Files
@ 28de9251c7aa
Branch filter:
Location: majic-ansible-roles/roles/mail_server/molecule/default/tests/test_client2.py - annotation
28de9251c7aa
15.1 KiB
text/x-python
MAR-239: Dropped support for Debian 11 Bullseye from the xmpp_server role.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 | b0c92677ba93 17cf34f73ca6 17cf34f73ca6 774d8236fa12 774d8236fa12 277c561f3f52 277c561f3f52 17cf34f73ca6 277c561f3f52 d62b3adec462 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 1bb9f7ac1072 1bb9f7ac1072 1bb9f7ac1072 d7f5980cc68a 1bb9f7ac1072 1bb9f7ac1072 1bb9f7ac1072 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 ae1a499dbd62 ae1a499dbd62 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 ae1a499dbd62 ae1a499dbd62 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 ae1a499dbd62 ae1a499dbd62 277c561f3f52 17cf34f73ca6 277c561f3f52 277c561f3f52 d7f5980cc68a 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 277c561f3f52 ae1a499dbd62 ae1a499dbd62 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 ae1a499dbd62 ae1a499dbd62 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 ae1a499dbd62 ae1a499dbd62 277c561f3f52 17cf34f73ca6 277c561f3f52 ae1a499dbd62 ae1a499dbd62 277c561f3f52 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 6c1d08d39449 6c1d08d39449 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 774d8236fa12 774d8236fa12 774d8236fa12 774d8236fa12 774d8236fa12 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 774d8236fa12 17cf34f73ca6 774d8236fa12 774d8236fa12 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 774d8236fa12 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 774d8236fa12 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 226882a5ed41 17cf34f73ca6 17cf34f73ca6 226882a5ed41 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 90fcfc170214 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 90fcfc170214 90fcfc170214 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 1bb9f7ac1072 1bb9f7ac1072 17cf34f73ca6 17cf34f73ca6 1bb9f7ac1072 d7f5980cc68a 1bb9f7ac1072 1bb9f7ac1072 1bb9f7ac1072 d7f5980cc68a 1bb9f7ac1072 1bb9f7ac1072 1bb9f7ac1072 1bb9f7ac1072 ae1a499dbd62 ae1a499dbd62 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 ae1a499dbd62 ae1a499dbd62 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 d7f5980cc68a 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 226882a5ed41 17cf34f73ca6 17cf34f73ca6 226882a5ed41 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 e4de7ba32dc1 17cf34f73ca6 17cf34f73ca6 17cf34f73ca6 226882a5ed41 17cf34f73ca6 17cf34f73ca6 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 ae1a499dbd62 | import os
import re
import pytest
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('client-relay-forbidden')
def test_open_relay(host):
"""
Tests if mail server behaves as open relay.
"""
no_recipients_accepted = 24
send = host.run('swaks --suppress-data --to root@client1 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Relay access denied" in send.stdout
send = host.run('swaks --suppress-data --to root@client1 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Relay access denied" in send.stdout
send = host.run('swaks --port 27 --suppress-data --to root@client1 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Relay access denied" in send.stdout
send = host.run('swaks --port 27 --suppress-data --to root@client1 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Relay access denied" in send.stdout
def test_mail_delivery(host):
"""
Tests if mails can be delivered to valid accounts. Has to be run on client
with no unauthenticated relay permissions.
"""
no_recipients_accepted = 24
# Valid accounts.
send = host.run('swaks --suppress-data --to john.doe@domain1 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks --suppress-data --to john.doe@domain1 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks --suppress-data --to jane.doe@domain2 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks --suppress-data --to jane.doe@domain2 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
# Invalid accounts.
send = host.run('swaks --suppress-data --to john.doe@domain2 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to john.doe@domain2 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to jane.doe@domain1 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to jane.doe@domain1 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
# Test for valid mail address that's not allowed by LDAP group membership.
send = host.run('swaks --suppress-data --to nomail@domain1 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to nomail@domain1 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
