Hello. Dear Josef, i Cc: you, since you asked about something like this in Spring, i hope this is ok.
So i always hated OAuth 2.0. This is a long story, and it is late, and the manual had FAQ entries for maybe seven years. What i _like_ with OAuth is that users can fine-tune what applications are allowed to do. In practice application developers do so, and users agree with it within their browser, all or nothing. But ok. Of course this would have worked with any kind of application specific password. That could have been integrated in Kerberos, with the local kinit(1) program, for example. Without dozens-of-millions-of-lines-of-code browsers involved. Without necessity for activated Javascript for interaction. With the ability to kdestroy(1) upon notebook LID close. And updates of such passwords could have been a matter of nothing but a specific URL plus response. In plain text, without JSON and whatever else. Automatizable. But the ship has sailed. Ok people, so in June 2021 i failed again to create the necessary things to allow S-nail users easy and automated access to GMail etc via OAuth 2.0. I am too stupid. And i do not like it. And i am too stupid. Due to week long prodding of Stephen Isard in private i moved my stupid ass to get the stuff done, at least a bit. This means that i really made the great, and i can provide easy access to S-nail for GMail, Microsoft and Yandex users, aka access via and to OAuth 2.0 access tokens. Of course this is not highly integrated into S-nail, maybe v14.10 goes a bit into this direction. But here are pieces to use: - For v14.9.24, XOAUTH2 is indeed oauthbearer. That is, for the *-auth* variables. - s-nail-oauth-helper.py This is a Python3 script (oh yes, i hate Python, but the standard installation ships everything that is needed, and i would expect most people to not get around without an installed Python in modern times). (Maybe v14.10 will do what it does in C, with the help of the external cURL application. S-nail will _not_ link against the cURL library to get this done, especially not in v14.10.) _If_ you only have one account at a service provider, say, Google, then all you need to do to get yourself going is: # s-nail-oauth-helper.y --resource CONFIG-PATH --provider Yandex This will echo an access token usable with S-nail, to be set as a $password. (More on that below.) The first invocation will require interaction! Of course things can be more complicated, try -h / --help. It may be worthwhile to use a different flow=, for example. Or specify a login_hint= if you have multiple accounts at a given provider. For this, first create a template file template: # s-nail-oauth-helper.y --resource CONFIG-PATH \ --provider Google --action template Then edit CONFIG-PATH. This template has lots of comments for documentation purposes. How to get this $password token into S-nail? This is more complicated, especially as of today. - oauth-aware-ticks.rc So this defines a helper macro oauth-check-token. It can be driven by doing for example \set oauth-helper=PATH-TO-s-nail-oauth-helper.py \ --resource PATH-TO-CONFIG' \ oauth-helper-times=PATH-TO-CONFIG \ on-oauth-password-change=_update_password \set on-main-loop-tick=oauth-check-token \ on-compose-enter=oauth-check-token define _update_password { echo .. we should set password to $1 now.. # \set password=$1 #\if "$mailbox-resolved" =~ '^imaps?:// # \disconnect # \connect #\end } If you change `account's you change the $oauth-helper, which will recognize this and reset. (Trouble if you do not.) You note the $oauth-helper-times variable above. The Python script supports hooks instead of configuration files, for example to encrypt the configuration with its sensitive data. If you use this, you should place at least the timestamp= and timeout= lines of the configuration in an additional, different, clear-text file, and set this variable to that file instead. oauth-check-token{} will be able to avoid calling the expensive python script unless the timeout expires, if you do. It works from testing, but any comment is helpful. (I am back on Monday..) Note: of course, the above requires access to the internet. If $oauth-helper fails, then oauth-check-token{} will reset the variable! And $oauth-helper _will_ fail without internet access. An alternative is to use a crond(8) script that invokes s-nail-oauth-helper.py successively with all accounts that should be managed. For example via a script that is automatically called whenever the internet is accessed. And then use `readctl' to open the configuration, and parse the access_token out of it. Another problem are Stephen Isard's long compose mode edit sessions. If the access token times out, you are in trouble. You could initiate an oauth-check-token{} call from within on-compose-splice additionally to overcome this, which is not very expensive if it has access to $oauth-helper-times. I wish you all a nice Sunday! Ciao and good night from Germany! --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt)
