/* Maddy Mail Server - Composable all-in-one email server. Copyright © 2019-2020 Max Mazurov , Maddy Mail Server contributors This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ package smtp_downstream import ( "errors" "flag" "math/rand" "os" "strconv" "testing" "github.com/emersion/go-smtp" "github.com/foxcpp/maddy/framework/config" "github.com/foxcpp/maddy/framework/exterrors" "github.com/foxcpp/maddy/internal/testutils" ) var testPort string func TestDownstreamDelivery(t *testing.T) { be, srv := testutils.SMTPServer(t, "127.0.0.1:"+testPort) defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) tarpit := testutils.FailOnConn(t, "127.0.0.2:"+testPort) defer tarpit.Close() mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, { Scheme: "tcp", Host: "127.0.0.2", Port: testPort, }, }, log: testutils.Logger(t, "target.smtp"), } testutils.DoTestDelivery(t, mod, "test@example.invalid", []string{"rcpt@example.invalid"}) be.CheckMsg(t, 0, "test@example.invalid", []string{"rcpt@example.invalid"}) } func TestDownstreamDelivery_LMTP(t *testing.T) { be, srv := testutils.SMTPServer(t, "127.0.0.1:"+testPort, func(srv *smtp.Server) { srv.LMTP = true }) be.LMTPDataErr = []error{ nil, &smtp.SMTPError{ Code: 501, Message: "nop", }, } defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, }, modName: "target.lmtp", lmtp: true, log: testutils.Logger(t, "lmtp_downstream"), } sc := make(statusCollector) testutils.DoTestDeliveryNonAtomic(t, &sc, mod, "test@example.invalid", []string{"rcpt1@example.invalid", "rcpt2@example.invalid"}) be.CheckMsg(t, 0, "test@example.invalid", []string{"rcpt1@example.invalid", "rcpt2@example.invalid"}) if len(sc) != 2 { t.Fatal("Two statuses should be set") } if err := sc["rcpt1@example.invalid"]; err != nil { t.Fatal("Unexpected error for rcpt1:", err) } if sc["rcpt2@example.invalid"] == nil { t.Fatal("Expected an error for rcpt2") } var rcptErr *exterrors.SMTPError if !errors.As(sc["rcpt2@example.invalid"], &rcptErr) { t.Fatalf("Not SMTPError: %T", rcptErr) } if rcptErr.Code != 501 { t.Fatal("Wrong SMTP code:", rcptErr.Code) } } func TestDownstreamDelivery_LMTP_ErrorCoerce(t *testing.T) { be, srv := testutils.SMTPServer(t, "127.0.0.1:"+testPort, func(srv *smtp.Server) { srv.LMTP = true }) be.LMTPDataErr = []error{ nil, &smtp.SMTPError{ Code: 501, Message: "nop", }, } defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, }, modName: "target.lmtp", lmtp: true, log: testutils.Logger(t, "lmtp_downstream"), } _, err := testutils.DoTestDeliveryErr(t, mod, "test@example.invalid", []string{"rcpt1@example.invalid", "rcpt2@example.invalid"}) if err == nil { t.Error("expected failure") } } type statusCollector map[string]error func (sc *statusCollector) SetStatus(rcptTo string, err error) { (*sc)[rcptTo] = err } func TestDownstreamDelivery_Fallback(t *testing.T) { be, srv := testutils.SMTPServer(t, "127.0.0.2:"+testPort) defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, { Scheme: "tcp", Host: "127.0.0.2", Port: testPort, }, }, log: testutils.Logger(t, "target.smtp"), } testutils.DoTestDelivery(t, mod, "test@example.invalid", []string{"rcpt@example.invalid"}) be.CheckMsg(t, 0, "test@example.invalid", []string{"rcpt@example.invalid"}) } func TestDownstreamDelivery_MAILErr(t *testing.T) { be, srv := testutils.SMTPServer(t, "127.0.0.1:"+testPort) defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) be.MailErr = &smtp.SMTPError{ Code: 550, EnhancedCode: smtp.EnhancedCode{5, 1, 2}, Message: "Hey", } mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, }, log: testutils.Logger(t, "target.smtp"), } _, err := testutils.DoTestDeliveryErr(t, mod, "test@example.invalid", []string{"rcpt@example.invalid"}) testutils.CheckSMTPErr(t, err, 550, exterrors.EnhancedCode{5, 1, 2}, "Hey") } func TestDownstreamDelivery_StartTLS(t *testing.T) { clientCfg, be, srv := testutils.SMTPServerSTARTTLS(t, "127.0.0.1:"+testPort) defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, }, tlsConfig: clientCfg.Clone(), starttls: true, log: testutils.Logger(t, "target.smtp"), } testutils.DoTestDelivery(t, mod, "test@example.invalid", []string{"rcpt@example.invalid"}) be.CheckMsg(t, 0, "test@example.invalid", []string{"rcpt@example.invalid"}) tlsState, ok := be.Messages[0].Conn.TLSConnectionState() if !ok || !tlsState.HandshakeComplete { t.Fatal("Message was not delivered over TLS") } } func TestDownstreamDelivery_StartTLS_NoFallback(t *testing.T) { _, srv := testutils.SMTPServer(t, "127.0.0.1:"+testPort) defer srv.Close() defer testutils.CheckSMTPConnLeak(t, srv) mod := &Downstream{ hostname: "mx.example.invalid", endpoints: []config.Endpoint{ { Scheme: "tcp", Host: "127.0.0.1", Port: testPort, }, }, starttls: true, log: testutils.Logger(t, "target.smtp"), } _, err := testutils.DoTestDeliveryErr(t, mod, "test@example.invalid", []string{"rcpt@example.invalid"}) if err == nil { t.Error("Expected an error, got none") } } func TestMain(m *testing.M) { remoteSmtpPort := flag.String("test.smtpport", "random", "(maddy) SMTP port to use for connections in tests") flag.Parse() if *remoteSmtpPort == "random" { *remoteSmtpPort = strconv.Itoa(rand.Intn(65536-10000) + 10000) } testPort = *remoteSmtpPort os.Exit(m.Run()) }