/apppasswords) (you must, as of
now, enable 2FA to make it available). These are separate unique
passwords solely defined for one specific application. You can
enable/disable this password any time at your google account page.
This makes it possible to use "standard" authentication schemes with
you gmail account via imap. That is, *do not* enable the `Enable
OAuth2 authentication …` in your imap settings.
## via OAuth2
If you don't want to use application specific passwords, you can use
OAuth2 directly. The e-mail integration in docspell relies on the
[JavaMail](https://eclipse-ee4j.github.io/mail) library which has
support for XOAUTH2. It also has documentation on what you need to do support for XOAUTH2. It also has documentation on what you need to do
on your gmail account: <https://javaee.github.io/javamail/OAuth2>. on your gmail account: <https://eclipse-ee4j.github.io/mail/OAuth2>.
First you need to go to the [Google Developers To enable the auth scheme in docspell, you must enable the `Enable
OAuth2 authentication …` in your imap settings. In this mode, the imap
password is the OAuth2 access token.
The following describes what you need to do at gmail to activate this
for docspell. First you need to go to the [Google Developers
Console](https://console.developers.google.com) and create an "App" to Console](https://console.developers.google.com) and create an "App" to
get a Client-Id and a Client-Secret. This "App" will be your instance get a Client-Id and a Client-Secret. This "App" will be your instance
of docspell. You tell google that this app may send and read your of docspell. You tell google that this app may send and read your

Binary file not shown.

Before

Width:  |  Height:  |  Size: 66 KiB

After

Width:  |  Height:  |  Size: 88 KiB