modify/dkim: Do not refold the signature field

Closes #187.
This commit is contained in:
fox.cpp 2019-12-29 18:58:25 +03:00
parent ff982cd1c3
commit bafedd5792
No known key found for this signature in database
GPG key ID: E76D97CCEDE90B6C
4 changed files with 156 additions and 5 deletions

View file

@ -1,17 +1,164 @@
package dkim
import (
"bytes"
"context"
"io/ioutil"
"net"
"os"
"path/filepath"
"reflect"
"sort"
"strconv"
"testing"
"github.com/emersion/go-message/textproto"
"github.com/emersion/go-msgauth/dkim"
"github.com/foxcpp/go-mockdns"
"github.com/foxcpp/maddy/internal/buffer"
"github.com/foxcpp/maddy/internal/config"
"github.com/foxcpp/maddy/internal/module"
"github.com/foxcpp/maddy/internal/testutils"
)
// TODO: Add tests that check actual signing once
// we have LookupTXT hook for go-msgauth/dkim.
func newTestModifier(t *testing.T, dir, keyAlgo string) *Modifier {
mod, err := New("", "test", nil, nil)
if err != nil {
t.Fatal(err)
}
m := mod.(*Modifier)
m.log = testutils.Logger(t, m.Name())
err = m.Init(config.NewMap(nil, &config.Node{
Children: []config.Node{
{
Name: "domain",
Args: []string{"maddy.test"},
},
{
Name: "selector",
Args: []string{"default"},
},
{
Name: "key_path",
Args: []string{filepath.Join(dir, "testkey.key")},
},
{
Name: "require_sender_match",
Args: []string{"off"},
},
{
Name: "newkey_algo",
Args: []string{keyAlgo},
},
},
}))
if err != nil {
t.Fatal(err)
}
return m
}
func signTestMsg(t *testing.T, m *Modifier) (textproto.Header, []byte) {
state, err := m.ModStateForMsg(context.Background(), &module.MsgMetadata{})
if err != nil {
t.Fatal(err)
}
testHdr := textproto.Header{}
testHdr.Add("From", "<hello@hello>")
testHdr.Add("Subject", "heya")
testHdr.Add("To", "<heya@heya>")
body := []byte("hello there\r\n")
err = state.RewriteBody(context.Background(), &testHdr, buffer.MemoryBuffer{Slice: body})
if err != nil {
t.Fatal(err)
}
return testHdr, body
}
func verifyTestMsg(t *testing.T, dnsPath string, hdr textproto.Header, body []byte) {
dnsRecord, err := ioutil.ReadFile(dnsPath)
if err != nil {
t.Fatal(err)
}
t.Log("DNS record:", string(dnsRecord))
zones := map[string]mockdns.Zone{
"default._domainkey.maddy.test.": {
TXT: []string{string(dnsRecord)},
},
}
t.Log(string(dnsRecord))
// dkim.Verify does not allow to override its lookup routine, so we have to
// hjack the global resolver object.
srv, err := mockdns.NewServer(zones)
if err != nil {
t.Fatal(err)
}
defer srv.Close()
srv.PatchNet(net.DefaultResolver)
defer mockdns.UnpatchNet(net.DefaultResolver)
var fullBody bytes.Buffer
if err := textproto.WriteHeader(&fullBody, hdr); err != nil {
t.Fatal(err)
}
if _, err := fullBody.Write(body); err != nil {
t.Fatal(err)
}
v, err := dkim.Verify(bytes.NewReader(fullBody.Bytes()))
if err != nil {
t.Fatal(err)
}
if len(v) != 1 {
t.Fatal("Expected exactly one verification")
}
if v[0].Err != nil {
t.Fatal("Verification error:", v[0].Err)
}
}
func TestGenerateSignVerify(t *testing.T) {
// This test verifies whether a freshly generated key can be used for
// signing and verification.
//
// It is a kind of "integration" test for DKIM modifier, as it tests
// whether everything works correctly together.
test := func(keyAlgo string, headerCanon, bodyCanon dkim.Canonicalization, reload bool) {
t.Helper()
dir, err := ioutil.TempDir("", "maddy-tests-dkim-")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(dir)
// Create the key.
m := newTestModifier(t, dir, keyAlgo)
if reload {
m = newTestModifier(t, dir, keyAlgo)
}
testHdr, body := signTestMsg(t, m)
verifyTestMsg(t, filepath.Join(dir, "testkey.dns"), testHdr, body)
}
for _, algo := range [2]string{"rsa2048", "ed25519"} {
for _, hdrCanon := range [2]dkim.Canonicalization{dkim.CanonicalizationSimple, dkim.CanonicalizationRelaxed} {
for _, bodyCanon := range [2]dkim.Canonicalization{dkim.CanonicalizationSimple, dkim.CanonicalizationRelaxed} {
test(algo, hdrCanon, bodyCanon, false)
test(algo, hdrCanon, bodyCanon, true)
}
}
}
}
func TestFieldsToSign(t *testing.T) {
h := textproto.Header{}