147 lines
4.9 KiB
Rust
147 lines
4.9 KiB
Rust
/*
|
|
* This file is part of mailpot
|
|
*
|
|
* Copyright 2020 - Manos Pitsidianakis
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
* License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
use mailpot::{models::*, Configuration, Connection, SendMail};
|
|
use mailpot_tests::init_stderr_logging;
|
|
use tempfile::TempDir;
|
|
|
|
#[test]
|
|
fn test_accounts() {
|
|
init_stderr_logging();
|
|
|
|
const SSH_KEY: &[u8] = include_bytes!("./ssh_key.pub");
|
|
|
|
let tmp_dir = TempDir::new().unwrap();
|
|
|
|
let db_path = tmp_dir.path().join("mpot.db");
|
|
let config = Configuration {
|
|
send_mail: SendMail::ShellCommand("/usr/bin/false".to_string()),
|
|
db_path,
|
|
data_path: tmp_dir.path().to_path_buf(),
|
|
administrators: vec![],
|
|
};
|
|
|
|
let db = Connection::open_or_create_db(config).unwrap().trusted();
|
|
assert!(db.lists().unwrap().is_empty());
|
|
let foo_chat = db
|
|
.create_list(MailingList {
|
|
pk: 0,
|
|
name: "foobar chat".into(),
|
|
id: "foo-chat".into(),
|
|
address: "foo-chat@example.com".into(),
|
|
description: None,
|
|
archive_url: None,
|
|
})
|
|
.unwrap();
|
|
|
|
assert_eq!(foo_chat.pk(), 1);
|
|
let lists = db.lists().unwrap();
|
|
assert_eq!(lists.len(), 1);
|
|
assert_eq!(lists[0], foo_chat);
|
|
let post_policy = db
|
|
.set_list_post_policy(PostPolicy {
|
|
pk: 0,
|
|
list: foo_chat.pk(),
|
|
announce_only: false,
|
|
subscription_only: true,
|
|
approval_needed: false,
|
|
open: false,
|
|
custom: false,
|
|
})
|
|
.unwrap();
|
|
|
|
assert_eq!(post_policy.pk(), 1);
|
|
assert_eq!(db.error_queue().unwrap().len(), 0);
|
|
assert_eq!(db.list_subscriptions(foo_chat.pk()).unwrap().len(), 0);
|
|
|
|
let mut db = db.untrusted();
|
|
|
|
let subscribe_bytes = b"From: Name <user@example.com>
|
|
To: <foo-chat+subscribe@example.com>
|
|
Subject: subscribe
|
|
Date: Thu, 29 Oct 2020 13:58:16 +0000
|
|
Message-ID:
|
|
<PS1PR0601MB36750BD00EA89E1482FA98A2D5140_2@PS1PR0601MB3675.apcprd06.example.com>
|
|
Content-Language: en-US
|
|
Content-Type: text/html
|
|
Content-Transfer-Encoding: base64
|
|
MIME-Version: 1.0
|
|
|
|
";
|
|
let envelope =
|
|
melib::Envelope::from_bytes(subscribe_bytes, None).expect("Could not parse message");
|
|
db.post(&envelope, subscribe_bytes, /* dry_run */ false)
|
|
.unwrap();
|
|
assert_eq!(db.list_subscriptions(foo_chat.pk()).unwrap().len(), 1);
|
|
assert_eq!(db.error_queue().unwrap().len(), 0);
|
|
|
|
assert_eq!(db.account_by_address("user@example.com").unwrap(), None);
|
|
|
|
println!(
|
|
"Check that sending a password request without having an account creates the account."
|
|
);
|
|
const PASSWORD_REQ: &[u8] = b"From: Name <user@example.com>
|
|
To: <foo-chat+request@example.com>
|
|
Subject: password
|
|
Date: Thu, 29 Oct 2020 13:58:16 +0000
|
|
Message-ID:
|
|
<PS1PR0601MB36750BD00EA89E1482FA98A2D5140@PS1PR0601MB3675.apcprd06.example.com>
|
|
Content-Language: en-US
|
|
Content-Type: text/plain; charset=ascii
|
|
Content-Transfer-Encoding: 8bit
|
|
MIME-Version: 1.0
|
|
|
|
";
|
|
let mut set_password_bytes = PASSWORD_REQ.to_vec();
|
|
set_password_bytes.extend(SSH_KEY.iter().cloned());
|
|
|
|
let envelope =
|
|
melib::Envelope::from_bytes(&set_password_bytes, None).expect("Could not parse message");
|
|
db.post(&envelope, &set_password_bytes, /* dry_run */ false)
|
|
.unwrap();
|
|
assert_eq!(db.error_queue().unwrap().len(), 0);
|
|
let acc = db.account_by_address("user@example.com").unwrap().unwrap();
|
|
|
|
assert_eq!(
|
|
acc.password.as_bytes(),
|
|
SSH_KEY,
|
|
"SSH public key / passwords didn't match. Account has {:?} but expected {:?}",
|
|
String::from_utf8_lossy(acc.password.as_bytes()),
|
|
String::from_utf8_lossy(SSH_KEY)
|
|
);
|
|
|
|
println!("Check that sending a password request with an account updates the password field.");
|
|
|
|
let mut set_password_bytes = PASSWORD_REQ.to_vec();
|
|
set_password_bytes.push(b'a');
|
|
set_password_bytes.extend(SSH_KEY.iter().cloned());
|
|
|
|
let envelope =
|
|
melib::Envelope::from_bytes(&set_password_bytes, None).expect("Could not parse message");
|
|
db.post(&envelope, &set_password_bytes, /* dry_run */ false)
|
|
.unwrap();
|
|
assert_eq!(db.error_queue().unwrap().len(), 0);
|
|
let acc = db.account_by_address("user@example.com").unwrap().unwrap();
|
|
|
|
assert!(
|
|
acc.password.as_bytes() != SSH_KEY,
|
|
"SSH public key / password should have changed.",
|
|
);
|
|
}
|