maddy/internal/target/remote/remote_test.go
fox.cpp 9f523c8c61
target/remote: Rework MX records authentication and TLS enforcement
Previous approach consisted of multiple independent options with unknown
interaction between each other and not offering enough flexibility for
local policy configuration.

Additionally, it was not possible to implement downgrade protection
mentioned in #178 because it was not clear what is "downgrade" since
options were not related in any linear order, this commit makes it
explicit via the "security levels" system:
MX: DNSSEC > MTA-STS > Nothing
TLS: Authenticated+Encrypted > Encrypted > Plaintext

Note DNSSEC and MTA-STS being different levels, they provide different
security guarantees. Keeping them together under "authenticated" level
would not provide enough granularity for levels-based downgrade
protection and local policies.

'common_domain' MX authentication option is removed. It was offering no
real protection and therefore is was problematic to use together with
planned downgrade protection.

All security level errors are marked as temporary to force requeueing
and allow local admin to troubleshoot them without losing messages.

'remote' tests are changed to use testTarget function to initialize
tested module instance, since security levels mapping requires some
pre-initialization.

Support for IP literals in address domain-part is disabled because it
is incompatible with the new verification logic and was broken anyway
(#176).
2019-12-13 21:11:03 +03:00

911 lines
25 KiB
Go

package remote
import (
"context"
"crypto/tls"
"flag"
"math/rand"
"net"
"os"
"strconv"
"testing"
"time"
"github.com/emersion/go-message/textproto"
"github.com/emersion/go-smtp"
"github.com/foxcpp/go-mockdns"
"github.com/foxcpp/maddy/internal/buffer"
"github.com/foxcpp/maddy/internal/dns"
"github.com/foxcpp/maddy/internal/exterrors"
"github.com/foxcpp/maddy/internal/module"
"github.com/foxcpp/maddy/internal/mtasts"
"github.com/foxcpp/maddy/internal/testutils"
)
// .invalid TLD is used here to make sure if there is something wrong about
// DNS hooks and lookups go to the real Internet, they will not result in
// any useful data that can lead to outgoing connections being made.
func testTarget(t *testing.T, zones map[string]mockdns.Zone, extResolver *dns.ExtResolver,
mtastsGet func(ctx context.Context, domain string) (*mtasts.Policy, error)) *Target {
resolver := &mockdns.Resolver{Zones: zones}
if mtastsGet == nil {
mtastsGet = func(ctx context.Context, domain string) (*mtasts.Policy, error) {
return nil, mtasts.ErrIgnorePolicy
}
}
tgt := Target{
name: "remote",
hostname: "mx.example.com",
resolver: resolver,
dialer: resolver.DialContext,
extResolver: extResolver,
tlsConfig: &tls.Config{},
Log: testutils.Logger(t, "remote"),
mtastsGet: mtastsGet,
}
return &tgt
}
func TestRemoteDelivery(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestRemoteDelivery_IPLiteral(t *testing.T) {
t.Skip("Support disabled")
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
"1.0.0.127.in-addr.arpa.": {
PTR: []string{"mx.example.invalid."},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@[127.0.0.1]"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@[127.0.0.1]"})
}
func TestRemoteDelivery_FallbackMX(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestRemoteDelivery_BodyNonAtomic(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
c := multipleErrs{
errs: map[string]error{},
}
testutils.DoTestDeliveryNonAtomic(t, &c, tgt, "test@example.com", []string{"test@example.invalid"})
if err := c.errs["test@example.invalid"]; err != nil {
t.Fatal(err)
}
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestRemoteDelivery_Abort(t *testing.T) {
_, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example.invalid"); err != nil {
t.Fatal(err)
}
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_CommitWithoutBody(t *testing.T) {
_, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example.invalid"); err != nil {
t.Fatal(err)
}
// Currently it does nothing, probably it should fail.
if err := delivery.Commit(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_MAILFROMErr(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
be.MailErr = &smtp.SMTPError{
Code: 550,
EnhancedCode: smtp.EnhancedCode{5, 1, 2},
Message: "Hey",
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
err = delivery.AddRcpt(context.Background(), "test@example.invalid")