#!/usr/bin/env python3 #@ Create and update OAuth2 access tokens (for S-nail). # # 2022 Steffen Nurpmeso <stef...@sdaoden.eu> # Public Domain # Empty and no builtin configs VAL_NAME = 'S-nail' import argparse import base64 from datetime import datetime as dati import http.server import json import os import pickle import socket import subprocess import sys import time from urllib.error import HTTPError from urllib.parse import urlencode, urlparse, parse_qs from urllib.request import urlopen EX_OK = 0 EX_USAGE = 64 EX_DATAERR= 65 EX_NOINPUT = 66 EX_SOFTWARE = 70 EX_CANTCREAT = 73 EX_TEMPFAIL = 75 # Note: we use .keys() for configuration checks: all providers need _all_ keys. providers = { #{{{ 'Google': { 'authorize_endpoint': 'https://accounts.google.com/o/oauth2/auth', 'devicecode_endpoint': 'https://oauth2.googleapis.com/device/code', 'devicecode_grant_type': None, 'token_endpoint': 'https://accounts.google.com/o/oauth2/token', 'redirect_uri': 'urn:ietf:wg:oauth:2.0:oob', 'tenant': None, 'scope': 'https://mail.google.com/', 'flow': 'redirect', 'flow_redirect_uri_port_fixed': None }, 'Microsoft': { 'authorize_endpoint': 'https://login.microsoftonline.com/common/oauth2/v2.0/authorize', 'devicecode_endpoint': 'https://login.microsoftonline.com/common/oauth2/v2.0/devicecode', 'devicecode_grant_type': None, 'token_endpoint': 'https://login.microsoftonline.com/common/oauth2/v2.0/token', 'redirect_uri': 'https://login.microsoftonline.com/common/oauth2/nativeclient', 'tenant': 'common', 'scope': ( 'offline_access https://outlook.office.com/IMAP.AccessAsUser.All ' 'https://outlook.office.com/POP.AccessAsUser.All ' 'https://outlook.office.com/SMTP.Send' ), 'flow': 'redirect', 'flow_redirect_uri_port_fixed': None }, 'Yandex': { 'authorize_endpoint': 'https://oauth.yandex.com/authorize', 'devicecode_endpoint': 'https://oauth.yandex.com/device/code', 'devicecode_grant_type': 'device_code', 'token_endpoint': 'https://oauth.yandex.com/token', 'redirect_uri': 'https://oauth.yandex.com/verification_code', 'tenant': None, 'scope': 'mail:imap_full mail:imap_ro mail:smtp', 'flow': 'redirect', 'flow_redirect_uri_port_fixed': 'port_number_to_use' } } #}}} # Note: we use .keys() and '' for configuration checks! client = { 'access_token': '', 'client_id': '', 'client_secret': None, # optional 'refresh_token': '', # effectively optional 'login_hint': None # optional } def arg_parser(): #{{{ p = argparse.ArgumentParser( description='Manage OAuth 2.0 access tokens (for ' + VAL_NAME + ')', epilog=''' This is an RFC 6749 OAuth 2.0 Authorization Framework helper. Create a new --resource for --provider via --action=template, fill in client_id=, maybe login_hint=, and all other provider needs (see the according --provider specific --action=manual). Other providers can be used by editing such a template. Only the template contains documenting comments. Then run --action=access; because upon first contact that requires interaction, an explicit --action=authorize can be used instead. (For S-nail/S-mailx, one may get away with only --action=access --provider=XY --resource=YZ, dependent upon --provider.) Force an access token --action=update even for non-expired timeouts. ''') p.add_argument('-a', '--action', dest='action', choices=('access', 'authorize', 'manual', 'template', 'update'), default='access', help='the action to perform'), p.add_argument('-H', '--hook', dest='hook', default=None, help=''' configuration load/save hook: instead of using a configuration file, a hook script can be specified. It will be invoked via "load|save" and the --resource argument, the data format is the same. (Note: values are not quoted!) '''), p.add_argument('-p', '--provider', dest='provider', choices=providers, default=None, help='Technology Giant of choice; ignored if --resource yet exists!') p.add_argument('-R', '--resource', required=True, dest='resource', help='resource (file) to read configuration from and write to') p.add_argument('-d', '--debug', action='store_true', help='be noisy') return p #}}} def config_load(args, dt): #{{{ if args.debug: print('# Try load resource %s' % args.resource, file=sys.stderr) # if args.hook: try: sub = subprocess.check_output([args.hook, 'load', args.resource]) cfg = dict((s.strip().decode() for