maimail-tcp-socket
v2.0.2
Published
This shim brings the W3C Raw Socket API to node.js and Chromium. Its purpose is to enable apps to use the same api in Firefox OS, Chrome OS, and on the server.
Downloads
11
Readme
tcp-socket
DEPRECATION NOTICE
This project is not actively being maintained. If you're sending emails on a node.js-esque platform, please use Andris Reinman's nodemailer. It is actively supported, more widely used and maintained offers more possibilities for sending mails than this project.
Background: This project was created because there was no option of using SMTP in a browser environment. This use case has been eliminated since Chrome Apps reached end of life and Firefox OS was scrapped. If you're on an electron-based platform, please use the capabilities that come with a full fledged node.js backend.
If you still feel this project has merit and you would like to be a maintainer, please reach out to me.
This shim brings Mozilla-flavored version of the Raw Socket API to node.js, Chromium apps, Windows 10 UWP apps, and websockets (via socket.io).
NB: Chrome Apps are going away, hence the Chrome socket implementation can be regarded as obsolete.
https://github.com/emailjs/emailjs-imap-client/issues/158 https://blog.chromium.org/2016/08/from-chrome-apps-to-web.html https://github.com/MobileChromeApps/mobile-chrome-apps/issues/269
Usage
npm install --save emailjs-tcp-socket
import TCPSocket from 'emailjs-tcp-socket'
See also the Mozilla TCPSocket API Documentation.
#open
var tcpSocket = TCPSocket.open('127.0.0.1', 8000);
var tlsSocket = TCPSocket.open('127.0.0.1', 9000, {
useSecureTransport: true,
ca: 'PEM-formatted X.509 TLS Cert'
});
A call to TCPSocket.open
expects host and port, followed by further socket options:
- useSecureTransport:
true
for TLS encryption,false
for plaintext sockets. Defaults tofalse
. - ca: Enables certificate pinning for platforms without native TLS implementations. Expects a PEM-encoded X.509 TLS certificate as a string.
#upgradeToSecure()
Established a secure channel via TLS. The upgradeToSecure method allows turning a TCP non secured connection into a secured one. upgradeToSecure()
will return immediately. If the TLS negotiation fails, the socket will throw an error and close. The socket buffers writes that occur in the meantime and writes the data out altogether when the TLS handshake is done. If this behavior is a problem in your protocol, please open an issue and/or submit a PR.
A note on native TLS: Native TLS support is varying throughout the platforms. If you want to use TLS on a platform that does not natively provide it, we fall back to forge for TLS, and you must provide a certificate for pinning!
The following platforms support TLS natively:
- node.js and related (e.g. Electron)
- Desktop Chrome Apps on Chrome M38+ with TLS connection (not STARTTLS!)
- Windows StreamSocket
The following implementations use forge as a TLS shim:
- WebSockets
- Chrome Apps with STARTTLS and Mobile Chrome Apps built with cca (chrome.sockets.tcp.secure is broken)
On a platform where we fall back to forge for TLS, you can either supply the socket with a certificate, or use a trust-on-first-use based approach, where the socket is accepted in the first try and you will receive a callback with the certificate. Use this certificate in subsequent interactions with this host. Host authenticity is evaluated based on their Common Name (or SubjectAltNames) and the certificate's public key fingerprint.
var tls = navigator.TCPSocket.open('127.0.0.1', 9000, { useSecureTransport: true })
tls.oncert = pemEncodedCertificate => {} // do something useful with the certificate, e.g. store it and reuse it on a trust-on-first-use basis
Here's how the TLS shim will behave when presented with a server certificate:
- If the server does not present a certificate, it rejects the connection
- If the server presents a certificate with wrong/missing CN and/or wrong/missing SANs, it rejects the connection
- If no certificate was pinned, it calls .oncert() with the pem-encoded certificate and accepts the connection
- If a certificate was pinned, but the server presents another certificate (according to the public key fingerprint), it calls .oncert() to inform you about changes, but rejects the connection
- If a certificate was pinned and the server certificate's public key fingerprint matches the pinned certificate, the connection is accepted. .oncert will not be called in this case!
Please note that we can not synchronously ask whether that certificate is ok or not, since the TLS shim runs in a Web Worker.
#close()
socket.close()
Closes the connection, invokes .onclose
when socket is closed.
#send(data)
socket.send(data)
Send an ArrayBuffer across the network. Backpressure is handled in the actual underlying socket implementations.
Events
socket.onopen = () => {} // A handler for the open event. After this event, the socket is ready to send and receive data.
socket.ondrain = () => {} // A handler for the drain event. This event is triggered each time the buffer of data is flushed.
socket.onerror = (error) => {} // A handler for the error event.
socket.ondata = (arraybuffer) => {} // A handler for the data event. This event is triggered each time data has been received.
socket.onclose = () => {} // A handler for the close event.
Web Sockets
Run the websocket proxy (socket.io + express) to use TCPSocket straight from the browser. Please note that there is a good reason for TCP sockets to not be avaiable in the open web. Handle this with extreme care. The WebSocket shim adds a new configuration object ws
to TCPSocket.open
- url is the url for the WebSocket proxy server (defaults to '/')
- options are Socket.io options
var socket = TCPSocket.open('127.0.0.1', 9000, {
...
ws: {
url: 'http://localhost:8889',
options: {
upgrade: false
}
}
})
Unavailable API
The following API is not available with this shim:
- #listen
- #resume
- #suspend
License
This library is licensed under the MIT license.
Copyright (c) 2014 Whiteout Networks
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.