123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393 |
- # Copyright (C) 2012-2024 Zammad Foundation, https://zammad-foundation.org/
- require 'rails_helper'
- RSpec.describe EmailHelper::Probe, integration: true, required_envs: %w[MAIL_SERVER MAIL_ADDRESS MAIL_PASS] do
- let(:expected_result_failed) { { result: 'failed', message: message_human, } }
- let(:expected_result_invalid) { { result: 'invalid', message_human: message_human, } }
- before do
- allow(EmailHelper).to receive(:mx_records).and_return([ ENV['MAIL_SERVER'] ])
- end
- shared_examples 'probe tests with invalid result' do
- it 'contains all information for an invalid result' do
- expect(probe_result).to include(
- result: expected_result_invalid[:result],
- message_human: be_in(expected_result_invalid[:message_human]),
- settings: include(
- options: include(
- host: host,
- ),
- ),
- )
- end
- end
- describe '#inbound' do
- subject(:probe_result) { described_class.inbound(inbound_params) }
- let(:inbound_params) do
- {
- adapter: adapter,
- options: {
- host: host,
- port: port,
- ssl: true,
- user: user,
- password: password,
- ssl_verify: false,
- },
- }
- end
- let(:adapter) { 'imap' }
- let(:port) { 993 }
- let(:user) { 'some@example.com' }
- let(:password) { 'password' }
- context 'with unknown adapter' do
- let(:adapter) { 'imap2' }
- let(:host) { 'nonexisting_host' }
- let(:message_human) { "Unknown adapter '#{adapter}'" }
- it { is_expected.to eq(expected_result_failed) }
- end
- context 'when network issues are present' do
- let(:host) { 'nonexisting_host' }
- let(:message_human) { 'The hostname could not be found.' }
- include_examples 'probe tests with invalid result'
- end
- context 'when an imap service with a blocked port is used' do
- let(:host) { '127.0.0.1' }
- let(:port) { 8 } # no service to be expected
- let(:message_human) { 'The connection was refused.' }
- include_examples 'probe tests with invalid result'
- end
- context 'when host is not reachable' do
- let(:host) { nil }
- let(:message_human) { [ 'This host cannot be reached.', 'There is no route to this host.' ] }
- before do
- allow(Socket).to receive(:tcp).and_raise(Errno::EHOSTUNREACH)
- end
- include_examples 'probe tests with invalid result'
- end
- context 'when authentication fails' do
- let(:host) { ENV['MAIL_SERVER'] }
- let(:message_human) { [ 'Authentication failed.', 'This host cannot be reached.' ] }
- include_examples 'probe tests with invalid result'
- end
- context 'when doing a real test' do
- let(:host) { ENV['MAIL_SERVER'] }
- let(:user) { ENV['MAIL_ADDRESS'] }
- let(:password) { ENV['MAIL_PASS'] }
- it { is_expected.to include(result: 'ok') }
- end
- end
- describe '#outbound' do
- subject(:probe_result) { described_class.outbound(outbound_params, user) }
- let(:outbound_params) do
- {
- adapter: adapter,
- options: {
- host: host,
- port: port,
- start_tls: true,
- user: user,
- password: password,
- ssl_verify: false,
- },
- }
- end
- let(:adapter) { 'smtp' }
- let(:port) { 25 }
- let(:user) { 'some@example.com' }
- let(:password) { 'password' }
- context 'with unknown adapter' do
- let(:adapter) { 'imap2' }
- let(:host) { 'nonexisting_host' }
- let(:message_human) { "Unknown adapter '#{adapter}'" }
- it { is_expected.to eq(expected_result_failed) }
- end
- context 'when network issues are present' do
- let(:host) { 'nonexisting_host' }
- let(:message_human) { 'The hostname could not be found.' }
- include_examples 'probe tests with invalid result'
- end
- context 'when an imap service with a blocked port is used' do
- let(:host) { '127.0.0.1' }
- let(:port) { 8 } # no service to be expected
- let(:message_human) { 'The connection was refused.' }
- include_examples 'probe tests with invalid result'
- end
- context 'when host is not reachable' do
- let(:host) { nil }
- let(:message_human) { [ 'This host cannot be reached.', 'There is no route to this host.' ] }
- before do
- allow(TCPSocket).to receive(:open).and_raise(Errno::EHOSTUNREACH)
- end
- include_examples 'probe tests with invalid result'
- end
- context 'when authentication fails' do
- let(:host) { ENV['MAIL_SERVER'] }
- let(:port) { 25 }
- let(:message_human) { 'Authentication failed.' }
- include_examples 'probe tests with invalid result'
- end
- context 'when doing a real test' do
- let(:host) { ENV['MAIL_SERVER'] }
- let(:port) { 25 }
- let(:user) { ENV['MAIL_ADDRESS'] }
- let(:password) { ENV['MAIL_PASS'] }
- let(:outbound_params) do
- {
- adapter: adapter,
- options: {
- host: host,
- port: port,
- user: user,
- ssl: false,
- password: password,
- ssl_verify: false,
- },
- }
- end
- it { is_expected.to include(result: 'ok') }
- end
- end
- describe '#full' do
- subject(:probe_result) { described_class.full(full_params) }
- let(:full_params) do
- {
- email: email,
- password: password,
- ssl_verify: (ssl_verify if defined? ssl_verify),