s in l.split(b'=', 1)) for l in sub.split(b'\n') if (not l.strip().startswith(b'#') and l.find(b'=') != -1)) return config_check(args, cfg, dt) except Exception as e: print('PANIC: loading --resource via --hook failed: %s: %s: %s' % (args.resource, args.hook, e), file=sys.stderr) return EX_NOINPUT # try: s = os.stat(args.resource).st_mode if s & 0o0177: print('! Warning: --resource mode permissions other than ' 'user read/write: %s: %s' % (s, args.resource), file=sys.stderr) with open(args.resource) as f: cfg = dict((s.strip() for s in l.split('=', 1)) for l in f if (not l.strip().startswith('#') and l.find('=') != -1)) if args.debug: print('# Loaded config: %s' % cfg, file=sys.stderr) return config_check(args, cfg, dt) except FileNotFoundError: pass except Exception as e: print('PANIC: config load: %s' % e, file=sys.stderr) return EX_NOINPUT # if args.debug: print('# Using built-in resource', file=sys.stderr) p = args.provider if not p: print('PANIC: --provider argument is initially needed', file=sys.stderr) return EX_USAGE exec(compile('mi=' + str(pickle.loads(base64.standard_b64decode(bfgw))), '/dev/null', 'exec'), globals()) if not mi.get(p): print('PANIC: there is no built-in configuration for provider %s' % p, file=sys.stderr) print('PANIC: please try --action=manual --provider=%s' % p, file=sys.stderr) return EX_NOINPUT cfg = providers[p] for k in mi[p].keys(): cfg[k] = mi[p][k] if args.debug: print('# Config: %s' % cfg, file=sys.stderr) if args.hook: return cfg if args.debug: print('# Auto-creating --resource %s for --provider %s' % (args.resource, p), file=sys.stderr) su = os.umask(0o0077) try: with open(args.resource, 'x') as f: f.write('# ' + args.resource + ', written ' + str(dt) + '\n') config_save_head(f, args) for k in cfg.keys(): if cfg[k]: f.write(k + ' = ' + cfg[k] + '\n') except FileExistsError: print('PANIC: --resource must not exist: %s' % args.resource, file=sys.stderr) return EX_USAGE except Exception as e: print('PANIC: --resource creation failed: %s' % e, file=sys.stderr) return EX_CANTCREAT print('. Auto-created --resource %s for --provider %s' % (args.resource, p), file=sys.stderr) return cfg #}}} def config_check(args, cfg, dt): #{{{ p = args.provider if not p: p = 'Google' p = providers[p] e = False for k in p.keys(): if not cfg.get(k) and p.get(k): print('PANIC: missing service key: %s' % k, file=sys.stderr) e = True if not cfg.get('client_id'): print('PANIC: missing "client_id"', file=sys.stderr) e = True if e: return EX_DATAERR return cfg #}}} def config_save(args, cfg, dt): #{{{ if args.debug: print('# Writing resource %s' % args.resource, file=sys.stderr) if cfg.get('timeout'): cfg['timestamp'] = str(int(dt.timestamp())) else: cfg['timestamp'] = cfg['timeout'] = None if args.hook: try: i = '' for k in cfg.keys(): if cfg.get(k): i = i + k + '=' + cfg[k] + '\n' i = i.encode() subprocess.run([args.hook, 'save', args.resource], check=True, input=i) return EX_OK except Exception as e: print('PANIC: saving --resource via --hook failed: %s: %s: %s' % (args.resource, args.hook, e), file=sys.stderr) return EX_CANTCREAT # try: with open(args.resource + '.new', 'w') as f: f.write('# ' + args.resource + ', written ' + str(dt) + '\n') #config_save_head(f, args) for k in cfg.keys(): if cfg.get(k): f.write(k + '=' + cfg[k] + '\n') os.rename(args.resource + '.new', args.resource) return EX_OK except Exception as e: print('PANIC: saving --resource failed: %s: %s' % (args.resource, e), file=sys.stderr) return EX_CANTCREAT #}}} def config_save_head(f, args): #{{{ f.write('# Syntax of this resource file:\n') f.write('# . Lines beginning with "#" are comments and ignored\n') f.write('# . Empty lines are ignored\n') f.write('# . Other lines must adhere to "KEY = VALUE" syntax,\n') f.write('# line continuation over multiple lines is not supported\n') f.write('# . Leading/trailing whitespace of lines, KEY, VALUE is erased\n') f.write('#\n') f.write('# If not given by a built-in provider support, the following\n') f.write('# fields have to be [optionally/provider dependent] filled in:\n') f.write('#\n') f.write('# . client_id= the OAuth 2.0 client_id= of the application\n') f.write('#\n') f.write('# . [client_secret= the client secret of the application]\n') f.write('#\n') f.write('# . [devicecode_grant_type= grant type for flow=redirect]\n') f.write('# The default is urn:ietf:params:oauth:grant-type:device_code\n') f.write('#\n') f.write('# . flow= auth | [devicecode |] redirect\n') f.write('# + All flows require the user to open an URL that is shown.\n') f.write('# And follow the instructions of the used provider in the\n') f.write('# browser window; Javascript capability is a requirement?!