# Valid aliases.
send = host.run('swaks --suppress-data --to postmaster@domain1 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks --suppress-data --to postmaster@domain1 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks --suppress-data --to webmaster@domain2 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks --suppress-data --to webmaster@domain2 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
# Invalid aliases.
send = host.run('swaks --suppress-data --to postmaster@domain2 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to postmaster@domain2 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to webmaster@domain1 --server parameters-mandatory')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
send = host.run('swaks --suppress-data --to webmaster@domain1 --server parameters-optional')
assert send.rc == no_recipients_accepted
assert "Recipient address rejected: User unknown in virtual mailbox table" in send.stdout
def test_smtp_authentication(host):
"""
Tests if SMTP authentication works via TLS and allows sending mails to
anywhere.
"""
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
def test_smtp_authentication_with_alias_sender(host):
"""
Tests if SMTP authentication works via TLS and allows sending mails to
anywhere while using sender alias.
"""
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from postmaster@domain1 --to root@client1 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from postmaster@domain1 --to root@client1 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
def test_smtp_authentication_requires_tls(host):
"""
Tests if SMTP authentication requires TLS.
"""
auth_error = 28
send = host.run('swaks --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-mandatory')
assert send.rc == auth_error
assert "Host did not advertise authentication" in send.stderr
send = host.run('swaks --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-optional')
assert send.rc == auth_error
assert "Host did not advertise authentication" in send.stderr
def test_smtp_authentication_requires_submission_port(host):
"""
Tests if SMTP authentication cannot be done on regular SMTP port.
"""
auth_error = 28
send = host.run('swaks --port 25 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-mandatory')
assert send.rc == auth_error
assert "Host did not advertise authentication" in send.stderr
send = host.run('swaks -tls --port 25 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-mandatory')
assert send.rc == auth_error
assert "Host did not advertise authentication" in send.stderr
send = host.run('swaks --port 25 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-optional')
assert send.rc == auth_error
assert "Host did not advertise authentication" in send.stderr
send = host.run('swaks -tls --port 25 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-optional')
assert send.rc == auth_error
assert "Host did not advertise authentication" in send.stderr
def test_dovecot_inbox_separator(host):
"""
Tests if inbox separator has been configured correctly.
"""
pattern_slash_separator = re.compile(r'WARNING:imap-cli:Ignoring "LIST" response part : \([^)]*\) "/" INBOX')
pattern_dot_separator = re.compile(r'WARNING:imap-cli:Ignoring "LIST" response part : \([^)]*\) "\." INBOX')
status = host.run("imapcli status -c ~/imapcli-parameters-mandatory-john_doe.conf")
assert pattern_slash_separator.search(status.stdout) is not None
status = host.run("imapcli status -c ~/imapcli-parameters-optional-john_doe.conf")
assert pattern_dot_separator.search(status.stdout) is not None
@pytest.mark.parametrize("server", [
"parameters-mandatory",
"parameters-optional"
])
def test_imap_authentication_requires_tls(host, server):
"""
Tests if IMAP authentication requires TLS.
"""
capabilities_command = "a0001 CAPABILITY\na0002 LOGOUT"
# No TLS.
command = host.run("echo %s | nc %s 143", capabilities_command, server)
assert command.rc == 0
assert "LOGINDISABLED" in command.stdout
# STARTTLS.
command = host.run("echo %s | openssl s_client -quiet -connect %s:143 -starttls imap", capabilities_command, server)
assert command.rc == 0
assert "LOGINDISABLED" not in command.stdout
# TLS.
command = host.run("echo %s | openssl s_client -quiet -connect %s:993", capabilities_command, server)
assert command.rc == 0
assert "LOGINDISABLED" not in command.stdout
def test_sieve_authentication_requires_tls(host):
"""
Tests if SIEVE authentication requires TLS.
