1
0
mirror of https://github.com/mail-in-a-box/mailinabox.git synced 2025-04-04 00:17:06 +00:00
mailinabox/tests/suites/_mgmt-functions.sh
downtownallday 1f0d2ddb92 Issue #1340 - LDAP backend for accounts
This commit will:

1. Change the user account database from sqlite to OpenLDAP
2. Add policyd-spf to postfix for SPF validation
3. Add a test runner with some automated test suites

Notes:

User account password hashes are preserved.

There is a new Roundcube contact list called "Directory" that lists the users in LDAP (MiaB users), similar to what Google Suite does.

Users can still change their password in Roundcube.

OpenLDAP is configured with TLS, but all remote access is blocked by firewall rules. Manual changes are required to open it for remote access (eg. "ufw allow proto tcp from <HOST> to any port ldaps").

The test runner is started by executing tests/runner.sh. Be aware that it will make changes to your system, including adding new users, domains, mailboxes, start/stop services, etc. It is highly unadvised to run it on a production system!

The LDAP schema that supports mail delivery with postfix and dovecot is located in conf/postfix.schema. This file is copied verbatim from the LdapAdmin project (GPL, ldapadmin.org). Instead of including the file in git, it could be referenced by URL and downloaded by the setup script if GPL is an issue or apply for a PEN from IANA.

Mangement console and other services should not appear or behave any differently than before.
2020-01-17 17:03:21 -05:00