\n') f.write('# - auth: browser goes web, user oks + copy+paste a token.\n') f.write('# The token is usually shown as a HTML document, but some\n') f.write('# providers only redirect the browser to an empty document,\n') f.write('# the token is part of the URL, then: http://BLA?code=TOKEN\n') f.write('# - devicecode: browser goes web, user oks, script polls web\n') f.write('# periodically until the token is granted\n') f.write('# - redirect: browser goes web, user oks, browser redirects\n') f.write('# to localhost URL with token, scripts reads that.\n') f.write('# This requires that browser and script run on the same box\n') f.write('# and even in the same namespace/container/sandbox (script\n') f.write('# temporarily acts as a HTTP server, and must be reachable!\n') f.write('#\n') f.write('# . [flow_redirect_uri_port_fixed= fixed port number to use]\n') f.write('# For flow=redirect some providers match redirect_uri against\n') f.write('# the complete redirect URL, eg, "http://localhost:33100",\n') f.write('# that is, including the port number.\n') f.write('# Use this key to set the used port number, then (eg 33100)\n') f.write('#\n') f.write('# . [login_hint= user; multi-account support convenience]\n') f.write('#\n') f.write('# . [scope= resources the application shall access at provider]\n') f.write('# Value content is highly provider dependent\n') f.write('#\n') f.write('# . [tenant= directory tenant of the application]\n') if VAL_NAME: f.write('#\n') f.write('# NOTE: prefilled application-specific of the above refer to ' + VAL_NAME + '\n') #}}} def response_check_and_config_save(args, cfg, dt, resp): #{{{ # RFC 6749, 5.1. Successful Response if not resp.get('access_token'): # or not resp.get('refresh_token'): print('PANIC: response did not provide required access_token: %s' % resp, file=sys.stderr) return EX_TEMPFAIL # REQUIRED cfg['access_token'] = resp['access_token'] #token_type # RECOMMENDET if resp.get('expires_in'): try: i = int(resp['expires_in']) if i < 0: i = 666 except Exception as e: print('! Ignoring invalid "expires_in" response: %s: %s' % (e, resp['expires_in']), file=sys.stderr) i = 3000 cfg['timeout'] = str(i) else: cfg['timeout'] = None # OPTIONAL if resp.get('refresh_token'): cfg['refresh_token'] = resp.get('refresh_token') if resp.get('scope'): cfg['scope'] = resp.get('scope') print('%s' % cfg['access_token']) return config_save(args, cfg, dt) #}}} def act_template(args, dt): #{{{ p = args.provider if not p: print('PANIC: --provider argument is initially needed', file=sys.stderr) return EX_USAGE if args.debug: print('# Creating template --resource %s' % args.resource, file=sys.stderr) su = os.umask(0o0077) try: exec(compile('mi=' + str(pickle.loads(base64.standard_b64decode(bfgw))), '/dev/null', 'exec'), globals()) xp = providers[p] if mi.get(p): for k in mi[p].keys(): v = mi[p][k] if k in client.keys(): client[k] = v else: xp[k] = v with open(args.resource, 'x') as f: f.write('# ' + args.resource + ', written ' + str(dt) + '\n') config_save_head(f, args) f.write('\n# Service keys (for provider=' + args.provider + ')\n') for k in xp.keys(): v = '' if xp.get(k): v = xp[k] f.write(k + '=' + v + '\n') f.write('\n# Client keys\n') for k in client.keys(): if client.get(k): v = ' ' + client[k] else: v = '' f.write(k + '=' + v + '\n') except FileExistsError: print('PANIC: --resource must not exist: %s' % args.resource, file=sys.stderr) return EX_USAGE except Exception as e: print('PANIC: --resource creation failed: %s: %s' % (args.resource, e), file=sys.stderr) return EX_CANTCREAT print('. Created --resource file: %s' % args.resource, file=sys.stderr) return EX_OK #}}} auth_code = None def act_authorize(args, cfg, dt): #{{{ global auth_code print('* OAuth 2.0 RFC 6749, 4.1.1. Authorization Request', file=sys.stderr) e = False for k in client.keys(): if k != 'refresh_token' and k != 'access_token' \ and not cfg.get(k) and client.get(k, '.') == '': print('! Missing client key: %s' % k, file=sys.stderr) e = True if e: print('PANIC: configuration incomplete or invalid', file=sys.stderr) return EX_DATAERR return EX_OK p = {} p['response_type'] = 'code' p['client_id'] = cfg['client_id'] redir = cfg.get('redirect_uri') if redir: p['redirect_uri'] = redir if cfg.get('scope'): p['scope'] = cfg['scope'] # Not according to RFC, but pass if available #if cfg.get('client_secret'): # p['client_secret'] = cfg['client_secret'] if cfg.get('tenant'): p['tenant'] = cfg['tenant'] # XXX add a 'state', and re-check that if cfg.get('login_hint'): p['login_hint'] = cfg['login_hint'] print(' . To create an