"""
# No TLS.
command = host.run("echo 'LOGOUT' | nc parameters-mandatory 4190")
assert command.rc == 0
assert "PLAIN LOGIN" not in command.stdout
command = host.run("echo 'LOGOUT' | nc parameters-optional 4190")
assert command.rc == 0
assert "PLAIN LOGIN" not in command.stdout
# STARTTLS
# @TODO: In case of failed login (authentication rejected),
# sieve-connect will return error code 255. However,
# internally Testinfra treats error code as if it is a
# signal from the SSH (over which the command is being run)
# that the SSH itself has failed, and throws a runtime
# exception. The use of || //bin/false is a workaround for
# now. It would be a good idea to get in contact with
# Testinfra maintainer and raise an issue around
# this. There are more similar uses of sieve-connect in the
# test files, don't forget to update those as well if some
# kind of better solution pops-up.
command = host.run("echo 'johnpassword' | sieve-connect -u john.doe@domain1 --password 0 --server parameters-mandatory --port 4190 --list || /bin/false")
assert command.rc == 0
command = host.run("echo 'johnpassword' | sieve-connect -u john.doe@domain1 --password 0 --server parameters-optional --port 4190 --list || /bin/false")
assert command.rc == 0
@pytest.mark.parametrize("server", [
"parameters-mandatory",
"parameters-optional"
])
@pytest.mark.parametrize("port", [
25,
26,
27,
587,
143,
993,
4190
])
def test_connectivity(host, server, port):
"""
Tests connectivity to the mail server (ports that should be reachable).
"""
with host.sudo():
ping = host.run('hping3 -S -p %s -c 1 %s', str(port), server)
assert ping.rc == 0
def test_port_forwarding(host):
"""
Tests if port forwarding is set-up correctly for additional SMTP and
submission ports.
"""
# Regular SMTP.
send = host.run('swaks -tls --port 27 --to john.doe@domain1 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks -tls --port 27 --to john.doe@domain1 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
# Submission port.
send = host.run('swaks -tls --port 26 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-mandatory')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
send = host.run('swaks -tls --port 26 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from john.doe@domain1 --to root@client1 --server parameters-optional')
assert send.rc == 0
assert "Ok: queued as" in send.stdout
def test_dovecot_sieve(host):
"""
Tests if Sieve service is available.
"""
# Test valid users.
command = host.run('echo johnpassword | sieve-connect --list -s parameters-mandatory -p 4190 -u john.doe@domain1 --password 0 || /bin/false')
assert command.rc == 0
command = host.run('echo janepassword | sieve-connect --list -s parameters-optional -p 4190 -u jane.doe@domain2 --password 0 || /bin/false')
assert command.rc == 0
# Test invalid users.
command = host.run('echo johnpassword | sieve-connect --list -s parameters-mandatory -p 4190 -u john.doe@domain2 --password 0 || /bin/false')
assert command.rc != 0
assert "Authentication refused by server" in command.stderr
command = host.run('echo janepassword | sieve-connect --list -s parameters-optional -p 4190 -u jane.doe@domain1 --password 0 || /bin/false')
assert command.rc != 0
assert "Authentication refused by server" in command.stderr
def test_smtp_sender_forging(host):
"""
Tests if SMTP sender forging is possible.
"""
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from jane.doe@domain2 --to root@client1 --server parameters-mandatory')
assert send.rc == 24
assert "Sender address rejected: not owned by user john.doe@domain1" in send.stdout
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from jane.doe@domain2 --to root@client1 --server parameters-optional')
assert send.rc == 24
assert "Sender address rejected: not owned by user john.doe@domain1" in send.stdout
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from webmaster@domain2 --to root@client1 --server parameters-mandatory')
assert send.rc == 24
assert "Sender address rejected: not owned by user john.doe@domain1" in send.stdout
send = host.run('swaks -tls --port 587 --auth-user john.doe@domain1 --auth-password johnpassword '
'--from webmaster@domain2 --to root@client1 --server parameters-optional')
assert send.rc == 24
assert "Sender address rejected: not owned by user john.doe@domain1" in send.stdout
|