8 cryptorand "crypto/rand"
19 "github.com/mjl-/mox/config"
20 "github.com/mjl-/mox/dmarcdb"
21 "github.com/mjl-/mox/dns"
22 "github.com/mjl-/mox/imapclient"
23 "github.com/mjl-/mox/mlog"
24 "github.com/mjl-/mox/mox-"
25 "github.com/mjl-/mox/mtastsdb"
26 "github.com/mjl-/mox/queue"
27 "github.com/mjl-/mox/smtp"
28 "github.com/mjl-/mox/store"
29 "github.com/mjl-/mox/tlsrptdb"
32var ctxbg = context.Background()
33var pkglog = mlog.New("ctl", nil)
35func tcheck(t *testing.T, err error, errmsg string) {
38 t.Fatalf("%s: %v", errmsg, err)
42// TestCtl executes commands through ctl. This tests at least the protocols (who
43// sends when/what) is tested. We often don't check the actual results, but
44// unhandled errors would cause a panic.
45func TestCtl(t *testing.T) {
46 os.RemoveAll("testdata/ctl/data")
47 mox.ConfigStaticPath = filepath.FromSlash("testdata/ctl/config/mox.conf")
48 mox.ConfigDynamicPath = filepath.FromSlash("testdata/ctl/config/domains.conf")
49 if errs := mox.LoadConfig(ctxbg, pkglog, true, false); len(errs) > 0 {
50 t.Fatalf("loading mox config: %v", errs)
52 defer store.Switchboard()()
55 tcheck(t, err, "queue init")
56 defer queue.Shutdown()
58 err = store.Init(ctxbg)
59 tcheck(t, err, "store init")
64 testctl := func(fn func(clientctl *ctl)) {
67 cconn, sconn := net.Pipe()
68 clientctl := ctl{conn: cconn, log: pkglog}
69 serverctl := ctl{conn: sconn, log: pkglog}
70 done := make(chan struct{})
73 servectlcmd(ctxbg, &serverctl, cid, func() {})
83 testctl(func(ctl *ctl) {
84 ctlcmdDeliver(ctl, "mjl@mox.example")
87 // "setaccountpassword"
88 testctl(func(ctl *ctl) {
89 ctlcmdSetaccountpassword(ctl, "mjl", "test4321")
92 testctl(func(ctl *ctl) {
93 ctlcmdQueueHoldrulesList(ctl)
97 testctl(func(ctl *ctl) {
98 ctlcmdQueueHoldrulesAdd(ctl, "", "", "")
100 testctl(func(ctl *ctl) {
101 ctlcmdQueueHoldrulesAdd(ctl, "mjl", "", "")
103 testctl(func(ctl *ctl) {
104 ctlcmdQueueHoldrulesAdd(ctl, "", "☺.mox.example", "")
106 testctl(func(ctl *ctl) {
107 ctlcmdQueueHoldrulesAdd(ctl, "mox", "☺.mox.example", "example.com")
110 testctl(func(ctl *ctl) {
111 ctlcmdQueueHoldrulesRemove(ctl, 1)
114 // Queue a message to list/change/dump.
115 msg := "Subject: subject\r\n\r\nbody\r\n"
116 msgFile, err := store.CreateMessageTemp(pkglog, "queuedump-test")
117 tcheck(t, err, "temp file")
118 _, err = msgFile.Write([]byte(msg))
119 tcheck(t, err, "write message")
120 _, err = msgFile.Seek(0, 0)
121 tcheck(t, err, "rewind message")
122 defer os.Remove(msgFile.Name())
123 defer msgFile.Close()
124 addr, err := smtp.ParseAddress("mjl@mox.example")
125 tcheck(t, err, "parse address")
126 qml := []queue.Msg{queue.MakeMsg(addr.Path(), addr.Path(), false, false, int64(len(msg)), "<random@localhost>", nil, nil, time.Now(), "subject")}
127 queue.Add(ctxbg, pkglog, "mjl", msgFile, qml...)
