2 # Copyright (C) 2020 all contributors <meta@public-inbox.org>
3 # License: AGPL-3.0+ <https://www.gnu.org/licenses/agpl-3.0.txt>
6 use PublicInbox::TestCommon;
7 require_mods(qw(DBD::SQLite Mail::IMAPClient));
10 require_mods('Search::Xapian', 1);
15 #push(@V, 2) if require_git('2.6', 1);
17 my ($tmpdir, $for_destroy) = tmpdir();
18 my $home = "$tmpdir/home";
19 local $ENV{HOME} = $home;
22 my $addr = "i$V\@example.com";
24 my $url = "http://example.com/i$V";
25 my $inboxdir = "$tmpdir/$name";
26 my $folder = "inbox.i$V";
27 my $cmd = ['-init', "-V$V", $level, $name, $inboxdir, $url, $addr];
28 run_script($cmd) or BAIL_OUT("init $name");
29 xsys(qw(git config), "--file=$ENV{HOME}/.public-inbox/config",
30 "publicinbox.$name.newsgroup", $folder) == 0 or
31 BAIL_OUT("setting newsgroup $V");
33 xsys(qw(git config), "--file=$ENV{HOME}/.public-inbox/config",
34 'publicinboxmda.spamcheck', 'none') == 0 or
35 BAIL_OUT("config: $?");
37 open(my $fh, '<', 't/utf8.eml') or BAIL_OUT("open t/utf8.eml: $!");
38 my $env = { ORIGINAL_RECIPIENT => $addr };
39 run_script(['-mda', '--no-precheck'], $env, { 0 => $fh }) or
40 BAIL_OUT('-mda delivery');
42 run_script(['-index', $inboxdir]) or BAIL_OUT("index $?");
45 my $sock = tcp_server();
46 my $err = "$tmpdir/stderr.log";
47 my $out = "$tmpdir/stdout.log";
48 my $cmd = [ '-imapd', '-W0', "--stdout=$out", "--stderr=$err" ];
49 my $td = start_script($cmd, undef, { 3 => $sock }) or BAIL_OUT("-imapd: $?");
51 Server => $sock->sockhost,
52 Port => $sock->sockport,
55 my $mic = Mail::IMAPClient->new(%mic_opt);
56 my $pre_login_capa = $mic->capability;
57 is(grep(/\AAUTH=ANONYMOUS\z/, @$pre_login_capa), 1,
58 'AUTH=ANONYMOUS advertised pre-login');
60 $mic->User('lorelei');
61 $mic->Password('Hunter2');
62 ok($mic->login && $mic->IsAuthenticated, 'LOGIN works');
63 my $post_login_capa = $mic->capability;
64 ok(join("\n", @$pre_login_capa) ne join("\n", @$post_login_capa),
65 'got different capabilities post-login');
67 $mic_opt{Authmechanism} = 'ANONYMOUS';
68 $mic_opt{Authcallback} = sub { '' };
69 $mic = Mail::IMAPClient->new(%mic_opt);
70 ok($mic && $mic->login && $mic->IsAuthenticated, 'AUTHENTICATE ANONYMOUS');
71 my $post_auth_anon_capa = $mic->capability;
72 is_deeply($post_auth_anon_capa, $post_login_capa,
73 'auth anon has same capabilities');
75 ok(!$mic->examine('foo') && ($e = $@), 'EXAMINE non-existent');
76 like($e, qr/\bNO\b/, 'got a NO on EXAMINE for non-existent');
77 ok(!$mic->select('foo') && ($e = $@), 'EXAMINE non-existent');
78 like($e, qr/\bNO\b/, 'got a NO on EXAMINE for non-existent');
79 ok($mic->select('inbox.i1'), 'SELECT succeeds');
80 ok($mic->examine('inbox.i1'), 'EXAMINE succeeds');
82 my $ret = $mic->search('all') or BAIL_OUT "SEARCH FAIL $@";
83 is_deeply($ret, [ 1 ], 'search all works');
84 $ret = $mic->search('uid 1') or BAIL_OUT "SEARCH FAIL $@";
85 is_deeply($ret, [ 1 ], 'search UID 1 works');
86 $ret = $mic->search('uid 1:1') or BAIL_OUT "SEARCH FAIL $@";
87 is_deeply($ret, [ 1 ], 'search UID 1:1 works');
88 $ret = $mic->search('uid 1:*') or BAIL_OUT "SEARCH FAIL $@";
89 is_deeply($ret, [ 1 ], 'search UID 1:* works');
91 is_deeply(scalar $mic->flags('1'), [], '->flags works');
93 for my $r ('1:*', '1') {
94 $ret = $mic->fetch_hash($r, 'RFC822') or BAIL_OUT "FETCH $@";
95 is_deeply([keys %$ret], [1]);
96 like($ret->{1}->{RFC822}, qr/\r\n\r\nThis is a test/, 'read full');
98 # ensure Mail::IMAPClient behaves
99 my $str = $mic->message_string($r) or BAIL_OUT "->message_string: $@";
100 is($str, $ret->{1}->{RFC822}, '->message_string works as expected');
102 my $sz = $mic->fetch_hash($r, 'RFC822.size') or BAIL_OUT "FETCH $@";
103 is($sz->{1}->{'RFC822.SIZE'}, length($ret->{1}->{RFC822}),
106 $ret = $mic->fetch_hash($r, 'RFC822.HEADER') or BAIL_OUT "FETCH $@";
107 is_deeply([keys %$ret], [1]);
108 like($ret->{1}->{'RFC822.HEADER'},
109 qr/^Message-ID: <testmessage\@example\.com>/ms, 'read header');
111 $ret = $mic->fetch_hash($r, 'INTERNALDATE') or BAIL_OUT "FETCH $@";
112 is($ret->{1}->{'INTERNALDATE'}, '01-Jan-1970 00:00:00 +0000',
113 'internaldate matches');
114 ok(!$mic->fetch_hash($r, 'INFERNALDATE'), 'bogus attribute fails');
116 my $envelope = $mic->get_envelope($r) or BAIL_OUT("get_envelope: $@");
117 is($envelope->{bcc}, 'NIL', 'empty bcc');
118 is($envelope->{messageid}, '<testmessage@example.com>', 'messageid');
119 is(scalar @{$envelope->{to}}, 1, 'one {to} header');
120 # *sigh* too much to verify...
121 #use Data::Dumper; diag Dumper($envelope);
123 $ret = $mic->fetch_hash($r, 'FLAGS') or BAIL_OUT "FETCH $@";
124 is_deeply($ret->{1}->{FLAGS}, '', 'no flags');
127 # Mail::IMAPClient ->compress creates cyclic reference:
128 # https://rt.cpan.org/Ticket/Display.html?id=132654
129 my $compress_logout = sub {
131 ok($c->logout, 'logout ok after ->compress');
132 # all documented in Mail::IMAPClient manpage:
133 for (qw(Readmoremethod Readmethod Prewritemethod)) {
138 is_deeply([$mic->has_capability('COMPRESS')], ['DEFLATE'], 'deflate cap');
139 ok($mic->compress, 'compress enabled');
140 $compress_logout->($mic);
144 is($?, 0, 'no error in exited process');
145 open my $fh, '<', $err or BAIL_OUT("open $err failed: $!");
146 my $eout = do { local $/; <$fh> };
147 unlike($eout, qr/wide/i, 'no Wide character warnings');