Mercurial > hg > nginx-tests
view mail_imap.t @ 1851:0351dee227a8
Tests: unbreak tests with dynamic certificates on stable.
In 74cffa9d4c43, ticket based session reuse is enabled in addition to
using a shared SSL session cache. This changed how a session can be
resumed in a different server:
- for a session ID based resumption, it is resumed in the same context
- when using session tickets, a key name is also checked for matching
- with a ticket callback, this is skipped in favor of callback's logic
This makes 'session id context match' tests fail with session tickets
on stable since ticket key names are unique in distinct SSL contexts.
On the other hand, tests pass on 1.23.2+ due to automatic ticket keys
rotation that installs ticket callback, and using a common shared SSL
session cache.
author | Sergey Kandaurov <pluknet@nginx.com> |
---|---|
date | Tue, 28 Mar 2023 01:36:32 +0400 |
parents | 156cb84b3c23 |
children | 2a0a6035a1af |
line wrap: on
line source
#!/usr/bin/perl # (C) Maxim Dounin # Tests for nginx mail imap module. ############################################################################### use warnings; use strict; use Test::More; use MIME::Base64; use Socket qw/ CRLF /; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; use Test::Nginx::IMAP; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; local $SIG{PIPE} = 'IGNORE'; my $t = Test::Nginx->new()->has(qw/mail imap http rewrite/) ->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } mail { proxy_pass_error_message on; proxy_timeout 15s; auth_http http://127.0.0.1:8080/mail/auth; server { listen 127.0.0.1:8143; protocol imap; imap_auth plain cram-md5 external; } } http { %%TEST_GLOBALS_HTTP%% server { listen 127.0.0.1:8080; server_name localhost; location = /mail/auth { set $reply ERROR; set $passw ""; set $userpass "$http_auth_user:$http_auth_pass"; if ($userpass = 'test@example.com:secret') { set $reply OK; } if ($userpass = 'te\\"st@example.com:se\\"cret') { set $reply OK; } set $userpass "$http_auth_user:$http_auth_salt:$http_auth_pass"; if ($userpass ~ '^test@example.com:<.*@.*>:0{32}$') { set $reply OK; set $passw secret; } set $userpass "$http_auth_method:$http_auth_user:$http_auth_pass"; if ($userpass = 'external:test@example.com:') { set $reply OK; set $passw secret; } add_header Auth-Status $reply; add_header Auth-Server 127.0.0.1; add_header Auth-Port %%PORT_8144%%; add_header Auth-Pass $passw; add_header Auth-Wait 1; return 204; } } } EOF $t->run_daemon(\&Test::Nginx::IMAP::imap_test_daemon); $t->run()->plan(29); $t->waitforsocket('127.0.0.1:' . port(8144)); ############################################################################### # login my $s = Test::Nginx::IMAP->new(); $s->ok('greeting'); $s->send('a01 LOGIN'); $s->check(qr/^a01 BAD/, 'login without arguments'); $s->send('a02 LOGIN test@example.com bad'); $s->check(qr/^a02 NO/, 'login with bad password'); $s->send('a03 LOGIN test@example.com secret'); $s->ok('login'); # auth $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE'); $s->check(qr/^\S+ BAD/, 'auth without arguments'); # auth plain $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0bad", '')); $s->check(qr/^\S+ NO/, 'auth plain with bad password'); $s->send('1 AUTHENTICATE PLAIN ' . encode_base64("\0test\@example.com\0secret", '')); $s->ok('auth plain'); # auth login simple $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE LOGIN'); $s->check(qr/\+ VXNlcm5hbWU6/, 'auth login username challenge'); $s->send(encode_base64('test@example.com', '')); $s->check(qr/\+ UGFzc3dvcmQ6/, 'auth login password challenge'); $s->send(encode_base64('secret', '')); $s->ok('auth login simple'); # auth login with username $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE LOGIN ' . encode_base64('test@example.com', '')); $s->check(qr/\+ UGFzc3dvcmQ6/, 'auth login with username password challenge'); $s->send(encode_base64('secret', '')); $s->ok('auth login with username'); # auth cram-md5 $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE CRAM-MD5'); $s->check(qr/\+ /, 'auth cram-md5 challenge'); $s->send(encode_base64('test@example.com ' . ('0' x 32), '')); $s->ok('auth cram-md5'); # auth external $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL'); $s->check(qr/\+ VXNlcm5hbWU6/, 'auth external challenge'); $s->send(encode_base64('test@example.com', '')); $s->ok('auth external'); # auth external with username $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('1 AUTHENTICATE EXTERNAL ' . encode_base64('test@example.com', '')); $s->ok('auth external with username'); # quoted strings $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN "te\\\\\"st@example.com" "se\\\\\"cret"'); $s->ok('quoted strings'); # literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18}'); $s->check(qr/\+ /, 'login username literal continue'); $s->send('te\"st@example.com' . ' {8}'); $s->check(qr/\+ /, 'login password literal continue'); $s->send('se\"cret'); $s->ok('login literals'); # non-synchronizing literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18+}' . CRLF . 'te\"st@example.com' . ' {8+}' . CRLF . 'se\"cret'); $s->ok('login non-sync literals'); # backslash in quotes and literals $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN {18+}' . CRLF . 'te\"st@example.com' . ' "se\\\\\"cret"'); TODO: { local $TODO = 'not yet' unless $t->has_version('1.21.0'); $s->ok('backslash in literal'); } # pipelining $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 INVALID COMMAND WITH ARGUMENTS' . CRLF . 'a02 NOOP'); $s->check(qr/^a01 BAD/, 'pipelined invalid command'); TODO: { local $TODO = 'not yet' unless $t->has_version('1.21.0'); $s->ok('pipelined noop after invalid command'); } $s->send('a03 FOOBAR {10+}' . CRLF . 'test test ' . CRLF . 'a04 NOOP'); $s->check(qr/^a03 BAD/, 'invalid with non-sync literal'); $s->check(qr/^(a04 |$)/, 'literal not command'); TODO: { todo_skip('not yet', 2) unless $t->has_version('1.21.0'); # skipped without a fix, since with level-triggered event methods # this hogs cpu till the connection is closed by the backend server, # and generates a lot of debug logs $s = Test::Nginx::IMAP->new(); $s->read(); $s->send('a01 LOGIN test@example.com secret' . CRLF . 'a02 LOGOUT'); $s->ok('pipelined login'); $s->ok('pipelined logout'); } ###############################################################################