testutils.CheckSMTPErr(t, err, 550, exterrors.EnhancedCode{5, 1, 2}, "mx.example.invalid. said: Hey")
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_NoMX(t *testing.T) {
tarpit := testutils.FailOnConn(t, "127.0.0.1:"+smtpPort)
defer tarpit.Close()
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example.invalid"); err == nil {
t.Fatal("Expected an error, got none")
}
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_NullMX(t *testing.T) {
// Hang the test if it actually connects to the server to
// deliver the message. Use of testutils.SMTPServer here
// causes weird race conditions.
tarpit := testutils.FailOnConn(t, "127.0.0.1:"+smtpPort)
defer tarpit.Close()
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: ".", Pref: 10}},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
err = delivery.AddRcpt(context.Background(), "test@example.invalid")
testutils.CheckSMTPErr(t, err, 556, exterrors.EnhancedCode{5, 1, 10}, "Domain does not accept email (null MX)")
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_Quarantined(t *testing.T) {
_, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
meta := module.MsgMetadata{ID: "test..."}
delivery, err := tgt.Start(context.Background(), &meta, "test@example.com")
if err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example.invalid"); err != nil {
t.Fatal(err)
}
meta.Quarantine = true
hdr := textproto.Header{}
hdr.Add("B", "2")
hdr.Add("A", "1")
body := buffer.MemoryBuffer{Slice: []byte("foobar\n")}
if err := delivery.Body(context.Background(), textproto.Header{}, body); err == nil {
t.Fatal("Expected an error, got none")
}
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_MAILFROMErr_Repeated(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
be.MailErr = &smtp.SMTPError{
Code: 550,
EnhancedCode: smtp.EnhancedCode{5, 1, 2},
Message: "Hey",
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
err = delivery.AddRcpt(context.Background(), "test@example.invalid")
testutils.CheckSMTPErr(t, err, 550, exterrors.EnhancedCode{5, 1, 2}, "mx.example.invalid. said: Hey")
err = delivery.AddRcpt(context.Background(), "test2@example.invalid")
testutils.CheckSMTPErr(t, err, 550, exterrors.EnhancedCode{5, 1, 2}, "mx.example.invalid. said: Hey")
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_RcptErr(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
be.RcptErr = map[string]error{
"test@example.invalid": &smtp.SMTPError{
Code: 550,
EnhancedCode: smtp.EnhancedCode{5, 1, 2},
Message: "Hey",
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
err = delivery.AddRcpt(context.Background(), "test@example.invalid")
testutils.CheckSMTPErr(t, err, 550, exterrors.EnhancedCode{5, 1, 2}, "mx.example.invalid. said: Hey")
// It should be possible to, however, add another recipient and continue
// delivery as if nothing happened.
if err := delivery.AddRcpt(context.Background(), "test2@example.invalid"); err != nil {
t.Fatal(err)
}
hdr := textproto.Header{}
hdr.Add("B", "2")
hdr.Add("A", "1")
body := buffer.MemoryBuffer{Slice: []byte("foobar\n")}
if err := delivery.Body(context.Background(), hdr, body); err != nil {
t.Fatal(err)
}
if err := delivery.Commit(context.Background()); err != nil {
t.Fatal(err)
}
be.CheckMsg(t, 0, "test@example.com", []string{"test2@example.invalid"})
}
func TestRemoteDelivery_DownMX(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{
{Host: "mx1.example.invalid.", Pref: 20},
{Host: "mx2.example.invalid.", Pref: 10},
},
},
"mx1.example.invalid.": {
A: []string{"127.0.0.1"},
},
"mx2.example.invalid.": {
A: []string{"127.0.0.2"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestRemoteDelivery_AllMXDown(t *testing.T) {
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{
{Host: "mx1.example.invalid.", Pref: 20},
{Host: "mx2.example.invalid.", Pref: 10},
},
},
"mx1.example.invalid.": {
A: []string{"127.0.0.1"},
},
"mx2.example.invalid.": {
A: []string{"127.0.0.2"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
_, err := testutils.DoTestDeliveryErr(t, tgt, "test@example.com", []string{"test@example.invalid"})
if err == nil {
t.Fatal("Expected an error, got none")
}
}
func TestRemoteDelivery_Split(t *testing.T) {
be1, srv1 := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv1.Close()
defer testutils.CheckSMTPConnLeak(t, srv1)
be2, srv2 := testutils.SMTPServer(t, "127.0.0.2:"+smtpPort)
defer srv2.Close()