131 testctl(func(ctl *ctl) {
132 ctlcmdQueueHoldrulesList(ctl)
136 testctl(func(ctl *ctl) {
137 ctlcmdQueueList(ctl, queue.Filter{}, queue.Sort{})
141 testctl(func(ctl *ctl) {
142 ctlcmdQueueHoldSet(ctl, queue.Filter{}, true)
144 testctl(func(ctl *ctl) {
145 ctlcmdQueueHoldSet(ctl, queue.Filter{}, false)
149 testctl(func(ctl *ctl) {
150 ctlcmdQueueSchedule(ctl, queue.Filter{}, true, time.Minute)
154 testctl(func(ctl *ctl) {
155 ctlcmdQueueTransport(ctl, queue.Filter{}, "socks")
159 testctl(func(ctl *ctl) {
160 ctlcmdQueueRequireTLS(ctl, queue.Filter{}, nil)
164 testctl(func(ctl *ctl) {
165 ctlcmdQueueDump(ctl, fmt.Sprintf("%d", qmid))
169 testctl(func(ctl *ctl) {
170 ctlcmdQueueFail(ctl, queue.Filter{})
174 testctl(func(ctl *ctl) {
175 ctlcmdQueueDrop(ctl, queue.Filter{})
178 // "queueholdruleslist"
179 testctl(func(ctl *ctl) {
180 ctlcmdQueueHoldrulesList(ctl)
183 // "queueholdrulesadd"
184 testctl(func(ctl *ctl) {
185 ctlcmdQueueHoldrulesAdd(ctl, "mjl", "", "")
187 testctl(func(ctl *ctl) {
188 ctlcmdQueueHoldrulesAdd(ctl, "mjl", "localhost", "")
191 // "queueholdrulesremove"
192 testctl(func(ctl *ctl) {
193 ctlcmdQueueHoldrulesRemove(ctl, 2)
195 testctl(func(ctl *ctl) {
196 ctlcmdQueueHoldrulesList(ctl)
199 // "queuesuppresslist"
200 testctl(func(ctl *ctl) {
201 ctlcmdQueueSuppressList(ctl, "mjl")
204 // "queuesuppressadd"
205 testctl(func(ctl *ctl) {
206 ctlcmdQueueSuppressAdd(ctl, "mjl", "base@localhost")
208 testctl(func(ctl *ctl) {
209 ctlcmdQueueSuppressAdd(ctl, "mjl", "other@localhost")
212 // "queuesuppresslookup"
213 testctl(func(ctl *ctl) {
214 ctlcmdQueueSuppressLookup(ctl, "mjl", "base@localhost")
217 // "queuesuppressremove"
218 testctl(func(ctl *ctl) {
219 ctlcmdQueueSuppressRemove(ctl, "mjl", "base@localhost")
221 testctl(func(ctl *ctl) {
222 ctlcmdQueueSuppressList(ctl, "mjl")
225 // "queueretiredlist"
226 testctl(func(ctl *ctl) {
227 ctlcmdQueueRetiredList(ctl, queue.RetiredFilter{}, queue.RetiredSort{})
230 // "queueretiredprint"
231 testctl(func(ctl *ctl) {
232 ctlcmdQueueRetiredPrint(ctl, "1")
236 testctl(func(ctl *ctl) {
237 ctlcmdQueueHookList(ctl, queue.HookFilter{}, queue.HookSort{})
240 // "queuehookschedule"
241 testctl(func(ctl *ctl) {
242 ctlcmdQueueHookSchedule(ctl, queue.HookFilter{}, true, time.Minute)
246 testctl(func(ctl *ctl) {
247 ctlcmdQueueHookPrint(ctl, "1")
251 testctl(func(ctl *ctl) {
252 ctlcmdQueueHookCancel(ctl, queue.HookFilter{})
255 // "queuehookretiredlist"
256 testctl(func(ctl *ctl) {
257 ctlcmdQueueHookRetiredList(ctl, queue.HookRetiredFilter{}, queue.HookRetiredSort{})
260 // "queuehookretiredprint"
261 testctl(func(ctl *ctl) {
262 ctlcmdQueueHookRetiredPrint(ctl, "1")
266 testctl(func(ctl *ctl) {
267 ctlcmdImport(ctl, true, "mjl", "inbox", "testdata/importtest.mbox")
271 testctl(func(ctl *ctl) {
272 ctlcmdImport(ctl, false, "mjl", "inbox", "testdata/importtest.maildir")
276 testctl(func(ctl *ctl) {
277 ctlcmdConfigDomainAdd(ctl, false, dns.Domain{ASCII: "mox2.example"}, "mjl", "")
281 testctl(func(ctl *ctl) {
282 ctlcmdConfigAccountAdd(ctl, "mjl2", "mjl2@mox2.example")
286 testctl(func(ctl *ctl) {
287 ctlcmdConfigAddressAdd(ctl, "mjl3@mox2.example", "mjl2")
291 testctl(func(ctl *ctl) {
292 ctlcmdDeliver(ctl, "mjl3@mox2.example")
294 // "retrain", retrain junk filter.
