From 1dcb11643c783096e1b52bf48d6b76121504e6bd Mon Sep 17 00:00:00 2001 From: Alex Auvolat Date: Thu, 19 May 2022 15:14:36 +0200 Subject: CLI skeleton --- src/main.rs | 224 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 214 insertions(+), 10 deletions(-) (limited to 'src/main.rs') diff --git a/src/main.rs b/src/main.rs index ca66137..cf26ae1 100644 --- a/src/main.rs +++ b/src/main.rs @@ -3,32 +3,236 @@ mod config; mod cryptoblob; mod login; mod mailbox; +mod server; mod time; mod uidindex; -mod server; -use anyhow::{bail, Result}; +use std::path::PathBuf; use std::sync::Arc; +use anyhow::{bail, Result}; +use clap::{Parser, Subcommand}; +use rand::prelude::*; + use rusoto_signature::Region; use config::*; +use cryptoblob::*; use login::{ldap_provider::*, static_provider::*, *}; use mailbox::Mailbox; use server::Server; +#[derive(Parser, Debug)] +#[clap(author, version, about, long_about = None)] +struct Args { + #[clap(subcommand)] + command: Command, +} + +#[derive(Subcommand, Debug)] +enum Command { + /// Runs the IMAP+LMTP server daemon + Server { + #[clap(short, long, env = "CONFIG_FILE", default_value = "mailrage.toml")] + config_file: PathBuf, + }, + /// Initializes key pairs for a user and adds a key decryption password + FirstLogin { + #[clap(flatten)] + creds: StorageCredsArgs, + }, + /// Initializes key pairs for a user and dumps keys to stdout for usage with static + /// login provider + InitializeLocalKeys { + #[clap(flatten)] + creds: StorageCredsArgs, + }, + /// Adds a key decryption password for a user + AddPassword { + #[clap(flatten)] + creds: StorageCredsArgs, + /// Automatically generate password + #[clap(short, long)] + gen: bool, + }, + /// Deletes a key decription password for a user + DeletePassword { + #[clap(flatten)] + creds: StorageCredsArgs, + /// Allow to delete all passwords + #[clap(long)] + allow_delete_all: bool, + }, + /// Dumps all encryption keys for user + ShowKeys { + #[clap(flatten)] + creds: StorageCredsArgs, + }, +} + +#[derive(Parser, Debug)] +struct StorageCredsArgs { + /// Name of the region to use + #[clap(short = 'r', long, env = "AWS_REGION")] + region: String, + /// Url of the endpoint to connect to for K2V + #[clap(short = 'k', long, env = "K2V_ENDPOINT")] + k2v_endpoint: String, + /// Url of the endpoint to connect to for S3 + #[clap(short = 's', long, env = "S3_ENDPOINT")] + s3_endpoint: String, + /// Access key ID + #[clap(short = 'A', long, env = "AWS_ACCESS_KEY_ID")] + aws_access_key_id: String, + /// Access key ID + #[clap(short = 'S', long, env = "AWS_SECRET_ACCESS_KEY")] + aws_secret_access_key: String, + /// Bucket name + #[clap(short = 'b', long, env = "BUCKET")] + bucket: String, +} + #[tokio::main] -async fn main() { - if let Err(e) = main2().await { - eprintln!("Error: {}", e); - std::process::exit(1); +async fn main() -> Result<()> { + let args = Args::parse(); + + match args.command { + Command::Server { config_file } => { + let config = read_config(config_file)?; + + let server = Server::new(config)?; + server.run().await?; + } + Command::FirstLogin { creds } => { + let creds = make_storage_creds(creds); + + println!("Please enter your password for key decryption."); + println!("If you are using LDAP login, this must be your LDAP password."); + println!("If you are using the static login provider, enter any password, and this will also become your password for local IMAP access."); + let password = rpassword::prompt_password("Enter password: ")?; + let password_confirm = rpassword::prompt_password("Confirm password: ")?; + if password != password_confirm { + bail!("Passwords don't match."); + } + + CryptoKeys::init(&creds, &password).await?; + + println!(""); + println!("Cryptographic key setup is complete."); + println!(""); + println!