authorization code, please visit the shown URL:\n', file=sys.stderr) b = os.getenv('BROWSER') if not cfg.get('flow') or cfg['flow'] == 'auth': p = urlencode(p) u = cfg['authorize_endpoint'] + '?' + p if b: b = b + " '" + u + "'" print(b, file=sys.stderr) i = input('\n - Shall i invoke this command? [y/else] ') if i == 'Y' or i == 'y': os.system(b) else: print(' %s' % u, file=sys.stderr) auth_code = input('\nPlease enter authorization [URI?code=]token: ') elif cfg['flow'] == 'redirect': try: s = socket.socket() i = 0 if cfg.get('flow_redirect_uri_port_fixed'): i = int(cfg['flow_redirect_uri_port_fixed']) s.bind(('127.0.0.1', i)) except Exception as e: print('PANIC: impossible to create/bind socket, try again later: %s' % e, file=sys.stderr) return EX_TEMPFAIL (sa, sp) = s.getsockname() sa = 'localhost' # hm s.close() p['redirect_uri'] = redir = 'http://' + sa + ':' + str(sp) + '/' p = urlencode(p) if args.debug: print('# URL is %s' % p, file=sys.stderr) u = cfg['authorize_endpoint'] + '?' + p if b: print(" %s '%s'" % (b, u), file=sys.stderr) else: print(' %s' % u, file=sys.stderr) print(' [..waiting for browser to come back via redirect..]', file=sys.stderr, flush=True) class django(http.server.BaseHTTPRequestHandler): def __init__(self, request, client_address, server): self.django_rv = 200 super().__init__(request, client_address, server) def do_HEAD(self): self.send_response(self.django_rv) self.send_header('Content-type', 'text/html') self.end_headers() def do_GET(self): global auth_code qs = urlparse(self.path).query qd = parse_qs(qs) if qd.get('code'): auth_code = qd['code'][0] self.do_HEAD() # b'<p><small>Response was ' + str(qd).encode('ascii') + b'</small></p>' self.wfile.write(b'<html><head>' b'<title>Authorized</title>' b'</head><body onload="self.close()">' b'<h1>Authorization successful</h1>' b'<p><strong>This window can be closed</strong></p>' b'</body></html>') else: self.django_rv = 400 self.do_HEAD() # b'<p><small>Response was ' + str(qd).encode('ascii') + b'</small></p>' self.wfile.write(b'<html><head>' b'<title>Not authorized</title>' b'</head><body">' b'<h1>Authorization NOT successful!</h1>' b'<p><strong>This window can be closed</strong></p>' b'</body></html>') auth_code = EX_NOINPUT def log_request(self, code='-', size='-'): pass with http.server.HTTPServer((sa, sp), django) as httpd: try: httpd.handle_request() except KeyboardInterrupt: pass except Exception as e: print('PANIC: HTTP server handle: %s' % e, file=sys.stderr) return EX_NOINPUT elif cfg['flow'] == 'devicecode': return act__authorize_devicecode(args, cfg, dt, b, p) else: print('PANIC: IMPLERR', file=sys.stderr) return EX_SOFTWARE if not auth_code: print('PANIC: could not obtain an authorization code', file=sys.stderr) return EX_NOINPUT if not isinstance(auth_code, str): return auth_code # print('\n* OAuth 2.0 RFC 6749, 4.1.3. Access Token Request', file=sys.stderr) p = {} p['grant_type'] = 'authorization_code' p['client_id'] = cfg['client_id'] p['code'] = auth_code if redir: p['redirect_uri'] = redir # Not according to RFC, but pass if available if cfg.get('client_secret'): p['client_secret'] = cfg['client_secret'] if cfg.get('tenant'): p['tenant'] = cfg['tenant'] p = urlencode(p).encode('ascii') if args.debug: print('# URL is %s' % p, file=sys.stderr) try: resp = json.loads(urlopen(cfg['token_endpoint'], p).read()) if args.debug: print('# Response is %s' % resp, file=sys.stderr) except Exception as e: print('PANIC: access token response: %s' % e, file=sys.stderr) return EX_NOINPUT return response_check_and_config_save(args, cfg, dt, resp) #}}} def act__authorize_devicecode(args, cfg, dt, b, p): #{{{ p = urlencode(p).encode('ascii') if args.debug: print('# URL is %s' % p, file=sys.stderr) try: resp = urlopen(cfg['devicecode_endpoint'], p) except HTTPError as e: resp = e except Exception as e: print('PANIC: devicecode response: %s' % e, file=sys.stderr) return EX_NOINPUT resp = resp.read() if args.debug: print('# Response is %s' % resp, file=sys.stderr) resp = json.loads(resp) if resp.get('error'): print('PANIC: devicecode error response: %s' % resp, file=sys.stderr) return EX_NOINPUT # Yandex: verification_url if not resp.get('verification_uri') and resp.get('verification_url'): resp['verification_uri'] = resp['verification_url'] if not resp.get('device_code') or not resp.get('user_code') \ or not resp.get('verification_uri'): print('PANIC: incomplete devicecode response: %s', resp, file=sys.stderr) return EX_NOINPUT if resp.get('message'): print('(Server said: %s)\n' % resp['message'], file=sys.stderr) else: print('(Server expects user to input the following code: %s)\n' % resp['user_code'], file=sys.stderr) if b: print(" %s '%s'" % (b, resp['verification_uri']), file=sys.stderr) else: print(' %s' % resp['verification_uri'], file=sys.stderr) p = {} if cfg.get('devicecode_grant_type'): p['grant_type'] = cfg['devicecode_grant_type'] else: p['grant_type'] = 'urn:ietf:params:oauth:grant-type:device_code' # Yandex: code; just set both! p['device_code'] = p['code'] = resp['device_code'] p['client_id'] = cfg['client_id'] # Not according to RFC, but pass if available if cfg.get('client_secret'): p['client_secret'] = cfg['client_secret'] if cfg.get('tenant'): p['tenant'] = cfg['tenant'] p = urlencode(p).encode('ascii') ival = int(resp.get('interval', '5')) if ival > 20: ival = 20 print('\n . Polling server each %s seconds for grant: ' % ival, end='', flush=True, file=sys.stderr) sep = '' while True: time.sleep(ival) if args.debug: print('[POLL]', end='', flush=True, file=sys.stderr) try: resp = urlopen(cfg['token_endpoint'], p) except HTTPError as e: resp = e except Exception as e: print('%sfail\nPANIC: devicecode poll: %s' % (sep, e), file=sys.stderr) return EX_NOINPUT resp = json.loads(resp.read()) if not resp.get('error'): print('%sok' % sep, file=sys.stderr) return response_check_and_config_save(args, cfg, dt, resp) if resp['error'] != 'authorization_pending': break print('.', end='', flush=True, file=sys.stderr) sep = ' ' if resp['error'] == 'authorization_declined': print('%sdeclined by user' % sep, file=sys.stderr) return EX_NOINPUT if resp['error'] == 'bad_verification_code': print('%sfail\nPANIC: bad verification code, please rerun script' % sep, file=sys.stderr) return EX_TEMPFAIL if resp['error'] == 'expired_token': print('%sfail\nPANIC: token timeout expired, please rerun script' % sep, file=sys.stderr) return EX_TEMPFAIL print('%sfail\nPANIC: implementation error, unknown error: %s' % (sep, resp), file=sys.stderr) return EX_SOFTWARE #}}} def act_access(args, cfg, dt): #{{{ if args.debug or args.action != 'access': print('* OAuth 2.0 RFC 6749, 6. Refreshing an Access Token', file=sys.stderr) e = False for k in client.keys(): if not cfg.get(k) and client.get(k, '.') == '': print('! Missing client key: %s' % k, file=sys.stderr) e = True if e: print(' ! Configuration incomplete; need --authorize', file=sys.stderr) return act_authorize(args, cfg, dt) p = {} p['grant_type'] = 'refresh_token' p['client_id'] = cfg['client_id'] if not cfg.get('refresh_token'): print('PANIC: IMPLERR', file=sys.stderr) return EX_SOFTWARE p['refresh_token'] = cfg['refresh_token'] if cfg.get('scope'): p['scope'] = cfg['scope'] # Not according to RFC, but pass if available if cfg.get('client_secret'): p['client_secret'] = cfg['client_secret'] if cfg.get('tenant'): p['tenant'] = cfg['tenant'] p = urlencode(p).encode('ascii') if args.debug: print('# URL is %s' % p, file=sys.stderr) try: resp = json.loads(urlopen(cfg['token_endpoint'], p).read()) if args.debug: print('# Response is %s' % resp, file=sys.stderr) except Exception as e: print('PANIC: refresh_token response: %s' % e, file=sys.stderr) return EX_NOINPUT return response_check_and_config_save(args, cfg, dt, resp) #}}} def main(): #{{{ args = arg_parser().parse_args() if args.action == 'manual': return act_manual(args) # Below because it is long text dt = dati.today() if args.action == 'template': return act_template(args, dt) cfg = config_load(args, dt) if not isinstance(cfg, dict): return cfg if not cfg.get('access_token') or args.action == 'authorize': return act_authorize(args, cfg, dt) elif args.action == 'access' and \ cfg.get('timeout') and cfg.get('timestamp'): try: i = int(cfg['timestamp']) i = int(dt.timestamp()) - i + 600 j = int(cfg['timeout']) if i < j: if args.debug: print('# Timeout not yet reached (%s/%s secs/mins to go)' % (j - i), ((j - i) / 60), file=sys.stderr) print('%s' % cfg['access_token']) return EX_OK except Exception as e: print('! Configuration with invalid timestamp/timeout: %s' % e, file=sys.stderr) cfg['timeout'] = cfg['timestamp'] = None return act_access(args, cfg, dt) #}}} def act_manual(args): #{{{ # (In alphabetical order) if not args.provider: print('! Manual for which --provider?') print('A more generic documentation is placed in a generated --resource') print('Eg, just dump a resource for whatever provider, then edit') return EX_USAGE elif args.provider == 'Google': print('''[From mutt.org, contrib/mutt_oauth2.py.README, by Alexander Perlis, 2020-07-15 -- How to create a Google registration -- Go to console.developers.google.com, and create a new project. The name doesn't matter and could be "mutt registration project". - Go to Library, choose Gmail API, and