Mercurial > hg > nginx-tests
view mail_imap.t @ 1995:d329b05e20fa
Tests: removed usage of "cat" and "grep" in tests.
Both "cat" and "grep" might not be available on Windows. Instead,
$t->read_file() is used, as it is already used in other places. To
simplify checking logs as previously done with "grep", $t->grep_file()
helper function is introduced.
author | Maxim Dounin <mdounin@mdounin.ru> |
---|---|
date | Fri, 09 Aug 2024 05:18:51 +0300 |
parents | 81519d01f238 |
children |
line wrap: on
line source
#!/usr/bin/perl # (C) Maxim Dounin # Tests for nginx mail imap module. ############################################################################### use warnings; use strict; use Test::More; use MIME::Base64; use Socket qw/ CRLF /; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; use Test::Nginx::IMAP; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; local $SIG{PIPE} = 'IGNORE'; my $t = Test::Nginx->new()->has(qw/mail imap http rewrite/) ->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } mail { proxy_pass_error_message on; proxy_timeout 15s; auth_http http://127.0.0.1:8080/mail/auth; server { listen 127.0.0.1:8143; protocol imap; imap_auth plain cram-md5 external; } } http { %%TEST_GLOBALS_HTTP%% server { listen 127.0.0.1:8080; server_name localhost; location = /mail/auth { set $reply ERROR; set $passw ""; set $userpass "$http_auth_user:$http_auth_pass"; if ($userpass = 'test@example.com:secret') { set $reply OK; } if ($userpass = 'te\\"st@example.com:se\\"cret') { set $reply OK; } set $userpass "$http_auth_user:$http_auth_salt:$http_auth_pass"; if ($userpass ~ '^test@example.com:<.*@.*>:0{32}$') { set $reply OK; set $passw secret; } set $userpass "$http_auth_method:$http_auth_user:$http_auth_pass"; if ($userpass = 'external:test@example.com:') { set $reply OK; set $passw secret; } add_header Auth-Status $reply; add_header Auth-Server 127.0.0.1; add_header Auth-Port %%PORT_8144%%; add_header Auth-Pass $passw; add_header Auth-Wait 1; return 204; } } } EOF $t->run_daemon(\&Test::Nginx::IMAP::imap_test_daemon); $t->run()->plan(30); $t->waitforsocket('127.0.0.1:' . port(8144)); ############################################################################### # login my $s = Test::Nginx::IMAP->new(); $s->ok('greeting'); $s->send('a01 LOGIN'); $s->check(qr/^a01 BAD/, 'login without arguments'); $s->send('a02 LOGIN test@example.com bad'); $s->check(qr/^a02 NO/, 'login with bad password'); $s->send('a03 LOGIN test@example.com secret'); $s->ok('login'); # auth $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE'); $s->check(qr/^\S+ BAD/, 'auth without arguments'); # auth plain $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0bad", '')); $s->check(qr/^\S+ NO/, 'auth plain with bad password'); $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0secret", '')); $s->ok('auth plain'); # auth login simple $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE LOGIN'); $s->check(qr/\+ VXNlcm5hbWU6/, 'auth login username challenge'); $s->send(encode_base64('test@example.com', '')); $s->check(qr/\+ UGFzc3dvcmQ6/, 'auth login password challenge'); $s->send(encode_base64('secret', '')); $s->ok('auth login simple'); # auth login with username $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE LOGIN ' . encode_base64('test@example.com', '')); $s->check(qr/\+ UGFzc3dvcmQ6/, 'auth login with username password challenge'); $s->send(encode_base64('secret', '')); $s->ok('auth login with username'); # auth cram-md5 $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE CRAM-MD5'); $s->check(qr/\+ /, 'auth cram-md5 challenge'); $s->send(encode_base64('test@example.com ' . ('0' x 32), '')); $s->ok('auth cram-md5'); # auth external $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL'); $s->check(qr/\+ VXNlcm5hbWU6/, 'auth external challenge'); $s->send(encode_base64('test@example.com', '')); $s->ok('auth external'); # auth external with username $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL ' . encode_base64('test@example.com', '')); $s->ok('auth external with username'); # auth external after failed plain TODO: { local $TODO = 'not yet' unless $t->has_version('1.27.1'); $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0bad", '')); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL ' . encode_base64('test@example.com', '')); $s->ok('auth external after plain'); } # quoted strings $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN "te\\\\\"st@example.com" "se\\\\\"cret"'); $s->ok('quoted strings'); # literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18}'); $s->check(qr/\+ /, 'login username literal continue'); $s->send('te\"st@example.com' . ' {8}'); $s->check(qr/\+ /, 'login password literal continue'); $s->send('se\"cret'); $s->ok('login literals'); # non-synchronizing literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18+}' . CRLF . 'te\"st@example.com' . ' {8+}' . CRLF . 'se\"cret'); $s->ok('login non-sync literals'); # backslash in quotes and literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18+}' . CRLF . 'te\"st@example.com' . ' "se\\\\\"cret"'); $s->ok('backslash in literal'); # pipelining $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 INVALID COMMAND WITH ARGUMENTS' . CRLF . 'a02 NOOP'); $s->check(qr/^a01 BAD/, 'pipelined invalid command'); $s->ok('pipelined noop after invalid command'); $s->send('a03 FOOBAR {10+}' . CRLF . 'test test ' . CRLF . 'a04 NOOP'); $s->check(qr/^a03 BAD/, 'invalid with non-sync literal'); $s->check(qr/^(a04 |$)/, 'literal not command'); # skipped without a fix, since with level-triggered event methods # this hogs cpu till the connection is closed by the backend server, # and generates a lot of debug logs $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN test@example.com secret' . CRLF . 'a02 LOGOUT'); $s->ok('pipelined login'); $s->ok('pipelined logout'); ###############################################################################