mirror of
https://github.com/docker-mailserver/docker-mailserver.git
synced 2024-01-19 02:48:50 +00:00
300 lines
12 KiB
Makefile
300 lines
12 KiB
Makefile
NAME = tvial/docker-mailserver:testing
|
|
|
|
all: build-no-cache backup generate-accounts run generate-accounts-after-run fixtures tests clean
|
|
all-fast: build backup generate-accounts run generate-accounts-after-run fixtures tests clean
|
|
no-build: backup generate-accounts run generate-accounts-after-run fixtures tests clean
|
|
|
|
build-no-cache:
|
|
cd test/docker-openldap/ && docker build -f Dockerfile -t ldap --no-cache .
|
|
docker build --no-cache -t $(NAME) .
|
|
|
|
build:
|
|
cd test/docker-openldap/ && docker build -f Dockerfile -t ldap .
|
|
docker build -t $(NAME) .
|
|
|
|
backup:
|
|
# if backup directories exist, clean hasn't been called, therefore we shouldn't overwrite it. It still contains the original content.
|
|
@if [ ! -d config.bak ]; then\
|
|
cp -rp config config.bak; \
|
|
fi
|
|
@if [ ! -d testconfig.bak ]; then\
|
|
cp -rp test/config testconfig.bak ;\
|
|
fi
|
|
|
|
generate-accounts:
|
|
docker run --rm -e MAIL_USER=user1@localhost.localdomain -e MAIL_PASS=mypassword -t $(NAME) /bin/sh -c 'echo "$$MAIL_USER|$$(doveadm pw -s SHA512-CRYPT -u $$MAIL_USER -p $$MAIL_PASS)"' > test/config/postfix-accounts.cf
|
|
docker run --rm -e MAIL_USER=user2@otherdomain.tld -e MAIL_PASS=mypassword -t $(NAME) /bin/sh -c 'echo "$$MAIL_USER|$$(doveadm pw -s SHA512-CRYPT -u $$MAIL_USER -p $$MAIL_PASS)"' >> test/config/postfix-accounts.cf
|
|
|
|
run:
|
|
# Run containers
|
|
docker run -d --name mail \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-v "`pwd`/test/onedir":/var/mail-state \
|
|
-e ENABLE_CLAMAV=1 \
|
|
-e SPOOF_PROTECTION=1 \
|
|
-e ENABLE_SPAMASSASSIN=1 \
|
|
-e REPORT_RECIPIENT=user1@localhost.localdomain \
|
|
-e REPORT_SENDER=report1@mail.my-domain.com \
|
|
-e SA_TAG=-5.0 \
|
|
-e SA_TAG2=2.0 \
|
|
-e SA_KILL=3.0 \
|
|
-e SA_SPAM_SUBJECT="SPAM: " \
|
|
-e VIRUSMAILS_DELETE_DELAY=7 \
|
|
-e ENABLE_SRS=1 \
|
|
-e SASL_PASSWD="external-domain.com username:password" \
|
|
-e ENABLE_MANAGESIEVE=1 \
|
|
--cap-add=SYS_PTRACE \
|
|
-e PERMIT_DOCKER=host \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_privacy \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_CLAMAV=1 \
|
|
-e ENABLE_SPAMASSASSIN=1 \
|
|
-e SA_TAG=-5.0 \
|
|
-e SA_TAG2=2.0 \
|
|
-e SA_KILL=3.0 \
|
|
-e SA_SPAM_SUBJECT="SPAM: " \
|
|
-e VIRUSMAILS_DELETE_DELAY=7 \
|
|
-e SASL_PASSWD="external-domain.com username:password" \
|
|
-e ENABLE_MANAGESIEVE=1 \
|
|
--cap-add=SYS_PTRACE \
|
|
-e PERMIT_DOCKER=host \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_pop3 \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-v "`pwd`/test/config/letsencrypt":/etc/letsencrypt/live \
|
|
-e ENABLE_POP3=1 \
|
|
-e DMS_DEBUG=0 \
|
|
-e SSL_TYPE=letsencrypt \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_smtponly \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e SMTP_ONLY=1 \
|
|
-e PERMIT_DOCKER=network \
|
|
-e DMS_DEBUG=0 \
|
|
-e OVERRIDE_HOSTNAME=mail.my-domain.com \
|
|
-t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_smtponly_without_config \
|
|
-e SMTP_ONLY=1 \
|
|
-e ENABLE_LDAP=1 \
|
|
-e PERMIT_DOCKER=network \
|
|
-e OVERRIDE_HOSTNAME=mail.mydomain.com \
|
|
-t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_override_hostname \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e PERMIT_DOCKER=network \
|
|
-e DMS_DEBUG=0 \
|
|
-e ENABLE_SRS=1 \
|
|
-e OVERRIDE_HOSTNAME=mail.my-domain.com \
|
|
-h unknown.domain.tld \
|
|
-t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_domainname \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e PERMIT_DOCKER=network \
|
|
-e DMS_DEBUG=0 \
|
|
-e ENABLE_SRS=1 \
|
|
-e DOMAINNAME=my-domain.com \
|
|
-h unknown.domain.tld \
|
|