defer testutils.CheckSMTPConnLeak(t, srv2)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"example2.invalid.": {
MX: []net.MX{{Host: "mx.example2.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
"mx.example2.invalid.": {
A: []string{"127.0.0.2"},
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid", "test@example2.invalid"})
be1.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
be2.CheckMsg(t, 0, "test@example.com", []string{"test@example2.invalid"})
}
func TestRemoteDelivery_Split_Fail(t *testing.T) {
be1, srv1 := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv1.Close()
defer testutils.CheckSMTPConnLeak(t, srv1)
be2, srv2 := testutils.SMTPServer(t, "127.0.0.2:"+smtpPort)
defer srv2.Close()
defer testutils.CheckSMTPConnLeak(t, srv2)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"example2.invalid.": {
MX: []net.MX{{Host: "mx.example2.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
"mx.example2.invalid.": {
A: []string{"127.0.0.2"},
},
}
be1.RcptErr = map[string]error{
"test@example.invalid": &smtp.SMTPError{
Code: 550,
EnhancedCode: smtp.EnhancedCode{5, 1, 2},
Message: "Hey",
},
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
err = delivery.AddRcpt(context.Background(), "test@example.invalid")
if err == nil {
t.Fatal("Expected an error, got none")
}
// It should be possible to, however, add another recipient and continue
// delivery as if nothing happened.
if err := delivery.AddRcpt(context.Background(), "test@example2.invalid"); err != nil {
t.Fatal(err)
}
hdr := textproto.Header{}
hdr.Add("B", "2")
hdr.Add("A", "1")
body := buffer.MemoryBuffer{Slice: []byte("foobar\n")}
if err := delivery.Body(context.Background(), hdr, body); err != nil {
t.Fatal(err)
}
if err := delivery.Commit(context.Background()); err != nil {
t.Fatal(err)
}
be2.CheckMsg(t, 0, "test@example.com", []string{"test@example2.invalid"})
}
func TestRemoteDelivery_BodyErr(t *testing.T) {
be, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
be.DataErr = &smtp.SMTPError{
Code: 550,
EnhancedCode: smtp.EnhancedCode{5, 1, 2},
Message: "Hey",
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
err = delivery.AddRcpt(context.Background(), "test@example.invalid")
if err != nil {
t.Fatal(err)
}
hdr := textproto.Header{}
hdr.Add("B", "2")
hdr.Add("A", "1")
body := buffer.MemoryBuffer{Slice: []byte("foobar\n")}
if err := delivery.Body(context.Background(), hdr, body); err == nil {
t.Fatal("expected an error, got none")
}
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_Split_BodyErr(t *testing.T) {
be1, srv1 := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv1.Close()
defer testutils.CheckSMTPConnLeak(t, srv1)
_, srv2 := testutils.SMTPServer(t, "127.0.0.2:"+smtpPort)
defer srv2.Close()
defer testutils.CheckSMTPConnLeak(t, srv2)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"example2.invalid.": {
MX: []net.MX{{Host: "mx.example2.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
"mx.example2.invalid.": {
A: []string{"127.0.0.2"},
},
}
be1.DataErr = &smtp.SMTPError{
Code: 421,
EnhancedCode: smtp.EnhancedCode{4, 1, 2},
Message: "Hey",
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example.invalid"); err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example2.invalid"); err != nil {
t.Fatal(err)
}
hdr := textproto.Header{}
hdr.Add("B", "2")
hdr.Add("A", "1")
body := buffer.MemoryBuffer{Slice: []byte("foobar\n")}
err = delivery.Body(context.Background(), hdr, body)
testutils.CheckSMTPErr(t, err, 451, exterrors.EnhancedCode{4, 0, 0},
"Partial delivery failure, additional attempts may result in duplicates")
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_Split_BodyErr_NonAtomic(t *testing.T) {
be1, srv1 := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv1.Close()
defer testutils.CheckSMTPConnLeak(t, srv1)
_, srv2 := testutils.SMTPServer(t, "127.0.0.2:"+smtpPort)
defer srv2.Close()
defer testutils.CheckSMTPConnLeak(t, srv2)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"example2.invalid.": {
MX: []net.MX{{Host: "mx.example2.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
"mx.example2.invalid.": {
A: []string{"127.0.0.2"},
},
}
be1.DataErr = &smtp.SMTPError{
Code: 550,
EnhancedCode: smtp.EnhancedCode{5, 1, 2},
Message: "Hey",
}
tgt := testTarget(t, zones, nil, nil)
defer tgt.Close()
delivery, err := tgt.Start(context.Background(), &module.MsgMetadata{ID: "test..."}, "test@example.com")