("If you are using the static login provider, add the following section to your .toml configuration file:"); + println!(""); + dump_config(&password, &creds); + } + Command::InitializeLocalKeys { creds } => { + let creds = make_storage_creds(creds); + + println!("Please enter a password for local IMAP access."); + println!("This password is not used for key decryption, your keys will be printed below (do not lose them!)"); + println!( + "If you plan on using LDAP login, stop right here and use `first-login` instead" + ); + let password = rpassword::prompt_password("Enter password: ")?; + let password_confirm = rpassword::prompt_password("Confirm password: ")?; + if password != password_confirm { + bail!("Passwords don't match."); + } + + let master = gen_key(); + let (_, secret) = gen_keypair(); + let keys = CryptoKeys::init_without_password(&creds, &master, &secret).await?; + + println!(""); + println!("Cryptographic key setup is complete."); + println!(""); + println!("Add the following section to your .toml configuration file:"); + println!(""); + dump_config(&password, &creds); + dump_keys(&keys); + } + Command::AddPassword { creds, gen } => { + let creds = make_storage_creds(creds); + let existing_password = + rpassword::prompt_password("Enter existing password to decrypt keys: ")?; + let new_password = if gen { + let password = base64::encode(&u128::to_be_bytes(thread_rng().gen())[..10]); + println!("Your new password: {}", password); + println!("Keep it safe!"); + password + } else { + let password = rpassword::prompt_password("Enter new password: ")?; + let password_confirm = rpassword::prompt_password("Confirm new password: ")?; + if password != password_confirm { + bail!("Passwords don't match."); + } + password + }; + + let keys = CryptoKeys::open(&creds, &existing_password).await?; + keys.add_password(&creds, &new_password).await?; + println!(""); + println!("New password added successfully."); + } + Command::DeletePassword { + creds, + allow_delete_all, + } => { + let creds = make_storage_creds(creds); + let existing_password = rpassword::prompt_password("Enter password to delete: ")?; + + let keys = CryptoKeys::open(&creds, &existing_password).await?; + keys.delete_password(&creds, &existing_password, allow_delete_all) + .await?; + + println!(""); + println!("Password was deleted successfully."); + + if allow_delete_all { + println!("As a reminder, here are your cryptographic keys:"); + dump_keys(&keys); + } + } + Command::ShowKeys { creds } => { + let creds = make_storage_creds(creds); + let existing_password = rpassword::prompt_password("Enter key decryption password: ")?; + + let keys = CryptoKeys::open(&creds, &existing_password).await?; + dump_keys(&keys); + } } + + Ok(()) } -async fn main2() -> Result<()> { - let config = read_config("mailrage.toml".into())?; +fn make_storage_creds(c: StorageCredsArgs) -> StorageCredentials { + let s3_region = Region::Custom { + name: c.region.clone(), + endpoint: c.s3_endpoint, + }; + let k2v_region = Region::Custom { + name: c.region, + endpoint: c.k2v_endpoint, + }; + StorageCredentials { + k2v_region, + s3_region, + aws_access_key_id: c.aws_access_key_id, + aws_secret_access_key: c.aws_secret_access_key, + bucket: c.bucket, + } +} - let server = Server::new(config)?; - server.run().await +fn dump_config(password: &str, creds: &StorageCredentials) { + println!("[login_static.users.]"); + println!("password = \"{}\"", hash_password(password)); //TODO + println!("aws_access_key_id = \"{}\"", creds.aws_access_key_id); + println!( + "aws_secret_access_key = \"{}\"", + creds.aws_secret_access_key + ); } +fn dump_keys(keys: &CryptoKeys) { + println!("master_key = \"{}\"", base64::encode(&keys.master)); + println!("secret_key = \"{}\"", base64::encode(&keys.secret)); +} -- cgit v1.2.3