295 testctl(func(ctl *ctl) {
296 ctlcmdRetrain(ctl, "mjl2")
300 testctl(func(ctl *ctl) {
301 ctlcmdConfigAddressRemove(ctl, "mjl3@mox2.example")
305 testctl(func(ctl *ctl) {
306 ctlcmdConfigAccountDisabled(ctl, "mjl2", "testing")
308 testctl(func(ctl *ctl) {
309 ctlcmdConfigAccountDisabled(ctl, "mjl2", "")
313 testctl(func(ctl *ctl) {
314 ctlcmdConfigAccountRemove(ctl, "mjl2")
318 testctl(func(ctl *ctl) {
319 ctlcmdConfigDomainDisabled(ctl, dns.Domain{ASCII: "mox2.example"}, true)
321 testctl(func(ctl *ctl) {
322 ctlcmdConfigDomainDisabled(ctl, dns.Domain{ASCII: "mox2.example"}, false)
326 testctl(func(ctl *ctl) {
327 ctlcmdConfigDomainRemove(ctl, dns.Domain{ASCII: "mox2.example"})
331 testctl(func(ctl *ctl) {
332 ctlcmdConfigAliasAdd(ctl, "support@mox.example", config.Alias{Addresses: []string{"mjl@mox.example"}})
336 testctl(func(ctl *ctl) {
337 ctlcmdConfigAliasList(ctl, "mox.example")
341 testctl(func(ctl *ctl) {
342 ctlcmdConfigAliasPrint(ctl, "support@mox.example")
346 testctl(func(ctl *ctl) {
347 ctlcmdConfigAliasUpdate(ctl, "support@mox.example", "true", "true", "true")
351 testctl(func(ctl *ctl) {
352 ctlcmdConfigAliasAddaddr(ctl, "support@mox.example", []string{"mjl2@mox.example"})
356 testctl(func(ctl *ctl) {
357 ctlcmdConfigAliasRmaddr(ctl, "support@mox.example", []string{"mjl2@mox.example"})
361 testctl(func(ctl *ctl) {
362 ctlcmdConfigAliasRemove(ctl, "support@mox.example")
365 // accounttlspubkeyadd
366 certDER := fakeCert(t)
367 testctl(func(ctl *ctl) {
368 ctlcmdConfigTlspubkeyAdd(ctl, "mjl@mox.example", "testkey", false, certDER)
371 // "accounttlspubkeylist"
372 testctl(func(ctl *ctl) {
373 ctlcmdConfigTlspubkeyList(ctl, "")
375 testctl(func(ctl *ctl) {
376 ctlcmdConfigTlspubkeyList(ctl, "mjl")
379 tpkl, err := store.TLSPublicKeyList(ctxbg, "")
380 tcheck(t, err, "list tls public keys")
382 t.Fatalf("got %d tls public keys, expected 1", len(tpkl))
384 fingerprint := tpkl[0].Fingerprint
386 // "accounttlspubkeyget"
387 testctl(func(ctl *ctl) {
388 ctlcmdConfigTlspubkeyGet(ctl, fingerprint)
391 // "accounttlspubkeyrm"
392 testctl(func(ctl *ctl) {
393 ctlcmdConfigTlspubkeyRemove(ctl, fingerprint)
396 tpkl, err = store.TLSPublicKeyList(ctxbg, "")
397 tcheck(t, err, "list tls public keys")
399 t.Fatalf("got %d tls public keys, expected 0", len(tpkl))
403 testctl(func(ctl *ctl) {
408 testctl(func(ctl *ctl) {
409 ctlcmdSetLoglevels(ctl, "", "debug")
411 testctl(func(ctl *ctl) {
412 ctlcmdSetLoglevels(ctl, "smtpserver", "debug")
415 // Export data, import it again
416 xcmdExport(true, false, []string{filepath.FromSlash("testdata/ctl/data/tmp/export/mbox/"), filepath.FromSlash("testdata/ctl/data/accounts/mjl")}, &cmd{log: pkglog})
417 xcmdExport(false, false, []string{filepath.FromSlash("testdata/ctl/data/tmp/export/maildir/"), filepath.FromSlash("testdata/ctl/data/accounts/mjl")}, &cmd{log: pkglog})
418 testctl(func(ctl *ctl) {
419 ctlcmdImport(ctl, true, "mjl", "inbox", filepath.FromSlash("testdata/ctl/data/tmp/export/mbox/Inbox.mbox"))