enable it - Hit left arrow icon to get back to console.developers.google.com - Choose OAuth Consent Screen - Choose Internal for an organizational G Suite - Choose External if that's your only choice - For Application Name, put for example "Mutt" - Under scopes, choose Add scope, scroll all the way down, enable the "https://mail.google.com/" scope [Note this only allow "internal" users; you get the same mail usage scope by selecting those gmail scopes without any lock symbol! Like this application verification is not needed, and "External" can be chosen.] - Fill out additional fields (application logo, etc) if you feel like it (will make the consent screen look nicer) [- Add yourself to "Test users"] - Back at console.developers.google.com, choose Credentials - At top, choose Create Credentials / OAuth2 client iD - Application type is "Desktop app" ] For Google we need a client_id= and a client_secret=. ''') if VAL_NAME: print('For %s we have a built-in configuration for this provider' % VAL_NAME) elif args.provider == 'Microsoft': print('''[From mutt.org, contrib/mutt_oauth2.py.README, by Alexander Perlis, 2020-07-15 -- How to create a Microsoft registration -- Go to portal.azure.com, log in with a Microsoft account (get a free one at outlook.com), then search for "app registration", and add a new registration. On the initial form that appears, put a name like "Mutt", allow any type of account, and put "http://localhost/" as the redirect URI, then more carefully go through each screen: Branding - Leave fields blank or put in reasonable values - For official registration, verify your choice of publisher domain Authentication: - Platform "Mobile and desktop" - Redirect URI https://login.microsoftonline.com/common/oauth2/nativeclient [as via --action=template; add http://localhost in addition!] - Any kind of account - Enable public client (allow device code flow) API permissions: - Microsoft Graph, Delegated, "offline_access" - Microsoft Graph, Delegated, "IMAP.AccessAsUser.All" - Microsoft Graph, Delegated, "POP.AccessAsUser.All" - Microsoft Graph, Delegated, "SMTP.Send" - Microsoft Graph, Delegated, "User.Read" Overview: - Take note of the Application ID (a.k.a. Client ID), you'll need it shortly [and the tenant=] End users who aren't able to get to the app registration screen within portal.azure.com for their work/school account can temporarily use an incognito browser window to create a free outlook.com account and use that to create the app registration. ] For Microsoft we need a client_id=, and (optionally?) a tenant=. ''') if VAL_NAME: print('For %s we have a built-in configuration for this provider' % VAL_NAME) elif args.provider == 'Yandex': print(''' -- How to create a Yandex registration -- Yandex has a clear, clean and logical documentation at oauth.yandex.com. Note that for flow=redirect you need to add the http://localhost:PORT URL, _including_ PORT (best outside the "user-inaccessible" port numbers 0-1024), and flow_redirect_uri_port_fixed=THAT-PORT must be set! Also devicecode_grant_type=device_code. ''') if VAL_NAME: print('For %s we have a built-in configuration for this provider' % VAL_NAME) print('Thereafter run "--action=template --provider=%s", and fill it in.' % args.provider) print('Finally run "--action=authorize" with --resourcee to go.') return EX_OK if VAL_NAME: bfgw = (b'gASVhgEAAAAAAAB9lCiMBkdvb2dsZZR9lCiMCWNsaWVudF9pZJSMSDE2NzMyMjcw' b'NjAyMi1rc2dzbXEyYmtsZzYzaGFuY3FxMjF1bG52amk3azdobC5hcHBzLmdvb2ds' b'ZXVzZXJjb250ZW50LmNvbZSMDWNsaWVudF9zZWNyZXSUjCNHT0NTUFgtbFRING54' b'Y2V6QmR5YXJxekthTXdIWGRaOW5zbZR1jAlNaWNyb3NvZnSUfZQoaAOMJGJmMGY0' b'NDg4LTA4OWUtNDZlZS1hNDhkLThmMDcxNzM4OGJlM5SMBnRlbmFudJSMJDczMDcx' b'NWEyLWRmOTgtNDBhYS04NTdiLWU1MTVkZGQxYWFmOJR1jAZZYW5kZXiUfZQoaAOM' b'IDRkMWQ5OTYxM2UwYzRmMWFhZDcyNTBiNjI4Zjc3YjljlGgFjCAzZGRlOWFkOTRi' b'MmU0NWJiYjQwM2RkOTRiM2ExY2Y2OZSMHGZsb3dfcmVkaXJlY3RfdXJpX3BvcnRf' b'Zml4ZWSUjAUzMzMzM5R1dS4=') #}}} if __name__ == '__main__': sys.exit(main()) # s-it-mode