if err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example.invalid"); err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test2@example.invalid"); err != nil {
t.Fatal(err)
}
if err := delivery.AddRcpt(context.Background(), "test@example2.invalid"); err != nil {
t.Fatal(err)
}
hdr := textproto.Header{}
hdr.Add("B", "2")
hdr.Add("A", "1")
body := buffer.MemoryBuffer{Slice: []byte("foobar\n")}
c := multipleErrs{
errs: map[string]error{},
}
delivery.(module.PartialDelivery).BodyNonAtomic(context.Background(), &c, hdr, body)
testutils.CheckSMTPErr(t, c.errs["test@example.invalid"],
550, exterrors.EnhancedCode{5, 1, 2}, "mx.example.invalid. said: Hey")
testutils.CheckSMTPErr(t, c.errs["test2@example.invalid"],
550, exterrors.EnhancedCode{5, 1, 2}, "mx.example.invalid. said: Hey")
if err := c.errs["test@example2.invalid"]; err != nil {
t.Errorf("Unexpected error for non-failing connection: %v", err)
}
if err := delivery.Abort(context.Background()); err != nil {
t.Fatal(err)
}
}
func TestRemoteDelivery_TLSErrFallback(t *testing.T) {
clientCfg, be, srv := testutils.SMTPServerSTARTTLS(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
// Cause failure through version incompatibility.
clientCfg.MaxVersion = tls.VersionTLS12
clientCfg.MinVersion = tls.VersionTLS12
srv.TLSConfig.MinVersion = tls.VersionTLS11
srv.TLSConfig.MaxVersion = tls.VersionTLS11
tgt := testTarget(t, zones, nil, nil)
tgt.tlsConfig = clientCfg
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestRemoteDelivery_RequireTLS_Missing(t *testing.T) {
_, srv := testutils.SMTPServer(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
tgt.minTLSLevel = TLSEncrypted
defer tgt.Close()
_, err := testutils.DoTestDeliveryErr(t, tgt, "test@example.com", []string{"test@example.invalid"})
if err == nil {
t.Errorf("expected an error, got none")
}
}
func TestRemoteDelivery_RequireTLS_Present(t *testing.T) {
clientCfg, be, srv := testutils.SMTPServerSTARTTLS(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
tgt.tlsConfig = clientCfg
tgt.minTLSLevel = TLSEncrypted
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestRemoteDelivery_RequireTLS_NoErrFallback(t *testing.T) {
clientCfg, _, srv := testutils.SMTPServerSTARTTLS(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
// Cause failure through version incompatibility.
clientCfg.MaxVersion = tls.VersionTLS12
clientCfg.MinVersion = tls.VersionTLS12
srv.TLSConfig.MinVersion = tls.VersionTLS11
srv.TLSConfig.MaxVersion = tls.VersionTLS11
tgt := testTarget(t, zones, nil, nil)
tgt.tlsConfig = clientCfg
tgt.minTLSLevel = TLSEncrypted
defer tgt.Close()
_, err := testutils.DoTestDeliveryErr(t, tgt, "test@example.com", []string{"test@example.invalid"})
if err == nil {
t.Fatal("Expected an error, got none")
}
}
func TestRemoteDelivery_TLS_FallbackNoVerify(t *testing.T) {
_, be, srv := testutils.SMTPServerSTARTTLS(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
tgt := testTarget(t, zones, nil, nil)
// tlsConfig is not configured to trust server cert.
tgt.minTLSLevel = TLSEncrypted
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
// But it should still be delivered over TLS.
if !be.Messages[0].State.TLS.HandshakeComplete {
t.Fatal("Message was not delivered over TLS")
}
}
func TestRemoteDelivery_TLS_FallbackPlaintext(t *testing.T) {
clientCfg, be, srv := testutils.SMTPServerSTARTTLS(t, "127.0.0.1:"+smtpPort)
defer srv.Close()
defer testutils.CheckSMTPConnLeak(t, srv)
zones := map[string]mockdns.Zone{
"example.invalid.": {
MX: []net.MX{{Host: "mx.example.invalid.", Pref: 10}},
},
"mx.example.invalid.": {
A: []string{"127.0.0.1"},
},
}
// Cause failure through version incompatibility.
clientCfg.MaxVersion = tls.VersionTLS12
clientCfg.MinVersion = tls.VersionTLS12
srv.TLSConfig.MinVersion = tls.VersionTLS11
srv.TLSConfig.MaxVersion = tls.VersionTLS11
tgt := testTarget(t, zones, nil, nil)
tgt.tlsConfig = clientCfg
defer tgt.Close()
testutils.DoTestDelivery(t, tgt, "test@example.com", []string{"test@example.invalid"})
be.CheckMsg(t, 0, "test@example.com", []string{"test@example.invalid"})
}
func TestMain(m *testing.M) {
remoteSmtpPort := flag.String("test.smtpport", "random", "(maddy) SMTP port to use for connections in tests")
flag.Parse()
if *remoteSmtpPort == "random" {
rand.Seed(time.Now().UnixNano())
*remoteSmtpPort = strconv.Itoa(rand.Intn(65536-10000) + 10000)
}
smtpPort = *remoteSmtpPort
os.Exit(m.Run())
}