421 testctl(func(ctl *ctl) {
422 ctlcmdImport(ctl, false, "mjl", "inbox", filepath.FromSlash("testdata/ctl/data/tmp/export/maildir/Inbox"))
425 // "recalculatemailboxcounts"
426 testctl(func(ctl *ctl) {
427 ctlcmdRecalculateMailboxCounts(ctl, "mjl")
431 testctl(func(ctl *ctl) {
432 ctlcmdFixmsgsize(ctl, "mjl")
434 testctl(func(ctl *ctl) {
435 acc, err := store.OpenAccount(ctl.log, "mjl", false)
436 tcheck(t, err, "open account")
442 content := []byte("Subject: hi\r\n\r\nbody\r\n")
444 deliver := func(m *store.Message) {
446 m.Size = int64(len(content))
447 msgf, err := store.CreateMessageTemp(ctl.log, "ctltest")
448 tcheck(t, err, "create temp file")
449 defer os.Remove(msgf.Name())
451 _, err = msgf.Write(content)
452 tcheck(t, err, "write message file")
453 err = acc.DeliverMailbox(ctl.log, "Inbox", m, msgf)
454 tcheck(t, err, "deliver message")
457 var msgBadSize store.Message
461 err = acc.DB.Update(ctxbg, &msgBadSize)
462 tcheck(t, err, "update message to bad size")
463 mb := store.Mailbox{ID: msgBadSize.MailboxID}
464 err = acc.DB.Get(ctxbg, &mb)
465 tcheck(t, err, "get db")
466 mb.Size -= int64(len(content))
468 err = acc.DB.Update(ctxbg, &mb)
469 tcheck(t, err, "update mailbox size")
472 ctlcmdFixmsgsize(ctl, "")
474 err = acc.DB.Get(ctxbg, &msgBadSize)
475 tcheck(t, err, "get message")
476 if msgBadSize.Size != int64(len(content)) {
477 t.Fatalf("after fixing, message size is %d, should be %d", msgBadSize.Size, len(content))
482 testctl(func(ctl *ctl) {
483 ctlcmdReparse(ctl, "mjl")
485 testctl(func(ctl *ctl) {
486 ctlcmdReparse(ctl, "")
490 testctl(func(ctl *ctl) {
491 ctlcmdReassignthreads(ctl, "mjl")
493 testctl(func(ctl *ctl) {
494 ctlcmdReassignthreads(ctl, "")
497 // "backup", backup account.
499 tcheck(t, err, "dmarcdb init")
500 defer dmarcdb.Close()
501 err = mtastsdb.Init(false)
502 tcheck(t, err, "mtastsdb init")
503 defer mtastsdb.Close()
504 err = tlsrptdb.Init()
505 tcheck(t, err, "tlsrptdb init")
506 defer tlsrptdb.Close()
507 testctl(func(ctl *ctl) {
508 os.RemoveAll("testdata/ctl/data/tmp/backup")
509 err := os.WriteFile("testdata/ctl/data/receivedid.key", make([]byte, 16), 0600)
510 tcheck(t, err, "writing receivedid.key")
511 ctlcmdBackup(ctl, filepath.FromSlash("testdata/ctl/data/tmp/backup"), false)
514 // Verify the backup.
516 flag: flag.NewFlagSet("", flag.ExitOnError),
517 flagArgs: []string{filepath.FromSlash("testdata/ctl/data/tmp/backup/data")},
522 testctl(func(ctl *ctl) {
525 client, err := imapclient.New(mox.Cid(), a, true)
526 tcheck(t, err, "new imapclient")
527 client.Select("inbox")
531 ctlcmdIMAPServe(ctl, "mjl@mox.example", b, b)
535func fakeCert(t *testing.T) []byte {
537 seed := make([]byte, ed25519.SeedSize)
538 privKey := ed25519.NewKeyFromSeed(seed) // Fake key, don't use this for real!
539 template := &x509.Certificate{
540 SerialNumber: big.NewInt(1), // Required field...
542 localCertBuf, err := x509.CreateCertificate(cryptorand.Reader, template, template, privKey.Public(), privKey)
543 tcheck(t, err, "making certificate")