- }
- end
- context 'when providing invalid information' do
- let(:email) { 'invalid_format' }
- let(:password) { 'somepass' }
- it 'contains all information for an invalid probe' do
- expect(probe_result)
- .to include(
- result: 'invalid'
- )
- .and not_include('setting')
- end
- end
- context 'when SSL Verify setting is set according to provider configuration', :aggregate_failures do
- before do
- allow(described_class).to receive_messages(
- inbound: { result: 'ok' },
- outbound: { result: 'ok' }
- )
- end
- let(:mock_server) do
- {
- adapter: 'imap',
- options: {
- host: 'imap',
- port: 993,
- ssl: mock_server_ssl,
- start_tls: mock_server_starttls,
- user: 'user',
- password: 'password',
- },
- }
- end
- let(:mock_providers) do
- {
- bigtech: {
- domain: 'bigtechmail.com',
- inbound: mock_server,
- outbound: mock_server,
- },
- }
- end
- context 'when using a provider' do
- before { allow(EmailHelper).to receive(:provider).and_return(mock_providers) }
- context 'when server has no SSL or STARTTLS' do
- let(:mock_server_ssl) { false }
- let(:mock_server_starttls) { false }
- let(:config) { mock_server.deep_dup.tap { _1[:options][:ssl_verify] = false } }
- it 'adds ssl_verify set to false' do
- described_class.full(email: 'user@bigtechmail.com')
- expect(described_class).to have_received(:inbound).with(config)
- expect(described_class).to have_received(:outbound).with(config, anything)
- end
- end
- context 'when server has SSL' do
- let(:mock_server_ssl) { true }
- let(:mock_server_starttls) { false }
- let(:config) { mock_server.deep_dup.tap { _1[:options][:ssl_verify] = true } }
- it 'adds ssl_verify set to true' do
- described_class.full(email: 'user@bigtechmail.com')
- expect(described_class).to have_received(:inbound).with(config)
- expect(described_class).to have_received(:outbound).with(config, anything)
- end
- end
- context 'when server has STARTTLS' do
- let(:mock_server_ssl) { false }
- let(:mock_server_starttls) { true }
- let(:config) { mock_server.deep_dup.tap { _1[:options][:ssl_verify] = true } }
- it 'adds ssl_verify set to true' do
- described_class.full(email: 'user@bigtechmail.com')
- expect(described_class).to have_received(:inbound).with(config)
- expect(described_class).to have_received(:outbound).with(config, anything)
- end
- end
- end
- context 'when using a custom server' do
- before do
- allow(EmailHelper).to receive_messages(
- provider_inbound_mx: [],
- provider_outbound_mx: [],
- provider_inbound_guess: [mock_server],
- provider_outbound_guess: [mock_server]
- )
- end
- context 'when server has no SSL or STARTTLS' do
- let(:mock_server_ssl) { false }
- let(:mock_server_starttls) { false }
- let(:config) { mock_server.deep_dup.tap { _1[:options][:ssl_verify] = false } }
- it 'adds ssl_verify set to false' do
- described_class.full(email: 'user@example.com')
- expect(described_class).to have_received(:inbound).with(config)
- expect(described_class).to have_received(:outbound).with(config, anything)
- end
- end
- context 'when server has SSL' do
- let(:mock_server_ssl) { true }
- let(:mock_server_starttls) { false }
- let(:config) { mock_server.deep_dup.tap { _1[:options][:ssl_verify] = true } }
- it 'adds ssl_verify set to true' do
- described_class.full(email: 'user@example.com')
- expect(described_class).to have_received(:inbound).with(config)
- expect(described_class).to have_received(:outbound).with(config, anything)
- end
- end
- context 'when server has STARTTLS' do
- let(:mock_server_ssl) { false }
- let(:mock_server_starttls) { true }
- let(:config) { mock_server.deep_dup.tap { _1[:options][:ssl_verify] = true } }
- it 'adds ssl_verify set to true' do
- described_class.full(email: 'user@example.com')
- expect(described_class).to have_received(:inbound).with(config)
- expect(described_class).to have_received(:outbound).with(config, anything)
- end
- end
- end
- end
- context 'when doing real tests' do
- let(:email) { ENV['MAIL_ADDRESS'] }
- let(:password) { ENV['MAIL_PASS'] }
- shared_examples 'do real testing' do
- it 'contains all information for a successful probe' do
- expect(probe_result).to include(result: 'ok')
- .and include(
- setting: include(
- inbound: include(
- options: include(
- host: host
- ),
- ),
- ),
- )
- .and include(
- setting: include(
- outbound: include(
- options: include(
- host: host,
- ),
- ),
- ),
- )
- end
- end
- context 'when doing a real test' do
- let(:host) { ENV['MAIL_SERVER'] }
- context 'with ssl verification turned on' do
- let(:ssl_verify) { true }
- before do
- # Import CA certificate into the trust store.
- SSLCertificate.create!(certificate: Rails.root.join('spec/fixtures/files/imap/ca.crt').read)
- end
- include_examples 'do real testing'
- end
- context 'with ssl verification turned off' do
- let(:ssl_verify) { false }
- include_examples 'do real testing'
- end
- end
- end
- end
- end
|