blob: 571693d2c39c8f552312f223932c9c69bca75c0f [file] [log] [blame]
#!/usr/bin/perl
# (C) Maxim Dounin
# Tests for nginx mail smtp module.
###############################################################################
use warnings;
use strict;
use Test::More tests => 28;
use File::Temp qw/ tempdir /;
use IO::Socket;
use MIME::Base64;
use constant CRLF => "\x0D\x0A";
select STDERR; $| = 1;
select STDOUT; $| = 1;
###############################################################################
# Create temp directory and run nginx instance.
my $tempdir = tempdir('nginx-test-XXXXXXXXXX', TMPDIR => 1, CLEANUP => 1)
or die "Can't create temp directory: $!\n";
my $pid = fork();
die "Unable to fork(): $!\n" unless defined $pid;
if ($pid == 0) {
exec('../nginx/objs/nginx', '-c', 'smtp.conf', '-g',
"pid $tempdir/nginx.pid; error_log $tempdir/nginx-error.log info;")
or die "Unable to exec(): $!\n";
print "# child after exec - not reached\n";
}
END {
# terminate nginx by SIGTERM
kill 15, $pid;
wait;
}
# Give nginx some time to start.
sleep 1;
###############################################################################
my $s = smtp_connect();
smtp_check(qr/^220 /, "greeting");
smtp_send('EHLO example.com');
smtp_check(qr/^250 /, "ehlo");
smtp_send('AUTH PLAIN ' . encode_base64("test\@example.com\0\0bad", ''));
smtp_check(qr/^5.. /, 'auth plain with bad password');
smtp_send('AUTH PLAIN ' . encode_base64("test\@example.com\0\0secret", ''));
smtp_ok('auth plain');
# We are talking to backend from this point
smtp_send('MAIL FROM:<test@example.com> SIZE=100');
smtp_ok('mail from after auth');
smtp_send('RSET');
smtp_ok('rset');
smtp_send('MAIL FROM:<test@xn--e1afmkfd.xn--80akhbyknj4f> SIZE=100');
smtp_ok("idn mail from (example.test in russian)");
smtp_send('QUIT');
smtp_ok("quit");
# Try auth plain with pipelining
$s = smtp_connect();
smtp_check(qr/^220 /, "greeting");
smtp_send('EHLO example.com');
smtp_check(qr/^250 /, "ehlo");
smtp_send('INVALID COMMAND WITH ARGUMENTS' . CRLF
. 'RSET');
smtp_read();
smtp_ok('pipelined rset after invalid command');
smtp_send('AUTH PLAIN '
. encode_base64("test\@example.com\0\0bad", '') . CRLF
. 'MAIL FROM:<test@example.com> SIZE=100');
smtp_read();
smtp_ok('mail from after failed pipelined auth');
smtp_send('AUTH PLAIN '
. encode_base64("test\@example.com\0\0secret", '') . CRLF
. 'MAIL FROM:<test@example.com> SIZE=100');
smtp_read();
smtp_ok('mail from after pipelined auth');
# Try auth none
$s = smtp_connect();
smtp_check(qr/^220 /, "greeting");
smtp_send('EHLO example.com');
smtp_check(qr/^250 /, "ehlo");
smtp_send('MAIL FROM:<test@example.com> SIZE=100');
smtp_ok('auth none - mail from');
smtp_send('RCPT TO:<test@example.com>');
smtp_ok('auth none - rcpt to');
smtp_send('RSET');
smtp_ok('auth none - rset, should go to backend');
# Auth none with pipelining
$s = smtp_connect();
smtp_check(qr/^220 /, "greeting");
smtp_send('EHLO example.com');
smtp_check(qr/^250 /, "ehlo");
smtp_send('MAIL FROM:<test@example.com> SIZE=100' . CRLF
. 'RCPT TO:<test@example.com>' . CRLF
. 'RSET');
smtp_ok('pipelined mail from');
smtp_ok('pipelined rcpt to');
smtp_ok('pipelined rset');
# Connection must stay even if error returned to rcpt to command
$s = smtp_connect();
smtp_read(); # skip greeting
smtp_send('EHLO example.com');
smtp_read(); # skip ehlo reply
smtp_send('MAIL FROM:<test@example.com> SIZE=100');
smtp_read(); # skip mail from reply
smtp_send('RCPT TO:<example.com>');
smtp_check(qr/^5.. /, "bad rcpt to");
smtp_send('RCPT TO:<test@example.com>');
smtp_ok('good rcpt to');
# Make sure command splitted into many packets processed correctly
$s = smtp_connect();
smtp_read();
log_out('HEL');
$s->print('HEL');
smtp_send('O example.com');
smtp_ok('splitted command');
# With smtp_greeting_delay session expected to be closed after first error
# message if client sent something before greeting. Use 10026 port
# configured with smtp_greeting_delay 0.1s to check this.
$s = smtp_connect(PeerPort => 10026);
smtp_send('HELO example.com');
smtp_check(qr/^5.. /, "command before greeting - session must be rejected");
ok($s->eof(), "session have to be closed");
###############################################################################
sub log_out {
my ($msg) = @_;
$msg =~ s/^/# >> /gm;
$msg .= "\n" unless $msg =~ /\n\Z/;
print $msg;
}
sub log_in {
my ($msg) = @_;
$msg =~ s/\x0d/\\x0d/gm;
$msg =~ s/\x0a/\\x0a/gm;
print '# << ' . $msg . "\n";
}
sub smtp_connect {
my $s = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => "localhost",
PeerPort => 10025,
@_
)
or die "Can't connect to nginx: $!\n";
$s->autoflush(1);
return $s;
}
sub smtp_send {
my ($cmd) = @_;
log_out($cmd);
$s->print($cmd . CRLF);
}
sub smtp_read {
my ($regex, $name) = @_;
eval {
alarm(2);
local $SIG{ALRM} = sub { die "alarm\n" };
while (<$s>) {
log_in($_);
next if m/^\d\d\d-/;
last;
}
alarm(0);
};
alarm(0);
if ($@) {
return undef;
}
return $_;
}
sub smtp_check {
my ($regex, $name) = @_;
like(smtp_read(), $regex, $name);
}
sub smtp_ok {
smtp_check(qr/^2\d\d /, @_);
}
###############################################################################