-t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_srs_domainname \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e PERMIT_DOCKER=network \
|
|
-e DMS_DEBUG=0 \
|
|
-e ENABLE_SRS=1 \
|
|
-e SRS_DOMAINNAME=srs.my-domain.com \
|
|
-e DOMAINNAME=my-domain.com \
|
|
-h unknown.domain.tld \
|
|
-t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_fail2ban \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_FAIL2BAN=1 \
|
|
-e POSTSCREEN_ACTION=ignore \
|
|
--cap-add=NET_ADMIN \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_fetchmail \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_FETCHMAIL=1 \
|
|
--cap-add=NET_ADMIN \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_disabled_clamav_spamassassin \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_CLAMAV=0 \
|
|
-e ENABLE_SPAMASSASSIN=0 \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_manual_ssl \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e SSL_TYPE=manual \
|
|
-e SSL_CERT_PATH=/tmp/docker-mailserver/letsencrypt/mail.my-domain.com/fullchain.pem \
|
|
-e SSL_KEY_PATH=/tmp/docker-mailserver/letsencrypt/mail.my-domain.com/privkey.pem \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name ldap_for_mail \
|
|
-e LDAP_DOMAIN="localhost.localdomain" \
|
|
-h ldap.my-domain.com -t ldap
|
|
sleep 15
|
|
docker run -d --name mail_with_ldap \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_LDAP=1 \
|
|
-e LDAP_SERVER_HOST=ldap \
|
|
-e LDAP_START_TLS=no \
|
|
-e SPOOF_PROTECTION=1 \
|
|
-e LDAP_SEARCH_BASE=ou=people,dc=localhost,dc=localdomain \
|
|
-e LDAP_BIND_DN=cn=admin,dc=localhost,dc=localdomain \
|
|
-e LDAP_BIND_PW=admin \
|
|
-e LDAP_QUERY_FILTER_USER="(&(mail=%s)(mailEnabled=TRUE))" \
|
|
-e LDAP_QUERY_FILTER_GROUP="(&(mailGroupMember=%s)(mailEnabled=TRUE))" \
|
|
-e LDAP_QUERY_FILTER_ALIAS="(|(&(mailAlias=%s)(objectClass=PostfixBookMailForward))(&(mailAlias=%s)(objectClass=PostfixBookMailAccount)(mailEnabled=TRUE)))" \
|
|
-e LDAP_QUERY_FILTER_DOMAIN="(|(&(mail=*@%s)(objectClass=PostfixBookMailAccount)(mailEnabled=TRUE))(&(mailGroupMember=*@%s)(objectClass=PostfixBookMailAccount)(mailEnabled=TRUE))(&(mailalias=*@%s)(objectClass=PostfixBookMailForward)))" \
|
|
-e DOVECOT_TLS=no \
|
|
-e DOVECOT_PASS_FILTER="(&(objectClass=PostfixBookMailAccount)(uniqueIdentifier=%n))" \
|
|
-e DOVECOT_USER_FILTER="(&(objectClass=PostfixBookMailAccount)(uniqueIdentifier=%n))" \
|
|
-e REPORT_RECIPIENT=1 \
|
|
-e ENABLE_SASLAUTHD=1 \
|
|
-e SASLAUTHD_MECHANISMS=ldap \
|
|
-e SASLAUTHD_LDAP_SERVER=ldap \
|
|
-e SASLAUTHD_LDAP_BIND_DN=cn=admin,dc=localhost,dc=localdomain \
|
|
-e SASLAUTHD_LDAP_PASSWORD=admin \
|
|
-e SASLAUTHD_LDAP_SEARCH_BASE=ou=people,dc=localhost,dc=localdomain \
|
|
-e POSTMASTER_ADDRESS=postmaster@localhost.localdomain \
|
|
-e DMS_DEBUG=0 \
|
|
--link ldap_for_mail:ldap \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_with_imap \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_SASLAUTHD=1 \
|
|
-e SASLAUTHD_MECHANISMS=rimap \
|
|
-e SASLAUTHD_MECH_OPTIONS=127.0.0.1 \
|
|
-e POSTMASTER_ADDRESS=postmaster@localhost.localdomain \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_postscreen \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e POSTSCREEN_ACTION=enforce \
|
|
--cap-add=NET_ADMIN \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 15
|
|
docker run -d --name mail_lmtp_ip \
|
|
-v "`pwd`/test/config":/tmp/docker-mailserver \
|
|
-v "`pwd`/test/config/dovecot-lmtp":/etc/dovecot \
|
|
-v "`pwd`/test/test-files":/tmp/docker-mailserver-test:ro \
|
|
-e ENABLE_POSTFIX_VIRTUAL_TRANSPORT=1 \
|
|
-e POSTFIX_DAGENT=lmtp:127.0.0.1:24 \
|
|
-e DMS_DEBUG=0 \
|
|
-h mail.my-domain.com -t $(NAME)
|
|
sleep 30
|
|
|
|
generate-accounts-after-run:
|
|
docker run --rm -e MAIL_USER=added@localhost.localdomain -e MAIL_PASS=mypassword -t $(NAME) /bin/sh -c 'echo "$$MAIL_USER|$$(doveadm pw -s SHA512-CRYPT -u $$MAIL_USER -p $$MAIL_PASS)"' >> test/config/postfix-accounts.cf
