Mercurial > hg > nginx-tests
view mail_imap.t @ 1689:dbd19195df8a
Tests: adjusted mail_smtp.t "long pipelined" TODO.
Prior to fixed reading with fully filled buffer in 2851e4c7de03 (1.21.0),
test for long pipelined commands leads to connection close by nginx, which
can result in RST and no response seen by the client, notably on win32.
While here, cleaned up permitted smtp_auth methods in that particular server.
author | Sergey Kandaurov <pluknet@nginx.com> |
---|---|
date | Mon, 24 May 2021 22:09:54 +0300 |
parents | 156cb84b3c23 |
children | 2a0a6035a1af |
line wrap: on
line source
#!/usr/bin/perl # (C) Maxim Dounin # Tests for nginx mail imap module. ############################################################################### use warnings; use strict; use Test::More; use MIME::Base64; use Socket qw/ CRLF /; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; use Test::Nginx::IMAP; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; local $SIG{PIPE} = 'IGNORE'; my $t = Test::Nginx->new()->has(qw/mail imap http rewrite/) ->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } mail { proxy_pass_error_message on; proxy_timeout 15s; auth_http http://127.0.0.1:8080/mail/auth; server { listen 127.0.0.1:8143; protocol imap; imap_auth plain cram-md5 external; } } http { %%TEST_GLOBALS_HTTP%% server { listen 127.0.0.1:8080; server_name localhost; location = /mail/auth { set $reply ERROR; set $passw ""; set $userpass "$http_auth_user:$http_auth_pass"; if ($userpass = 'test@example.com:secret') { set $reply OK; } if ($userpass = 'te\\"st@example.com:se\\"cret') { set $reply OK; } set $userpass "$http_auth_user:$http_auth_salt:$http_auth_pass"; if ($userpass ~ '^test@example.com:<.*@.*>:0{32}$') { set $reply OK; set $passw secret; } set $userpass "$http_auth_method:$http_auth_user:$http_auth_pass"; if ($userpass = 'external:test@example.com:') { set $reply OK; set $passw secret; } add_header Auth-Status $reply; add_header Auth-Server 127.0.0.1; add_header Auth-Port %%PORT_8144%%; add_header Auth-Pass $passw; add_header Auth-Wait 1; return 204; } } } EOF $t->run_daemon(\&Test::Nginx::IMAP::imap_test_daemon); $t->run()->plan(29); $t->waitforsocket('127.0.0.1:' . port(8144)); ############################################################################### # login my $s = Test::Nginx::IMAP->new(); $s->ok('greeting'); $s->send('a01 LOGIN'); $s->check(qr/^a01 BAD/, 'login without arguments'); $s->send('a02 LOGIN test@example.com bad'); $s->check(qr/^a02 NO/, 'login with bad password'); $s->send('a03 LOGIN test@example.com secret'); $s->ok('login'); # auth $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE'); $s->check(qr/^\S+ BAD/, 'auth without arguments'); # auth plain $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0bad", '')); $s->check(qr/^\S+ NO/, 'auth plain with bad password'); $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0secret", '')); $s->ok('auth plain'); # auth login simple $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE LOGIN'); $s->check(qr/\+ VXNlcm5hbWU6/, 'auth login username challenge'); $s->send(encode_base64('test@example.com', '')); $s->check(qr/\+ UGFzc3dvcmQ6/, 'auth login password challenge'); $s->send(encode_base64('secret', '')); $s->ok('auth login simple'); # auth login with username $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE LOGIN ' . encode_base64('test@example.com', '')); $s->check(qr/\+ UGFzc3dvcmQ6/, 'auth login with username password challenge'); $s->send(encode_base64('secret', '')); $s->ok('auth login with username'); # auth cram-md5 $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE CRAM-MD5'); $s->check(qr/\+ /, 'auth cram-md5 challenge'); $s->send(encode_base64('test@example.com ' . ('0' x 32), '')); $s->ok('auth cram-md5'); # auth external $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL'); $s->check(qr/\+ VXNlcm5hbWU6/, 'auth external challenge'); $s->send(encode_base64('test@example.com', '')); $s->ok('auth external'); # auth external with username $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL ' . encode_base64('test@example.com', '')); $s->ok('auth external with username'); # quoted strings $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN "te\\\\\"st@example.com" "se\\\\\"cret"'); $s->ok('quoted strings'); # literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18}'); $s->check(qr/\+ /, 'login username literal continue'); $s->send('te\"st@example.com' . ' {8}'); $s->check(qr/\+ /, 'login password literal continue'); $s->send('se\"cret'); $s->ok('login literals'); # non-synchronizing literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18+}' . CRLF . 'te\"st@example.com' . ' {8+}' . CRLF . 'se\"cret'); $s->ok('login non-sync literals'); # backslash in quotes and literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18+}' . CRLF . 'te\"st@example.com' . ' "se\\\\\"cret"'); TODO: { local $TODO = 'not yet' unless $t->has_version('1.21.0'); $s->ok('backslash in literal'); } # pipelining $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 INVALID COMMAND WITH ARGUMENTS' . CRLF . 'a02 NOOP'); $s->check(qr/^a01 BAD/, 'pipelined invalid command'); TODO: { local $TODO = 'not yet' unless $t->has_version('1.21.0'); $s->ok('pipelined noop after invalid command'); } $s->send('a03 FOOBAR {10+}' . CRLF . 'test test ' . CRLF . 'a04 NOOP'); $s->check(qr/^a03 BAD/, 'invalid with non-sync literal'); $s->check(qr/^(a04 |$)/, 'literal not command'); TODO: { todo_skip('not yet', 2) unless $t->has_version('1.21.0'); # skipped without a fix, since with level-triggered event methods # this hogs cpu till the connection is closed by the backend server, # and generates a lot of debug logs $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN test@example.com secret' . CRLF . 'a02 LOGOUT'); $s->ok('pipelined login'); $s->ok('pipelined logout'); } ###############################################################################