176 lines
5.0 KiB
Bash

# -*- indent-tabs-mode: t; tab-width: 4; -*-
# Available REST calls:
#
# general curl format:
# curl -X <b>VERB</b> [-d "<b>parameters</b>"] --user {email}:{password} https://{{hostname}}/admin/mail/users[<b>action</b>]
# ALIASES:
# curl -X GET https://{{hostname}}/admin/mail/aliases?format=json
# curl -X POST -d "address=new_alias@mydomail.com" -d "forwards_to=my_email@mydomain.com" https://{{hostname}}/admin/mail/aliases/add
# curl -X POST -d "address=new_alias@mydomail.com" https://{{hostname}}/admin/mail/aliases/remove
# USERS:
# curl -X GET https://{{hostname}}/admin/mail/users?format=json
# curl -X POST -d "email=new_user@mydomail.com" -d "password=s3curE_pa5Sw0rD" https://{{hostname}}/admin/mail/users/add
# curl -X POST -d "email=new_user@mydomail.com" https://{{hostname}}/admin/mail/users/remove
# curl -X POST -d "email=new_user@mydomail.com" -d "privilege=admin" https://{{hostname}}/admin/mail/users/privileges/add
# curl -X POST -d "email=new_user@mydomail.com" https://{{hostname}}/admin/mail/users/privileges/remove
mgmt_start() {
# Must be called before performing any REST calls
local domain="${1:-somedomain.com}"
MGMT_ADMIN_EMAIL="test_admin@$domain"
MGMT_ADMIN_PW="$(generate_password)"
delete_user "$MGMT_ADMIN_EMAIL"
record "[Creating a new account with admin rights for management tests]"
create_user "$MGMT_ADMIN_EMAIL" "$MGMT_ADMIN_PW" "admin"
MGMT_ADMIN_DN="$ATTR_DN"
record "Created: $MGMT_ADMIN_EMAIL at $MGMT_ADMIN_DN"
}
mgmt_end() {
# Clean up after mgmt_start
delete_user "$MGMT_ADMIN_EMAIL"
}
mgmt_rest() {
# Issue a REST call to the management subsystem
local verb="$1" # eg "POST"
local uri="$2" # eg "/mail/users/add"
shift; shift; # remaining arguments are data
local auth_user="${MGMT_ADMIN_EMAIL}"
local auth_pass="${MGMT_ADMIN_PW}"
local url="https://$PRIMARY_HOSTNAME${uri}"
local data=()
local item output
for item; do data+=("--data-urlencode" "$item"); done
record "spawn: curl -w \"%{http_code}\" -X $verb --user \"${auth_user}:xxx\" ${data[@]} $url"
output=$(curl -s -S -w "%{http_code}" -X $verb --user "${auth_user}:${auth_pass}" "${data[@]}" $url 2>>$TEST_OF)
local code=$?
# http status is last 3 characters of output, extract it
REST_HTTP_CODE=$(awk '{S=substr($0,length($0)-2)} END {print S}' <<<"$output")
REST_OUTPUT=$(awk 'BEGIN{L=""}{ if(L!="") print L; L=$0 } END { print substr(L,1,length(L)-3) }' <<<"$output")
REST_ERROR=""
[ -z "$REST_HTTP_CODE" ] && REST_HTTP_CODE="000"
if [ $code -ne 0 ]; then
if [ $code -ne 16 -o $REST_HTTP_CODE -ne 200 ]; then
REST_ERROR="CURL failed with code $code"
record "${F_DANGER}$REST_ERROR${F_RESET}"
record "$output"
return 1
fi
fi
if [ $REST_HTTP_CODE -lt 200 -o $REST_HTTP_CODE -ge 300 ]; then
REST_ERROR="REST status $REST_HTTP_CODE: $REST_OUTPUT"
record "${F_DANGER}$REST_ERROR${F_RESET}"
return 2
fi
record "CURL succeded, HTTP status $REST_HTTP_CODE"
record "$output"
return 0
}
mgmt_create_user() {
local email="$1"
local pass="${2:-$email}"
local delete_first="${3:-yes}"
# ensure the user is deleted (clean test run)
if [ "$delete_first" == "yes" ]; then
delete_user "$email"
fi
record "[create user $email]"
mgmt_rest POST /admin/mail/users/add "email=$email" "password=$pass"
return $?
}
mgmt_assert_create_user() {
local email="$1"
local pass="$2"
local delete_first="${3}"
if ! mgmt_create_user "$email" "$pass" "$delete_first"; then
test_failure "Unable to create user $email"
test_failure "${REST_ERROR}"
return 1
fi
return 0
}
mgmt_delete_user() {
local email="$1"
record "[delete user $email]"
mgmt_rest POST /admin/mail/users/remove "email=$email"
return $?
}
mgmt_assert_delete_user() {
local email="$1"
if ! mgmt_delete_user "$email"; then
test_failure "Unable to cleanup/delete user $email"
test_failure "$REST_ERROR"
return 1
fi
return 0
}
mgmt_create_alias_group() {
local alias="$1"
shift
record "[Create new alias group $alias]"
record "members: $@"
# ensure the group is deleted (clean test run)
record "Try deleting any existing entry"
if ! mgmt_rest POST /admin/mail/aliases/remove "address=$alias"; then
get_attribute "$LDAP_ALIASES_BASE" "mail=$alias" "dn"
if [ ! -z "$ATTR_DN" ]; then
delete_dn "$ATTR_DN"
fi
fi
record "Create the alias group"
local members="$1" member
shift
for member; do members="${members},${member}"; done
mgmt_rest POST /admin/mail/aliases/add "address=$alias" "forwards_to=$members"
return $?
}
mgmt_assert_create_alias_group() {
local alias="$1"
shift
if ! mgmt_create_alias_group "$alias" "$@"; then
test_failure "Unable to create alias group $alias"
test_failure "${REST_ERROR}"
return 1
fi
return 0
}
mgmt_delete_alias_group() {
local alias="$1"
record "[Delete alias group $alias]"
mgmt_rest POST /admin/mail/aliases/remove "address=$alias"
return $?
}
mgmt_assert_delete_alias_group() {
local alias="$1"
if ! mgmt_delete_alias_group "$alias"; then
test_failure "Unable to cleanup/delete alias group $alias"
test_failure "$REST_ERROR"
return 1
fi
return 0
}