|
|
docker exec mail addmailuser pass@localhost.localdomain 'may be \a `p^a.*ssword'
|
|
|
|
sleep 10
|
|
|
|
fixtures:
|
|
# Setup sieve & create filtering folder (INBOX/spam)
|
|
docker cp "`pwd`/test/config/sieve/dovecot.sieve" mail:/var/mail/localhost.localdomain/user1/.dovecot.sieve
|
|
docker exec mail /bin/sh -c "maildirmake.dovecot /var/mail/localhost.localdomain/user1/.INBOX.spam"
|
|
docker exec mail /bin/sh -c "chown 5000:5000 -R /var/mail/localhost.localdomain/user1/.INBOX.spam"
|
|
sleep 30
|
|
# Sending test mails
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/amavis-spam.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/amavis-virus.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-alias-external.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-alias-local.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-alias-recipient-delimiter.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-user1.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-user2.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-added.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-user-and-cc-local-alias.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-regexp-alias-external.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-regexp-alias-local.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-catchall-local.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/sieve-spam-folder.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/sieve-pipe.txt"
|
|
docker exec mail /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/non-existing-user.txt"
|
|
docker exec mail_disabled_clamav_spamassassin /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-user1.txt"
|
|
docker exec mail /bin/sh -c "sendmail root < /tmp/docker-mailserver-test/email-templates/root-email.txt"
|
|
# postfix virtual transport lmtp
|
|
docker exec mail_lmtp_ip /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-user1.txt"
|
|
docker exec mail_privacy /bin/sh -c "openssl s_client -quiet -starttls smtp -connect 0.0.0.0:587 < /tmp/docker-mailserver-test/email-templates/send-privacy-email.txt"
|
|
docker exec mail_override_hostname /bin/sh -c "nc 0.0.0.0 25 < /tmp/docker-mailserver-test/email-templates/existing-user1.txt"
|
|
# Wait for mails to be analyzed
|
|
sleep 80
|
|
|
|
tests:
|
|
# Start tests
|
|
./test/bats/bin/bats test/*.bats
|
|
|
|
.PHONY: ALWAYS_RUN
|
|
|
|
test/%.bats: ALWAYS_RUN
|
|
./test/bats/bin/bats $@
|
|
|
|
lint:
|
|
# List files which name starts with 'Dockerfile'
|
|
# eg. Dockerfile, Dockerfile.build, etc.
|
|
git ls-files --exclude='Dockerfile*' --ignored | xargs --max-lines=1 hadolint
|
|
|
|
clean:
|
|
# Remove running test containers
|
|
-docker rm -f \
|
|
mail \
|
|
mail_privacy \
|
|
mail_pop3 \
|
|
mail_smtponly \
|
|
mail_smtponly_without_config \
|
|
mail_fail2ban \
|
|
mail_fetchmail \
|
|
fail-auth-mailer \
|
|
mail_disabled_clamav_spamassassin \
|
|
mail_manual_ssl \
|
|
ldap_for_mail \
|
|
mail_with_ldap \
|
|
mail_with_imap \
|
|
mail_lmtp_ip \
|
|
mail_postscreen \
|
|
mail_override_hostname \
|
|
mail_domainname \
|
|
mail_srs_domainname
|
|
|
|
@if [ -d config.bak ]; then\
|
|
rm -rf config ;\
|
|
mv config.bak config ;\
|
|
fi
|
|
@if [ -d testconfig.bak ]; then\
|
|
sudo rm -rf test/config ;\
|
|
mv testconfig.bak test/config ;\
|
|
fi
|
|
-sudo rm -rf test/onedir test/alias test/relay test/config/dovecot-lmtp/userdb test/config/key* test/config/opendkim/keys/domain.tld/ test/config/opendkim/keys/example.com/ test/config/opendkim/keys/localdomain2.com/ test/config/postfix-aliases.cf test/config/postfix-receive-access.cf test/config/postfix-receive-access.cfe test/config/postfix-send-access.cf test/config/postfix-send-access.cfe test/config/relay-hosts/chksum test/config/relay-hosts/postfix-aliases.cf
|