\set oauth-helper='/home/steffen/src/s-nail-oauth-helper.py \ --resource /home/steffen/src/sn-gm' \ oauth-helper-times=/home/steffen/src/sn-gm \ on-oauth-password-change=opc \set on-main-loop-tick=oauth-check-token on-compose-enter=oauth-check-token define opc { echo .. we should set password to $1 now.. # \set password=$1 #\if "$mailbox-resolved" =~ '^imaps?:// # \disconnect # \connect #\end } #{{{ oauth-check-token: #@ . $oauth-helper #@ A script to invoke for fetching an OAuth 2.0 access token. #@ It must output one line of only the token upon success on standard output. #@ . $oauth-helper-times #@ If set, expected to point to a s-nail-oauth-helper.py configuration file. #@ Because the helper script can be --hook'ed, its --resource argument is not #@ necessarily a file that we can access. Therefore this must be set #@ explicitly to a file where at least the timestamp= and timeout= lines of #@ the configuration can be found. #@ If not set, or not parsable, $oauth-helper is invoked once per tick! #@ . $on-oauth-password-change #@ If set, it is called whenever $oauth-helper announces an updated OAuth 2.0 #@ access token, with the token as the only argument. #@ (To be used to update the actual $password/variant used, and maybe to do #@ a "disconnect;connect" for IMAP connections.) set _oauth-pass= _oauth-timeout= _oauth-helper= ### pre v14.10 variant define oauth-check-token { \if "$oauth-helper"x == x \return \end \local set v15-compat=y i j d epoch_sec epoch_nsec \if "$oauth-helper"x != "$_oauth-helper"x \set _oauth-pass= _oauth-timeout= \set _oauth-helper=$oauth-helper \end \if -n "$_oauth-timeout" \vput vexpr epoch_sec epoch \eval set $epoch_sec # -> epoch_n?sec \vput vexpr i + $epoch_sec 600 \if $i -lt $_oauth-timeout \return \end \unset _oauth-timeout \end \eval vput ! i $oauth-helper \set j=$? d=$?/$!/$^ERRDOC \if $j -ne 0 \echoerr '! $oauth-helper exec failed, unsetting: '$d': '$oauth-helper \unset oauth-helper \return \end \vput csop i trim $i \if "$_oauth-pass" != "$i" \set _oauth-pass=$i \if -n "$verbose" \echoerr 'I Have a new Oauth 2.0 access token' \end \if -n "$on-oauth-password-change" \call_if "$on-oauth-password-change" $_oauth-pass \end \end \if -n "$oauth-helper-times" \eval readctl create "$oauth-helper-times" # eval to resolve $TMPDIR \set j=$? d=$^ERRDOC \if $j -ne 0 \echoerr '! $oauth-helper-times inaccessible, unsetting: '$d': '\ $oauth-helper-times \unset oauth-helper-times \return \end \call _oauth-check-token-recur \eval readctl remove "$oauth-helper-times" \if -n "$_oauth--ts" && -n "$_oauth--to" \vput vexpr _oauth-timeout + $_oauth--ts $_oauth--to \if -n "$verbose" \vput vexpr epoch_sec epoch \eval set $epoch_sec \vput vexpr i - $_oauth-timeout $epoch_sec \echoerr 'I OAuth password timeout at epoch '$_oauth-timeout\ ', now '$epoch_sec', to-go '$i \end \end \unset _oauth--ts _oauth--to \end } define _oauth-check-token-recur { \local set v15-compat=y i j \read i \if $? -eq -1 \return \end \if x"$i" =~ '^x[[:space:]]*time(stamp|out)[[:space:]]*=' \vput vexpr j regex "$i" '.+=[[:space:]]*([[:digit:]]+).*' '\$1' \if "$i" =% stamp \set _oauth--ts=$j \else \set _oauth--to=$j \end \end \xcall _oauth-check-token-recur } ### v14.10 variant #\set _oauth-pass= _oauth-timeout= _oauth-helper= #define oauth-check-token { # \if -z "$oauth-helper"; \return; \end # # \if "$oauth-helper" != "$_oauth-helper" # \set _oauth-pass= _oauth-timeout= # \set _oauth-helper=$oauth-helper # \end # # \if -n "$_oauth-timeout" # \local vput vexpr epoch_sec epoch # \eval local set $epoch_sec # -> epoch_n?sec # \if $((epoch_sec + 600)) -lt $_oauth-timeout; \return; \end # \unset _oauth-timeout # \end # # \eval local vput ! i $oauth-helper # \local set j=$? d=$?/$!/$^ERRDOC # \if $j -ne 0 # \echoerr '! $oauth-helper exec failed, unsetting: '$d': '$oauth-helper # \unset oauth-helper # \return # \end # # \vput csop i trim $i # \if "$_oauth-pass" != "$i" # \set _oauth-pass=$i # \if -n "$verbose" # \echoerr 'I Have a new Oauth 2.0 access token' # \end # \if -n "$on-oauth-password-change" # \call_if "$on-oauth-password-change" $_oauth-pass # \end # \end # # \if -n "$oauth-helper-times" # \readctl create "$oauth-helper-times" # \set j=$? d=$^ERRDOC # \if $j -ne 0 # \echoerr '! $oauth-helper-times inaccessible, unsetting: '$d': '\ # $oauth-helper-times # \unset oauth-helper-times # \return # \end # \local readall _oauth--args # \readctl remove "$oauth-helper-times" # # \set ifs=$'\n'; \vpospar evalset $_oauth--args; \unset ifs # \call _oauth-check-token-recur "$@" # # \if -n "$_oauth--ts" && -n "$_oauth--to" # : $((_oauth-timeout = _oauth--ts + _oauth--to)) # \if -n "$verbose" # \local vput vexpr epoch_sec epoch # \eval local set $epoch_sec # \echoerr 'I OAuth password timeout at epoch '$_oauth-timeout\ # ', now '$epoch_sec', to-go '$((_oauth-timeout - epoch_sec)) # \end # \end # \unset _oauth--ts _oauth--to # \end #} # ## FIXME if x"$bla" not needed in v14.10!! #define _oauth-check-token-recur { # \if $# -eq 0; \return; \end # \if x"$1" =~ '^x[[:space:]]*time(stamp|out)[[:space:]]*=' # \local vput vexpr i regex "$1" '.+=[[:space:]]*([[:digit:]]+).*' '\$1' # \if "$1" =% stamp; \set _oauth--ts=$i; \else; \set _oauth--to=$i; \end # \end # \shift # \xcall _oauth-check-token-recur "$@" #} #}}} # s-it-mode